Documentation ¶
Overview ¶
+kubebuilder:object:generate=true +groupName=ssh.vault.upbound.io +versionName=v1alpha1
Index ¶
- Constants
- Variables
- type AllowedUserKeyConfigInitParameters
- type AllowedUserKeyConfigObservation
- type AllowedUserKeyConfigParameters
- type SecretBackendCA
- func (in *SecretBackendCA) DeepCopy() *SecretBackendCA
- func (in *SecretBackendCA) DeepCopyInto(out *SecretBackendCA)
- func (in *SecretBackendCA) DeepCopyObject() runtime.Object
- func (mg *SecretBackendCA) GetCondition(ct xpv1.ConditionType) xpv1.Condition
- func (tr *SecretBackendCA) GetConnectionDetailsMapping() map[string]string
- func (mg *SecretBackendCA) GetDeletionPolicy() xpv1.DeletionPolicy
- func (tr *SecretBackendCA) GetID() string
- func (tr *SecretBackendCA) GetInitParameters() (map[string]any, error)
- func (mg *SecretBackendCA) GetManagementPolicies() xpv1.ManagementPolicies
- func (tr *SecretBackendCA) GetObservation() (map[string]any, error)
- func (tr *SecretBackendCA) GetParameters() (map[string]any, error)
- func (mg *SecretBackendCA) GetProviderConfigReference() *xpv1.Reference
- func (mg *SecretBackendCA) GetProviderReference() *xpv1.Reference
- func (mg *SecretBackendCA) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
- func (mg *SecretBackendCA) GetTerraformResourceType() string
- func (tr *SecretBackendCA) GetTerraformSchemaVersion() int
- func (mg *SecretBackendCA) GetWriteConnectionSecretToReference() *xpv1.SecretReference
- func (tr *SecretBackendCA) LateInitialize(attrs []byte) (bool, error)
- func (mg *SecretBackendCA) SetConditions(c ...xpv1.Condition)
- func (mg *SecretBackendCA) SetDeletionPolicy(r xpv1.DeletionPolicy)
- func (mg *SecretBackendCA) SetManagementPolicies(r xpv1.ManagementPolicies)
- func (tr *SecretBackendCA) SetObservation(obs map[string]any) error
- func (tr *SecretBackendCA) SetParameters(params map[string]any) error
- func (mg *SecretBackendCA) SetProviderConfigReference(r *xpv1.Reference)
- func (mg *SecretBackendCA) SetProviderReference(r *xpv1.Reference)
- func (mg *SecretBackendCA) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
- func (mg *SecretBackendCA) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
- type SecretBackendCAInitParameters
- type SecretBackendCAList
- type SecretBackendCAObservation
- type SecretBackendCAParameters
- type SecretBackendCASpec
- type SecretBackendCAStatus
- type SecretBackendRole
- func (in *SecretBackendRole) DeepCopy() *SecretBackendRole
- func (in *SecretBackendRole) DeepCopyInto(out *SecretBackendRole)
- func (in *SecretBackendRole) DeepCopyObject() runtime.Object
- func (mg *SecretBackendRole) GetCondition(ct xpv1.ConditionType) xpv1.Condition
- func (tr *SecretBackendRole) GetConnectionDetailsMapping() map[string]string
- func (mg *SecretBackendRole) GetDeletionPolicy() xpv1.DeletionPolicy
- func (tr *SecretBackendRole) GetID() string
- func (tr *SecretBackendRole) GetInitParameters() (map[string]any, error)
- func (mg *SecretBackendRole) GetManagementPolicies() xpv1.ManagementPolicies
- func (tr *SecretBackendRole) GetObservation() (map[string]any, error)
- func (tr *SecretBackendRole) GetParameters() (map[string]any, error)
- func (mg *SecretBackendRole) GetProviderConfigReference() *xpv1.Reference
- func (mg *SecretBackendRole) GetProviderReference() *xpv1.Reference
- func (mg *SecretBackendRole) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
- func (mg *SecretBackendRole) GetTerraformResourceType() string
- func (tr *SecretBackendRole) GetTerraformSchemaVersion() int
- func (mg *SecretBackendRole) GetWriteConnectionSecretToReference() *xpv1.SecretReference
- func (tr *SecretBackendRole) LateInitialize(attrs []byte) (bool, error)
- func (mg *SecretBackendRole) SetConditions(c ...xpv1.Condition)
- func (mg *SecretBackendRole) SetDeletionPolicy(r xpv1.DeletionPolicy)
- func (mg *SecretBackendRole) SetManagementPolicies(r xpv1.ManagementPolicies)
- func (tr *SecretBackendRole) SetObservation(obs map[string]any) error
- func (tr *SecretBackendRole) SetParameters(params map[string]any) error
- func (mg *SecretBackendRole) SetProviderConfigReference(r *xpv1.Reference)
- func (mg *SecretBackendRole) SetProviderReference(r *xpv1.Reference)
- func (mg *SecretBackendRole) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
- func (mg *SecretBackendRole) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
- type SecretBackendRoleInitParameters
- type SecretBackendRoleList
- type SecretBackendRoleObservation
- type SecretBackendRoleParameters
- type SecretBackendRoleSpec
- type SecretBackendRoleStatus
Constants ¶
const ( CRDGroup = "ssh.vault.upbound.io" CRDVersion = "v1alpha1" )
Package type metadata.
