v1alpha1

package
v0.4.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Feb 22, 2024 License: Apache-2.0 Imports: 9 Imported by: 0

Documentation

Overview

+kubebuilder:object:generate=true +groupName=generic.vault.upbound.io +versionName=v1alpha1

Index

Constants

View Source
const (
	CRDGroup   = "generic.vault.upbound.io"
	CRDVersion = "v1alpha1"
)

Package type metadata.

Variables

View Source
var (
	Endpoint_Kind             = "Endpoint"
	Endpoint_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: Endpoint_Kind}.String()
	Endpoint_KindAPIVersion   = Endpoint_Kind + "." + CRDGroupVersion.String()
	Endpoint_GroupVersionKind = CRDGroupVersion.WithKind(Endpoint_Kind)
)

Repository type metadata.

View Source
var (
	// CRDGroupVersion is the API Group Version used to register the objects
	CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion}

	// SchemeBuilder is used to add go types to the GroupVersionKind scheme
	SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion}

	// AddToScheme adds the types in this group-version to the given scheme.
	AddToScheme = SchemeBuilder.AddToScheme
)
View Source
var (
	Secret_Kind             = "Secret"
	Secret_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: Secret_Kind}.String()
	Secret_KindAPIVersion   = Secret_Kind + "." + CRDGroupVersion.String()
	Secret_GroupVersionKind = CRDGroupVersion.WithKind(Secret_Kind)
)

Repository type metadata.

Functions

This section is empty.

Types

type Endpoint

type Endpoint struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.dataJsonSecretRef)",message="dataJsonSecretRef is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.path) || has(self.initProvider.path)",message="path is a required parameter"
	Spec   EndpointSpec   `json:"spec"`
	Status EndpointStatus `json:"status,omitempty"`
}

Endpoint is the Schema for the Endpoints API. Writes arbitrary data to a given path in Vault +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*Endpoint) DeepCopy

func (in *Endpoint) DeepCopy() *Endpoint

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Endpoint.

func (*Endpoint) DeepCopyInto

func (in *Endpoint) DeepCopyInto(out *Endpoint)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*Endpoint) DeepCopyObject

func (in *Endpoint) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*Endpoint) GetCondition

func (mg *Endpoint) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this Endpoint.

func (*Endpoint) GetConnectionDetailsMapping

func (tr *Endpoint) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this Endpoint

func (*Endpoint) GetDeletionPolicy

func (mg *Endpoint) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this Endpoint.

func (*Endpoint) GetID

func (tr *Endpoint) GetID() string

GetID returns ID of underlying Terraform resource of this Endpoint

func (*Endpoint) GetInitParameters added in v0.2.0

func (tr *Endpoint) GetInitParameters() (map[string]any, error)

GetInitParameters of this Endpoint

func (*Endpoint) GetManagementPolicies added in v0.2.0

func (mg *Endpoint) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this Endpoint.

func (*Endpoint) GetObservation

func (tr *Endpoint) GetObservation() (map[string]any, error)

GetObservation of this Endpoint

func (*Endpoint) GetParameters

func (tr *Endpoint) GetParameters() (map[string]any, error)

GetParameters of this Endpoint

func (*Endpoint) GetProviderConfigReference

func (mg *Endpoint) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this Endpoint.

func (*Endpoint) GetProviderReference

func (mg *Endpoint) GetProviderReference() *xpv1.Reference

GetProviderReference of this Endpoint. Deprecated: Use GetProviderConfigReference.

func (*Endpoint) GetPublishConnectionDetailsTo

func (mg *Endpoint) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this Endpoint.

func (*Endpoint) GetTerraformResourceType

func (mg *Endpoint) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this Endpoint

func (*Endpoint) GetTerraformSchemaVersion

func (tr *Endpoint) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*Endpoint) GetWriteConnectionSecretToReference

func (mg *Endpoint) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this Endpoint.

func (*Endpoint) LateInitialize

func (tr *Endpoint) LateInitialize(attrs []byte) (bool, error)

LateInitialize this Endpoint using its observed tfState. returns True if there are any spec changes for the resource.

func (*Endpoint) SetConditions

func (mg *Endpoint) SetConditions(c ...xpv1.Condition)

SetConditions of this Endpoint.

func (*Endpoint) SetDeletionPolicy

func (mg *Endpoint) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this Endpoint.

func (*Endpoint) SetManagementPolicies added in v0.2.0

func (mg *Endpoint) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this Endpoint.