Variables ¶
var ( // CRDGroupVersion is the API Group Version used to register the objects CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion} // SchemeBuilder is used to add go types to the GroupVersionKind scheme SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion} // AddToScheme adds the types in this group-version to the given scheme. AddToScheme = SchemeBuilder.AddToScheme )
var ( SecretBackendCA_Kind = "SecretBackendCA" SecretBackendCA_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendCA_Kind}.String() SecretBackendCA_KindAPIVersion = SecretBackendCA_Kind + "." + CRDGroupVersion.String() SecretBackendCA_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendCA_Kind) )
Repository type metadata.
var ( SecretBackendRole_Kind = "SecretBackendRole" SecretBackendRole_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendRole_Kind}.String() SecretBackendRole_KindAPIVersion = SecretBackendRole_Kind + "." + CRDGroupVersion.String() SecretBackendRole_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendRole_Kind) )
Repository type metadata.
Functions ¶
This section is empty.
Types ¶
type AllowedUserKeyConfigInitParameters ¶ added in v0.2.0
type AllowedUserKeyConfigInitParameters struct { // A list of allowed key lengths as integers. // For key types that do not support setting the length a value of [0] should be used. // Setting multiple lengths is only supported on Vault 1.10+. For prior releases length // must be set to a single element list. // List of allowed key lengths, vault-1.10 and above Lengths []*float64 `json:"lengths,omitempty" tf:"lengths,omitempty"` // The SSH public key type. // Supported key types are: // rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, // ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521 // Key type, choices: // rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521 Type *string `json:"type,omitempty" tf:"type,omitempty"` }
func (*AllowedUserKeyConfigInitParameters) DeepCopy ¶ added in v0.2.0
func (in *AllowedUserKeyConfigInitParameters) DeepCopy() *AllowedUserKeyConfigInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AllowedUserKeyConfigInitParameters.
func (*AllowedUserKeyConfigInitParameters) DeepCopyInto ¶ added in v0.2.0
func (in *AllowedUserKeyConfigInitParameters) DeepCopyInto(out *AllowedUserKeyConfigInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AllowedUserKeyConfigObservation ¶
type AllowedUserKeyConfigObservation struct { // A list of allowed key lengths as integers. // For key types that do not support setting the length a value of [0] should be used. // Setting multiple lengths is only supported on Vault 1.10+. For prior releases length // must be set to a single element list. // List of allowed key lengths, vault-1.10 and above Lengths []*float64 `json:"lengths,omitempty" tf:"lengths,omitempty"` // The SSH public key type. // Supported key types are: // rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, // ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521 // Key type, choices: // rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521 Type *string `json:"type,omitempty" tf:"type,omitempty"` }
func (*AllowedUserKeyConfigObservation) DeepCopy ¶
func (in *AllowedUserKeyConfigObservation) DeepCopy() *AllowedUserKeyConfigObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AllowedUserKeyConfigObservation.
func (*AllowedUserKeyConfigObservation) DeepCopyInto ¶
func (in *AllowedUserKeyConfigObservation) DeepCopyInto(out *AllowedUserKeyConfigObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type AllowedUserKeyConfigParameters ¶
type AllowedUserKeyConfigParameters struct { // A list of allowed key lengths as integers. // For key types that do not support setting the length a value of [0] should be used. // Setting multiple lengths is only supported on Vault 1.10+. For prior releases length // must be set to a single element list. // List of allowed key lengths, vault-1.10 and above // +kubebuilder:validation:Optional Lengths []*float64 `json:"lengths,omitempty" tf:"lengths,omitempty"` // The SSH public key type. // Supported key types are: // rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, // ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521 // Key type, choices: // rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521 // +kubebuilder:validation:Optional Type *string `json:"type,omitempty" tf:"type,omitempty"` }
func (*AllowedUserKeyConfigParameters) DeepCopy ¶
func (in *AllowedUserKeyConfigParameters) DeepCopy() *AllowedUserKeyConfigParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AllowedUserKeyConfigParameters.
func (*AllowedUserKeyConfigParameters) DeepCopyInto ¶
func (in *AllowedUserKeyConfigParameters) DeepCopyInto(out *AllowedUserKeyConfigParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendCA ¶
type SecretBackendCA struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` Spec SecretBackendCASpec `json:"spec"` Status SecretBackendCAStatus `json:"status,omitempty"` }
SecretBackendCA is the Schema for the SecretBackendCAs API. Managing CA information in an SSH secret backend in Vault +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
func (*SecretBackendCA) DeepCopy ¶
func (in *SecretBackendCA) DeepCopy() *SecretBackendCA
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCA.
func (*SecretBackendCA) DeepCopyInto ¶
func (in *SecretBackendCA) DeepCopyInto(out *SecretBackendCA)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendCA) DeepCopyObject ¶
func (in *SecretBackendCA) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendCA) GetCondition ¶
func (mg *SecretBackendCA) GetCondition(ct xpv1.ConditionType) xpv1.Condition
GetCondition of this SecretBackendCA.
func (*SecretBackendCA) GetConnectionDetailsMapping ¶
func (tr *SecretBackendCA) GetConnectionDetailsMapping() map[string]string
GetConnectionDetailsMapping for this SecretBackendCA
func (*SecretBackendCA) GetDeletionPolicy ¶
func (mg *SecretBackendCA) GetDeletionPolicy() xpv1.DeletionPolicy
GetDeletionPolicy of this SecretBackendCA.
func (*SecretBackendCA) GetID ¶
func (tr *SecretBackendCA) GetID() string
GetID returns ID of underlying Terraform resource of this SecretBackendCA
func (*SecretBackendCA) GetInitParameters ¶ added in v0.2.0
func (tr *SecretBackendCA) GetInitParameters() (map[string]any, error)
GetInitParameters of this SecretBackendCA
func (*SecretBackendCA) GetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackendCA) GetManagementPolicies() xpv1.ManagementPolicies
GetManagementPolicies of this SecretBackendCA.
func (*SecretBackendCA) GetObservation ¶
func (tr *SecretBackendCA) GetObservation() (map[string]any, error)
GetObservation of this SecretBackendCA
func (*SecretBackendCA) GetParameters ¶
func (tr *SecretBackendCA) GetParameters() (map[string]any, error)
GetParameters of this SecretBackendCA
func (*SecretBackendCA) GetProviderConfigReference ¶
func (mg *SecretBackendCA) GetProviderConfigReference() *xpv1.Reference
GetProviderConfigReference of this SecretBackendCA.
func (*SecretBackendCA) GetProviderReference ¶
func (mg *SecretBackendCA) GetProviderReference() *xpv1.Reference
GetProviderReference of this SecretBackendCA. Deprecated: Use GetProviderConfigReference.
func (*SecretBackendCA) GetPublishConnectionDetailsTo ¶
func (mg *SecretBackendCA) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
GetPublishConnectionDetailsTo of this SecretBackendCA.
func (*SecretBackendCA) GetTerraformResourceType ¶
func (mg *SecretBackendCA) GetTerraformResourceType() string
GetTerraformResourceType returns Terraform resource type for this SecretBackendCA
func (*SecretBackendCA) GetTerraformSchemaVersion ¶
func (tr *SecretBackendCA) GetTerraformSchemaVersion() int
GetTerraformSchemaVersion returns the associated Terraform schema version
func (*SecretBackendCA) GetWriteConnectionSecretToReference ¶
func (mg *SecretBackendCA) GetWriteConnectionSecretToReference() *xpv1.SecretReference
GetWriteConnectionSecretToReference of this SecretBackendCA.
func (*SecretBackendCA) LateInitialize ¶
func (tr *SecretBackendCA) LateInitialize(attrs []byte) (bool, error)
LateInitialize this SecretBackendCA using its observed tfState. returns True if there are any spec changes for the resource.
func (*SecretBackendCA) SetConditions ¶
func (mg *SecretBackendCA) SetConditions(c ...xpv1.Condition)
SetConditions of this SecretBackendCA.
func (*SecretBackendCA) SetDeletionPolicy ¶
func (mg *SecretBackendCA) SetDeletionPolicy(r xpv1.DeletionPolicy)
SetDeletionPolicy of this SecretBackendCA.
func (*SecretBackendCA) SetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackendCA) SetManagementPolicies(r xpv1.ManagementPolicies)
SetManagementPolicies of this SecretBackendCA.
func (*SecretBackendCA) SetObservation ¶
func (tr *SecretBackendCA) SetObservation(obs map[string]any) error
SetObservation for this SecretBackendCA
func (*SecretBackendCA) SetParameters ¶
func (tr *SecretBackendCA) SetParameters(params map[string]any) error
SetParameters for this SecretBackendCA
func (*SecretBackendCA) SetProviderConfigReference ¶
func (mg *SecretBackendCA) SetProviderConfigReference(r *xpv1.Reference)
SetProviderConfigReference of this SecretBackendCA.
func (*SecretBackendCA) SetProviderReference ¶
func (mg *SecretBackendCA) SetProviderReference(r *xpv1.Reference)
SetProviderReference of this SecretBackendCA. Deprecated: Use SetProviderConfigReference.
func (*SecretBackendCA) SetPublishConnectionDetailsTo ¶
func (mg *SecretBackendCA) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
SetPublishConnectionDetailsTo of this SecretBackendCA.
func (*SecretBackendCA) SetWriteConnectionSecretToReference ¶
func (mg *SecretBackendCA) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
SetWriteConnectionSecretToReference of this SecretBackendCA.
type SecretBackendCAInitParameters ¶ added in v0.2.0
type SecretBackendCAInitParameters struct { // The path where the SSH secret backend is mounted. Defaults to 'ssh' // The path of the SSH Secret Backend where the CA should be configured Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // Whether Vault should generate the signing key pair internally. Defaults to true // Whether Vault should generate the signing key pair internally. GenerateSigningKey *bool `json:"generateSigningKey,omitempty" tf:"generate_signing_key,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The public key part the SSH CA key pair; required if generate_signing_key is false. // Public key part the SSH CA key pair; required if generate_signing_key is false. PublicKey *string `json:"publicKey,omitempty" tf:"public_key,omitempty"` }
func (*SecretBackendCAInitParameters) DeepCopy ¶ added in v0.2.0
func (in *SecretBackendCAInitParameters) DeepCopy() *SecretBackendCAInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCAInitParameters.
func (*SecretBackendCAInitParameters) DeepCopyInto ¶ added in v0.2.0
func (in *SecretBackendCAInitParameters) DeepCopyInto(out *SecretBackendCAInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendCAList ¶
type SecretBackendCAList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []SecretBackendCA `json:"items"` }
SecretBackendCAList contains a list of SecretBackendCAs
func (*SecretBackendCAList) DeepCopy ¶
func (in *SecretBackendCAList) DeepCopy() *SecretBackendCAList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCAList.