func (*Endpoint) SetObservation

func (tr *Endpoint) SetObservation(obs map[string]any) error

SetObservation for this Endpoint

func (*Endpoint) SetParameters

func (tr *Endpoint) SetParameters(params map[string]any) error

SetParameters for this Endpoint

func (*Endpoint) SetProviderConfigReference

func (mg *Endpoint) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this Endpoint.

func (*Endpoint) SetProviderReference

func (mg *Endpoint) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this Endpoint. Deprecated: Use SetProviderConfigReference.

func (*Endpoint) SetPublishConnectionDetailsTo

func (mg *Endpoint) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this Endpoint.

func (*Endpoint) SetWriteConnectionSecretToReference

func (mg *Endpoint) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this Endpoint.

type EndpointInitParameters added in v0.2.0

type EndpointInitParameters struct {

	// True/false. Set this to true if your
	// vault authentication is not able to delete the data or if the endpoint
	// does not support the DELETE method. Defaults to false.
	// Don't attempt to delete the path from Vault if true
	DisableDelete *bool `json:"disableDelete,omitempty" tf:"disable_delete,omitempty"`

	// True/false. Set this to true if your vault
	// authentication is not able to read the data or if the endpoint does
	// not support the GET method. Setting this to true will break drift
	// detection. You should set this to true for endpoints that are
	// write-only. Defaults to false.
	// Don't attempt to read the path from Vault if true; drift won't be detected
	DisableRead *bool `json:"disableRead,omitempty" tf:"disable_read,omitempty"`

	// True/false. If set to true,
	// ignore any fields present when the endpoint is read but that were not
	// in data_json. Also, if a field that was written is not returned when
	// the endpoint is read, treat that field as being up to date. You should
	// set this to true when writing to endpoint that, when read, returns a
	// different set of fields from the ones you wrote, as is common with
	// many configuration endpoints. Defaults to false.
	// When reading, disregard fields not present in data_json
	IgnoreAbsentFields *bool `json:"ignoreAbsentFields,omitempty" tf:"ignore_absent_fields,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The full logical path at which to write the given
	// data. Consult each backend's documentation to see which endpoints
	// support the PUT methods and to determine whether they also support
	// DELETE and GET.
	// Full path where to the endpoint that will be written
	Path *string `json:"path,omitempty" tf:"path,omitempty"`

	// . A list of fields that should be returned
	// in write_data_json and write_data. If omitted, data returned by
	// the write operation is not available to the resource or included in
	// state. This helps to avoid accidental storage of sensitive values in
	// state. Some endpoints, such as many dynamic secrets endpoints, return
	// data from writing to an endpoint rather than reading it. You should
	// use write_fields if you need information returned in this way.
	// Top-level fields returned by write to persist in state
	WriteFields []*string `json:"writeFields,omitempty" tf:"write_fields,omitempty"`
}

func (*EndpointInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new EndpointInitParameters.

func (*EndpointInitParameters) DeepCopyInto added in v0.2.0

func (in *EndpointInitParameters) DeepCopyInto(out *EndpointInitParameters)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type EndpointList

type EndpointList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []Endpoint `json:"items"`
}

EndpointList contains a list of Endpoints

func (*EndpointList) DeepCopy

func (in *EndpointList) DeepCopy() *EndpointList

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new EndpointList.

func (*EndpointList) DeepCopyInto

func (in *EndpointList) DeepCopyInto(out *EndpointList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*EndpointList) DeepCopyObject

func (in *EndpointList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*EndpointList) GetItems

func (l *EndpointList) GetItems() []resource.Managed

GetItems of this EndpointList.

type EndpointObservation

type EndpointObservation struct {

	// True/false. Set this to true if your
	// vault authentication is not able to delete the data or if the endpoint
	// does not support the DELETE method. Defaults to false.
	// Don't attempt to delete the path from Vault if true
	DisableDelete *bool `json:"disableDelete,omitempty" tf:"disable_delete,omitempty"`