func (*SecretBackendCAList) DeepCopyInto ¶
func (in *SecretBackendCAList) DeepCopyInto(out *SecretBackendCAList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendCAList) DeepCopyObject ¶
func (in *SecretBackendCAList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendCAList) GetItems ¶
func (l *SecretBackendCAList) GetItems() []resource.Managed
GetItems of this SecretBackendCAList.
type SecretBackendCAObservation ¶
type SecretBackendCAObservation struct { // The path where the SSH secret backend is mounted. Defaults to 'ssh' // The path of the SSH Secret Backend where the CA should be configured Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // Whether Vault should generate the signing key pair internally. Defaults to true // Whether Vault should generate the signing key pair internally. GenerateSigningKey *bool `json:"generateSigningKey,omitempty" tf:"generate_signing_key,omitempty"` ID *string `json:"id,omitempty" tf:"id,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The public key part the SSH CA key pair; required if generate_signing_key is false. // Public key part the SSH CA key pair; required if generate_signing_key is false. PublicKey *string `json:"publicKey,omitempty" tf:"public_key,omitempty"` }
func (*SecretBackendCAObservation) DeepCopy ¶
func (in *SecretBackendCAObservation) DeepCopy() *SecretBackendCAObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCAObservation.
func (*SecretBackendCAObservation) DeepCopyInto ¶
func (in *SecretBackendCAObservation) DeepCopyInto(out *SecretBackendCAObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendCAParameters ¶
type SecretBackendCAParameters struct { // The path where the SSH secret backend is mounted. Defaults to 'ssh' // The path of the SSH Secret Backend where the CA should be configured // +kubebuilder:validation:Optional Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // Whether Vault should generate the signing key pair internally. Defaults to true // Whether Vault should generate the signing key pair internally. // +kubebuilder:validation:Optional GenerateSigningKey *bool `json:"generateSigningKey,omitempty" tf:"generate_signing_key,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) // +kubebuilder:validation:Optional Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // The private key part the SSH CA key pair; required if generate_signing_key is false. // Private key part the SSH CA key pair; required if generate_signing_key is false. // +kubebuilder:validation:Optional PrivateKeySecretRef *v1.SecretKeySelector `json:"privateKeySecretRef,omitempty" tf:"-"` // The public key part the SSH CA key pair; required if generate_signing_key is false. // Public key part the SSH CA key pair; required if generate_signing_key is false. // +kubebuilder:validation:Optional PublicKey *string `json:"publicKey,omitempty" tf:"public_key,omitempty"` }
func (*SecretBackendCAParameters) DeepCopy ¶
func (in *SecretBackendCAParameters) DeepCopy() *SecretBackendCAParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCAParameters.
func (*SecretBackendCAParameters) DeepCopyInto ¶
func (in *SecretBackendCAParameters) DeepCopyInto(out *SecretBackendCAParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendCASpec ¶
type SecretBackendCASpec struct { v1.ResourceSpec `json:",inline"` ForProvider SecretBackendCAParameters `json:"forProvider"` // THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored // unless the relevant Crossplane feature flag is enabled, and may be // changed or removed without notice. // InitProvider holds the same fields as ForProvider, with the exception // of Identifier and other resource reference fields. The fields that are // in InitProvider are merged into ForProvider when the resource is created. // The same fields are also added to the terraform ignore_changes hook, to // avoid updating them after creation. This is useful for fields that are // required on creation, but we do not desire to update them after creation, // for example because of an external controller is managing them, like an // autoscaler. InitProvider SecretBackendCAInitParameters `json:"initProvider,omitempty"` }
SecretBackendCASpec defines the desired state of SecretBackendCA
func (*SecretBackendCASpec) DeepCopy ¶
func (in *SecretBackendCASpec) DeepCopy() *SecretBackendCASpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCASpec.
func (*SecretBackendCASpec) DeepCopyInto ¶
func (in *SecretBackendCASpec) DeepCopyInto(out *SecretBackendCASpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendCAStatus ¶
type SecretBackendCAStatus struct { v1.ResourceStatus `json:",inline"` AtProvider SecretBackendCAObservation `json:"atProvider,omitempty"` }
SecretBackendCAStatus defines the observed state of SecretBackendCA.
func (*SecretBackendCAStatus) DeepCopy ¶
func (in *SecretBackendCAStatus) DeepCopy() *SecretBackendCAStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCAStatus.
func (*SecretBackendCAStatus) DeepCopyInto ¶
func (in *SecretBackendCAStatus) DeepCopyInto(out *SecretBackendCAStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendRole ¶
type SecretBackendRole struct { metav1.TypeMeta `json:",inline"` metav1.ObjectMeta `json:"metadata,omitempty"` // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter" // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.keyType) || has(self.initProvider.keyType)",message="keyType is a required parameter" // +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || has(self.initProvider.name)",message="name is a required parameter" Spec SecretBackendRoleSpec `json:"spec"` Status SecretBackendRoleStatus `json:"status,omitempty"` }
SecretBackendRole is the Schema for the SecretBackendRoles API. Managing roles in an SSH secret backend in Vault +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
func (*SecretBackendRole) DeepCopy ¶
func (in *SecretBackendRole) DeepCopy() *SecretBackendRole
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRole.