	// True/false. Set this to true if your vault
	// authentication is not able to read the data or if the endpoint does
	// not support the GET method. Setting this to true will break drift
	// detection. You should set this to true for endpoints that are
	// write-only. Defaults to false.
	// Don't attempt to read the path from Vault if true; drift won't be detected
	DisableRead *bool `json:"disableRead,omitempty" tf:"disable_read,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// True/false. If set to true,
	// ignore any fields present when the endpoint is read but that were not
	// in data_json. Also, if a field that was written is not returned when
	// the endpoint is read, treat that field as being up to date. You should
	// set this to true when writing to endpoint that, when read, returns a
	// different set of fields from the ones you wrote, as is common with
	// many configuration endpoints. Defaults to false.
	// When reading, disregard fields not present in data_json
	IgnoreAbsentFields *bool `json:"ignoreAbsentFields,omitempty" tf:"ignore_absent_fields,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The full logical path at which to write the given
	// data. Consult each backend's documentation to see which endpoints
	// support the PUT methods and to determine whether they also support
	// DELETE and GET.
	// Full path where to the endpoint that will be written
	Path *string `json:"path,omitempty" tf:"path,omitempty"`

	// A map whose keys are the top-level data keys
	// returned from Vault by the write operation and whose values are the
	// corresponding values. This map can only represent string data, so
	// any non-string values returned from Vault are serialized as JSON.
	// Only fields set in write_fields are present in the JSON data.
	// Map of strings returned by write operation
	WriteData map[string]*string `json:"writeData,omitempty" tf:"write_data,omitempty"`

	// The JSON data returned by the write operation.
	// Only fields set in write_fields are present in the JSON data.
	// JSON data returned by write operation
	WriteDataJSON *string `json:"writeDataJson,omitempty" tf:"write_data_json,omitempty"`

	// . A list of fields that should be returned
	// in write_data_json and write_data. If omitted, data returned by
	// the write operation is not available to the resource or included in
	// state. This helps to avoid accidental storage of sensitive values in
	// state. Some endpoints, such as many dynamic secrets endpoints, return
	// data from writing to an endpoint rather than reading it. You should
	// use write_fields if you need information returned in this way.
	// Top-level fields returned by write to persist in state
	WriteFields []*string `json:"writeFields,omitempty" tf:"write_fields,omitempty"`
}

func (*EndpointObservation) DeepCopy

func (in *EndpointObservation) DeepCopy() *EndpointObservation

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new EndpointObservation.

func (*EndpointObservation) DeepCopyInto

func (in *EndpointObservation) DeepCopyInto(out *EndpointObservation)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type EndpointParameters

type EndpointParameters struct {

	// String containing a JSON-encoded object that will be
	// written to the given path as the secret data.
	// JSON-encoded data to write.
	// +kubebuilder:validation:Optional
	DataJSONSecretRef v1.SecretKeySelector `json:"dataJsonSecretRef" tf:"-"`

	// True/false. Set this to true if your
	// vault authentication is not able to delete the data or if the endpoint
	// does not support the DELETE method. Defaults to false.
	// Don't attempt to delete the path from Vault if true
	// +kubebuilder:validation:Optional
	DisableDelete *bool `json:"disableDelete,omitempty" tf:"disable_delete,omitempty"`

	// True/false. Set this to true if your vault
	// authentication is not able to read the data or if the endpoint does
	// not support the GET method. Setting this to true will break drift
	// detection. You should set this to true for endpoints that are
	// write-only. Defaults to false.
	// Don't attempt to read the path from Vault if true; drift won't be detected
	// +kubebuilder:validation:Optional
	DisableRead *bool `json:"disableRead,omitempty" tf:"disable_read,omitempty"`

	// True/false. If set to true,
	// ignore any fields present when the endpoint is read but that were not
	// in data_json. Also, if a field that was written is not returned when
	// the endpoint is read, treat that field as being up to date. You should
	// set this to true when writing to endpoint that, when read, returns a
	// different set of fields from the ones you wrote, as is common with
	// many configuration endpoints. Defaults to false.
	// When reading, disregard fields not present in data_json
	// +kubebuilder:validation:Optional
	IgnoreAbsentFields *bool `json:"ignoreAbsentFields,omitempty" tf:"ignore_absent_fields,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The full logical path at which to write the given
	// data. Consult each backend's documentation to see which endpoints
	// support the PUT methods and to determine whether they also support
	// DELETE and GET.
	// Full path where to the endpoint that will be written
	// +kubebuilder:validation:Optional
	Path *string `json:"path,omitempty" tf:"path,omitempty"`