func (*SecretBackendRole) DeepCopyInto ¶
func (in *SecretBackendRole) DeepCopyInto(out *SecretBackendRole)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendRole) DeepCopyObject ¶
func (in *SecretBackendRole) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendRole) GetCondition ¶
func (mg *SecretBackendRole) GetCondition(ct xpv1.ConditionType) xpv1.Condition
GetCondition of this SecretBackendRole.
func (*SecretBackendRole) GetConnectionDetailsMapping ¶
func (tr *SecretBackendRole) GetConnectionDetailsMapping() map[string]string
GetConnectionDetailsMapping for this SecretBackendRole
func (*SecretBackendRole) GetDeletionPolicy ¶
func (mg *SecretBackendRole) GetDeletionPolicy() xpv1.DeletionPolicy
GetDeletionPolicy of this SecretBackendRole.
func (*SecretBackendRole) GetID ¶
func (tr *SecretBackendRole) GetID() string
GetID returns ID of underlying Terraform resource of this SecretBackendRole
func (*SecretBackendRole) GetInitParameters ¶ added in v0.2.0
func (tr *SecretBackendRole) GetInitParameters() (map[string]any, error)
GetInitParameters of this SecretBackendRole
func (*SecretBackendRole) GetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackendRole) GetManagementPolicies() xpv1.ManagementPolicies
GetManagementPolicies of this SecretBackendRole.
func (*SecretBackendRole) GetObservation ¶
func (tr *SecretBackendRole) GetObservation() (map[string]any, error)
GetObservation of this SecretBackendRole
func (*SecretBackendRole) GetParameters ¶
func (tr *SecretBackendRole) GetParameters() (map[string]any, error)
GetParameters of this SecretBackendRole
func (*SecretBackendRole) GetProviderConfigReference ¶
func (mg *SecretBackendRole) GetProviderConfigReference() *xpv1.Reference
GetProviderConfigReference of this SecretBackendRole.
func (*SecretBackendRole) GetProviderReference ¶
func (mg *SecretBackendRole) GetProviderReference() *xpv1.Reference
GetProviderReference of this SecretBackendRole. Deprecated: Use GetProviderConfigReference.
func (*SecretBackendRole) GetPublishConnectionDetailsTo ¶
func (mg *SecretBackendRole) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
GetPublishConnectionDetailsTo of this SecretBackendRole.
func (*SecretBackendRole) GetTerraformResourceType ¶
func (mg *SecretBackendRole) GetTerraformResourceType() string
GetTerraformResourceType returns Terraform resource type for this SecretBackendRole
func (*SecretBackendRole) GetTerraformSchemaVersion ¶
func (tr *SecretBackendRole) GetTerraformSchemaVersion() int
GetTerraformSchemaVersion returns the associated Terraform schema version
func (*SecretBackendRole) GetWriteConnectionSecretToReference ¶
func (mg *SecretBackendRole) GetWriteConnectionSecretToReference() *xpv1.SecretReference
GetWriteConnectionSecretToReference of this SecretBackendRole.
func (*SecretBackendRole) LateInitialize ¶
func (tr *SecretBackendRole) LateInitialize(attrs []byte) (bool, error)
LateInitialize this SecretBackendRole using its observed tfState. returns True if there are any spec changes for the resource.
func (*SecretBackendRole) SetConditions ¶
func (mg *SecretBackendRole) SetConditions(c ...xpv1.Condition)
SetConditions of this SecretBackendRole.
func (*SecretBackendRole) SetDeletionPolicy ¶
func (mg *SecretBackendRole) SetDeletionPolicy(r xpv1.DeletionPolicy)
SetDeletionPolicy of this SecretBackendRole.
func (*SecretBackendRole) SetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackendRole) SetManagementPolicies(r xpv1.ManagementPolicies)
SetManagementPolicies of this SecretBackendRole.
func (*SecretBackendRole) SetObservation ¶
func (tr *SecretBackendRole) SetObservation(obs map[string]any) error
SetObservation for this SecretBackendRole
func (*SecretBackendRole) SetParameters ¶
func (tr *SecretBackendRole) SetParameters(params map[string]any) error
SetParameters for this SecretBackendRole
func (*SecretBackendRole) SetProviderConfigReference ¶
func (mg *SecretBackendRole) SetProviderConfigReference(r *xpv1.Reference)
SetProviderConfigReference of this SecretBackendRole.
func (*SecretBackendRole) SetProviderReference ¶
func (mg *SecretBackendRole) SetProviderReference(r *xpv1.Reference)
SetProviderReference of this SecretBackendRole. Deprecated: Use SetProviderConfigReference.
func (*SecretBackendRole) SetPublishConnectionDetailsTo ¶
func (mg *SecretBackendRole) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
SetPublishConnectionDetailsTo of this SecretBackendRole.
func (*SecretBackendRole) SetWriteConnectionSecretToReference ¶
func (mg *SecretBackendRole) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
SetWriteConnectionSecretToReference of this SecretBackendRole.
type SecretBackendRoleInitParameters ¶ added in v0.2.0
type SecretBackendRoleInitParameters struct { // When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512. AlgorithmSigner *string `json:"algorithmSigner,omitempty" tf:"algorithm_signer,omitempty"` // Specifies if host certificates that are requested are allowed to use the base domains listed in allowed_domains. AllowBareDomains *bool `json:"allowBareDomains,omitempty" tf:"allow_bare_domains,omitempty"` // Specifies if certificates are allowed to be signed for use as a 'host'. AllowHostCertificates *bool `json:"allowHostCertificates,omitempty" tf:"allow_host_certificates,omitempty"` // Specifies if host certificates that are requested are allowed to be subdomains of those listed in allowed_domains. AllowSubdomains *bool `json:"allowSubdomains,omitempty" tf:"allow_subdomains,omitempty"` // Specifies if certificates are allowed to be signed for use as a 'user'. AllowUserCertificates *bool `json:"allowUserCertificates,omitempty" tf:"allow_user_certificates,omitempty"` // Specifies if users can override the key ID for a signed certificate with the key_id field. AllowUserKeyIds *bool `json:"allowUserKeyIds,omitempty" tf:"allow_user_key_ids,omitempty"` // Specifies a comma-separated list of critical options that certificates can have when signed. AllowedCriticalOptions *string `json:"allowedCriticalOptions,omitempty" tf:"allowed_critical_options,omitempty"` // The list of domains for which a client can request a host certificate. AllowedDomains *string `json:"allowedDomains,omitempty" tf:"allowed_domains,omitempty"` // Specifies a comma-separated list of extensions that certificates can have when signed. AllowedExtensions *string `json:"allowedExtensions,omitempty" tf:"allowed_extensions,omitempty"` // Set of configuration blocks to define allowed // user key configuration, like key type and their lengths. Can be specified multiple times. // See // Set of allowed public key types and their relevant configuration AllowedUserKeyConfig []AllowedUserKeyConfigInitParameters `json:"allowedUserKeyConfig,omitempty" tf:"allowed_user_key_config,omitempty"` // Specifies a map of ssh key types and their expected sizes which // are allowed to be signed by the CA type. // Deprecated: use allowed_user_key_config instead AllowedUserKeyLengths map[string]*float64 `json:"allowedUserKeyLengths,omitempty" tf:"allowed_user_key_lengths,omitempty"` // Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed. AllowedUsers *string `json:"allowedUsers,omitempty" tf:"allowed_users,omitempty"` // Specifies if allowed_users can be declared using identity template policies. Non-templated users are also permitted. AllowedUsersTemplate *bool `json:"allowedUsersTemplate,omitempty" tf:"allowed_users_template,omitempty"` // The path where the SSH secret backend is mounted. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // The comma-separated string of CIDR blocks for which this role is applicable. CidrList *string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"` // Specifies a map of critical options that certificates have when signed. DefaultCriticalOptions map[string]*string `json:"defaultCriticalOptions,omitempty" tf:"default_critical_options,omitempty"` // Specifies a map of extensions that certificates have when signed. DefaultExtensions map[string]*string `json:"defaultExtensions,omitempty" tf:"default_extensions,omitempty"` // Specifies the default username for which a credential will be generated. DefaultUser *string `json:"defaultUser,omitempty" tf:"default_user,omitempty"` // If set, default_users can be specified using identity template values. A non-templated user is also permitted. DefaultUserTemplate *bool `json:"defaultUserTemplate,omitempty" tf:"default_user_template,omitempty"` // Specifies a custom format for the key id of a signed certificate. KeyIDFormat *string `json:"keyIdFormat,omitempty" tf:"key_id_format,omitempty"` // Specifies the type of credentials generated by this role. This can be either otp, dynamic or ca. KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"` // Specifies the maximum Time To Live value. MaxTTL *string `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"` // Specifies the name of the role to create. // Unique name for the role. Name *string `json:"name,omitempty" tf:"name,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // Specifies the Time To Live value. TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"` }
func (*SecretBackendRoleInitParameters) DeepCopy ¶ added in v0.2.0
func (in *SecretBackendRoleInitParameters) DeepCopy() *SecretBackendRoleInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleInitParameters.
func (*SecretBackendRoleInitParameters) DeepCopyInto ¶ added in v0.2.0
func (in *SecretBackendRoleInitParameters) DeepCopyInto(out *SecretBackendRoleInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendRoleList ¶
type SecretBackendRoleList struct { metav1.TypeMeta `json:",inline"` metav1.ListMeta `json:"metadata,omitempty"` Items []SecretBackendRole `json:"items"` }
SecretBackendRoleList contains a list of SecretBackendRoles
func (*SecretBackendRoleList) DeepCopy ¶
func (in *SecretBackendRoleList) DeepCopy() *SecretBackendRoleList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleList.
func (*SecretBackendRoleList) DeepCopyInto ¶
func (in *SecretBackendRoleList) DeepCopyInto(out *SecretBackendRoleList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendRoleList) DeepCopyObject ¶
func (in *SecretBackendRoleList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendRoleList) GetItems ¶
func (l *SecretBackendRoleList) GetItems() []resource.Managed
GetItems of this SecretBackendRoleList.
type SecretBackendRoleObservation ¶
type SecretBackendRoleObservation struct { // When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512. AlgorithmSigner *string `json:"algorithmSigner,omitempty" tf:"algorithm_signer,omitempty"` // Specifies if host certificates that are requested are allowed to use the base domains listed in allowed_domains. AllowBareDomains *bool `json:"allowBareDomains,omitempty" tf:"allow_bare_domains,omitempty"` // Specifies if certificates are allowed to be signed for use as a 'host'. AllowHostCertificates *bool `json:"allowHostCertificates,omitempty" tf:"allow_host_certificates,omitempty"` // Specifies if host certificates that are requested are allowed to be subdomains of those listed in allowed_domains. AllowSubdomains *bool `json:"allowSubdomains,omitempty" tf:"allow_subdomains,omitempty"` // Specifies if certificates are allowed to be signed for use as a 'user'. AllowUserCertificates *bool `json:"allowUserCertificates,omitempty" tf:"allow_user_certificates,omitempty"` // Specifies if users can override the key ID for a signed certificate with the key_id field. AllowUserKeyIds *bool `json:"allowUserKeyIds,omitempty" tf:"allow_user_key_ids,omitempty"` // Specifies a comma-separated list of critical options that certificates can have when signed. AllowedCriticalOptions *string `json:"allowedCriticalOptions,omitempty" tf:"allowed_critical_options,omitempty"` // The list of domains for which a client can request a host certificate. AllowedDomains *string `json:"allowedDomains,omitempty" tf:"allowed_domains,omitempty"` // Specifies a comma-separated list of extensions that certificates can have when signed. AllowedExtensions *string `json:"allowedExtensions,omitempty" tf:"allowed_extensions,omitempty"` // Set of configuration blocks to define allowed // user key configuration, like key type and their lengths. Can be specified multiple times. // See // Set of allowed public key types and their relevant configuration AllowedUserKeyConfig []AllowedUserKeyConfigObservation `json:"allowedUserKeyConfig,omitempty" tf:"allowed_user_key_config,omitempty"` // Specifies a map of ssh key types and their expected sizes which // are allowed to be signed by the CA type. // Deprecated: use allowed_user_key_config instead AllowedUserKeyLengths map[string]*float64 `json:"allowedUserKeyLengths,omitempty" tf:"allowed_user_key_lengths,omitempty"` // Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed. AllowedUsers *string `json:"allowedUsers,omitempty" tf:"allowed_users,omitempty"` // Specifies if allowed_users can be declared using identity template policies. Non-templated users are also permitted. AllowedUsersTemplate *bool `json:"allowedUsersTemplate,omitempty" tf:"allowed_users_template,omitempty"` // The path where the SSH secret backend is mounted. Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // The comma-separated string of CIDR blocks for which this role is applicable. CidrList *string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"` // Specifies a map of critical options that certificates have when signed. DefaultCriticalOptions map[string]*string `json:"defaultCriticalOptions,omitempty" tf:"default_critical_options,omitempty"` // Specifies a map of extensions that certificates have when signed. DefaultExtensions map[string]*string `json:"defaultExtensions,omitempty" tf:"default_extensions,omitempty"` // Specifies the default username for which a credential will be generated. DefaultUser *string `json:"defaultUser,omitempty" tf:"default_user,omitempty"` // If set, default_users can be specified using identity template values. A non-templated user is also permitted. DefaultUserTemplate *bool `json:"defaultUserTemplate,omitempty" tf:"default_user_template,omitempty"` ID *string `json:"id,omitempty" tf:"id,omitempty"` // Specifies a custom format for the key id of a signed certificate. KeyIDFormat *string `json:"keyIdFormat,omitempty" tf:"key_id_format,omitempty"` // Specifies the type of credentials generated by this role. This can be either otp, dynamic or ca. KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"` // Specifies the maximum Time To Live value. MaxTTL *string `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"` // Specifies the name of the role to create. // Unique name for the role. Name *string `json:"name,omitempty" tf:"name,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // Specifies the Time To Live value. TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"` }
func (*SecretBackendRoleObservation) DeepCopy ¶
func (in *SecretBackendRoleObservation) DeepCopy() *SecretBackendRoleObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleObservation.
func (*SecretBackendRoleObservation) DeepCopyInto ¶
func (in *SecretBackendRoleObservation) DeepCopyInto(out *SecretBackendRoleObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendRoleParameters ¶
type SecretBackendRoleParameters struct { // When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512. // +kubebuilder:validation:Optional AlgorithmSigner *string `json:"algorithmSigner,omitempty" tf:"algorithm_signer,omitempty"` // Specifies if host certificates that are requested are allowed to use the base domains listed in allowed_domains. // +kubebuilder:validation:Optional AllowBareDomains *bool `json:"allowBareDomains,omitempty" tf:"allow_bare_domains,omitempty"` // Specifies if certificates are allowed to be signed for use as a 'host'. // +kubebuilder:validation:Optional AllowHostCertificates *bool `json:"allowHostCertificates,omitempty" tf:"allow_host_certificates,omitempty"` // Specifies if host certificates that are requested are allowed to be subdomains of those listed in allowed_domains. // +kubebuilder:validation:Optional AllowSubdomains *bool `json:"allowSubdomains,omitempty" tf:"allow_subdomains,omitempty"` // Specifies if certificates are allowed to be signed for use as a 'user'. // +kubebuilder:validation:Optional AllowUserCertificates *bool `json:"allowUserCertificates,omitempty" tf:"allow_user_certificates,omitempty"` // Specifies if users can override the key ID for a signed certificate with the key_id field. // +kubebuilder:validation:Optional AllowUserKeyIds *bool `json:"allowUserKeyIds,omitempty" tf:"allow_user_key_ids,omitempty"` // Specifies a comma-separated list of critical options that certificates can have when signed. // +kubebuilder:validation:Optional AllowedCriticalOptions *string `json:"allowedCriticalOptions,omitempty" tf:"allowed_critical_options,omitempty"` // The list of domains for which a client can request a host certificate. // +kubebuilder:validation:Optional AllowedDomains *string `json:"allowedDomains,omitempty" tf:"allowed_domains,omitempty"` // Specifies a comma-separated list of extensions that certificates can have when signed. // +kubebuilder:validation:Optional AllowedExtensions *string `json:"allowedExtensions,omitempty" tf:"allowed_extensions,omitempty"` // Set of configuration blocks to define allowed // user key configuration, like key type and their lengths. Can be specified multiple times. // See // Set of allowed public key types and their relevant configuration // +kubebuilder:validation:Optional AllowedUserKeyConfig []AllowedUserKeyConfigParameters `json:"allowedUserKeyConfig,omitempty" tf:"allowed_user_key_config,omitempty"` // Specifies a map of ssh key types and their expected sizes which // are allowed to be signed by the CA type. // Deprecated: use allowed_user_key_config instead // +kubebuilder:validation:Optional AllowedUserKeyLengths map[string]*float64 `json:"allowedUserKeyLengths,omitempty" tf:"allowed_user_key_lengths,omitempty"` // Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed. // +kubebuilder:validation:Optional AllowedUsers *string `json:"allowedUsers,omitempty" tf:"allowed_users,omitempty"` // Specifies if allowed_users can be declared using identity template policies. Non-templated users are also permitted. // +kubebuilder:validation:Optional AllowedUsersTemplate *bool `json:"allowedUsersTemplate,omitempty" tf:"allowed_users_template,omitempty"` // The path where the SSH secret backend is mounted. // +kubebuilder:validation:Optional Backend *string `json:"backend,omitempty" tf:"backend,omitempty"` // The comma-separated string of CIDR blocks for which this role is applicable. // +kubebuilder:validation:Optional CidrList *string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"` // Specifies a map of critical options that certificates have when signed. // +kubebuilder:validation:Optional DefaultCriticalOptions map[string]*string `json:"defaultCriticalOptions,omitempty" tf:"default_critical_options,omitempty"` // Specifies a map of extensions that certificates have when signed. // +kubebuilder:validation:Optional DefaultExtensions map[string]*string `json:"defaultExtensions,omitempty" tf:"default_extensions,omitempty"` // Specifies the default username for which a credential will be generated. // +kubebuilder:validation:Optional DefaultUser *string `json:"defaultUser,omitempty" tf:"default_user,omitempty"` // If set, default_users can be specified using identity template values. A non-templated user is also permitted. // +kubebuilder:validation:Optional DefaultUserTemplate *bool `json:"defaultUserTemplate,omitempty" tf:"default_user_template,omitempty"` // Specifies a custom format for the key id of a signed certificate. // +kubebuilder:validation:Optional KeyIDFormat *string `json:"keyIdFormat,omitempty" tf:"key_id_format,omitempty"` // Specifies the type of credentials generated by this role. This can be either otp, dynamic or ca. // +kubebuilder:validation:Optional KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"` // Specifies the maximum Time To Live value. // +kubebuilder:validation:Optional MaxTTL *string `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"` // Specifies the name of the role to create. // Unique name for the role. // +kubebuilder:validation:Optional Name *string `json:"name,omitempty" tf:"name,omitempty"` // The namespace to provision the resource in. // The value should not contain leading or trailing forward slashes. // The namespace is always relative to the provider's configured namespace. // Available only for Vault Enterprise. // Target namespace. (requires Enterprise) // +kubebuilder:validation:Optional Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"` // Specifies the Time To Live value. // +kubebuilder:validation:Optional TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"` }
func (*SecretBackendRoleParameters) DeepCopy ¶
func (in *SecretBackendRoleParameters) DeepCopy() *SecretBackendRoleParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleParameters.
func (*SecretBackendRoleParameters) DeepCopyInto ¶
func (in *SecretBackendRoleParameters) DeepCopyInto(out *SecretBackendRoleParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendRoleSpec ¶
type SecretBackendRoleSpec struct { v1.ResourceSpec `json:",inline"` ForProvider SecretBackendRoleParameters `json:"forProvider"` // THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored // unless the relevant Crossplane feature flag is enabled, and may be // changed or removed without notice. // InitProvider holds the same fields as ForProvider, with the exception // of Identifier and other resource reference fields. The fields that are // in InitProvider are merged into ForProvider when the resource is created. // The same fields are also added to the terraform ignore_changes hook, to // avoid updating them after creation. This is useful for fields that are // required on creation, but we do not desire to update them after creation, // for example because of an external controller is managing them, like an // autoscaler. InitProvider SecretBackendRoleInitParameters `json:"initProvider,omitempty"` }
SecretBackendRoleSpec defines the desired state of SecretBackendRole
func (*SecretBackendRoleSpec) DeepCopy ¶
func (in *SecretBackendRoleSpec) DeepCopy() *SecretBackendRoleSpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleSpec.
func (*SecretBackendRoleSpec) DeepCopyInto ¶
func (in *SecretBackendRoleSpec) DeepCopyInto(out *SecretBackendRoleSpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendRoleStatus ¶
type SecretBackendRoleStatus struct { v1.ResourceStatus `json:",inline"` AtProvider SecretBackendRoleObservation `json:"atProvider,omitempty"` }
SecretBackendRoleStatus defines the observed state of SecretBackendRole.
func (*SecretBackendRoleStatus) DeepCopy ¶
func (in *SecretBackendRoleStatus) DeepCopy() *SecretBackendRoleStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleStatus.
func (*SecretBackendRoleStatus) DeepCopyInto ¶
func (in *SecretBackendRoleStatus) DeepCopyInto(out *SecretBackendRoleStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.