	// . A list of fields that should be returned
	// in write_data_json and write_data. If omitted, data returned by
	// the write operation is not available to the resource or included in
	// state. This helps to avoid accidental storage of sensitive values in
	// state. Some endpoints, such as many dynamic secrets endpoints, return
	// data from writing to an endpoint rather than reading it. You should
	// use write_fields if you need information returned in this way.
	// Top-level fields returned by write to persist in state
	// +kubebuilder:validation:Optional
	WriteFields []*string `json:"writeFields,omitempty" tf:"write_fields,omitempty"`
}

func (*EndpointParameters) DeepCopy

func (in *EndpointParameters) DeepCopy() *EndpointParameters

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new EndpointParameters.

func (*EndpointParameters) DeepCopyInto

func (in *EndpointParameters) DeepCopyInto(out *EndpointParameters)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type EndpointSpec

type EndpointSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     EndpointParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider EndpointInitParameters `json:"initProvider,omitempty"`
}

EndpointSpec defines the desired state of Endpoint

func (*EndpointSpec) DeepCopy

func (in *EndpointSpec) DeepCopy() *EndpointSpec

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new EndpointSpec.

func (*EndpointSpec) DeepCopyInto

func (in *EndpointSpec) DeepCopyInto(out *EndpointSpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type EndpointStatus

type EndpointStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        EndpointObservation `json:"atProvider,omitempty"`
}

EndpointStatus defines the observed state of Endpoint.

func (*EndpointStatus) DeepCopy

func (in *EndpointStatus) DeepCopy() *EndpointStatus

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new EndpointStatus.

func (*EndpointStatus) DeepCopyInto

func (in *EndpointStatus) DeepCopyInto(out *EndpointStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type Secret

type Secret struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.dataJsonSecretRef)",message="dataJsonSecretRef is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.path) || has(self.initProvider.path)",message="path is a required parameter"
	Spec   SecretSpec   `json:"spec"`
	Status SecretStatus `json:"status,omitempty"`
}

Secret is the Schema for the Secrets API. Writes arbitrary data to a given path in Vault +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*Secret) DeepCopy

func (in *Secret) DeepCopy() *Secret

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new Secret.

func (*Secret) DeepCopyInto

func (in *Secret) DeepCopyInto(out *Secret)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*Secret) DeepCopyObject

func (in *Secret) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*Secret) GetCondition

func (mg *Secret) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this Secret.

func (*Secret) GetConnectionDetailsMapping

func (tr *Secret) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this Secret

func (*Secret) GetDeletionPolicy

func (mg *Secret) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this Secret.

func (*Secret) GetID

func (tr *Secret) GetID() string

GetID returns ID of underlying Terraform resource of this Secret

func (*Secret) GetInitParameters added in v0.2.0

func (tr *Secret) GetInitParameters() (map[string]any, error)

GetInitParameters of this Secret

func (*Secret) GetManagementPolicies added in v0.2.0

func (mg *Secret) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this Secret.

func (*Secret) GetObservation

func (tr *Secret) GetObservation() (map[string]any, error)

GetObservation of this Secret

func (*Secret) GetParameters

func (tr *Secret) GetParameters() (map[string]any, error)

GetParameters of this Secret

func (*Secret) GetProviderConfigReference

func (mg *Secret) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this Secret.

func (*Secret) GetProviderReference

func (mg *Secret) GetProviderReference() *xpv1.Reference

GetProviderReference of this Secret. Deprecated: Use GetProviderConfigReference.

func (*Secret) GetPublishConnectionDetailsTo

func (mg *Secret) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this Secret.

func (*Secret) GetTerraformResourceType

func (mg *Secret) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this Secret

func (*Secret) GetTerraformSchemaVersion

func (tr *Secret) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*Secret) GetWriteConnectionSecretToReference

func (mg *Secret) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this Secret.

func (*Secret) LateInitialize

func (tr *Secret) LateInitialize(attrs []byte) (bool, error)

LateInitialize this Secret using its observed tfState. returns True if there are any spec changes for the resource.

func (*Secret) SetConditions

func (mg *Secret) SetConditions(c ...xpv1.Condition)

SetConditions of this Secret.

func (*Secret) SetDeletionPolicy

func (mg *Secret) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this Secret.

func (*Secret) SetManagementPolicies added in v0.2.0

func (mg *Secret) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this Secret.

func (*Secret) SetObservation

func (tr *Secret) SetObservation(obs map[string]any) error

SetObservation for this Secret

func (*Secret) SetParameters

func (tr *Secret) SetParameters(params map[string]any) error

SetParameters for this Secret

func (*Secret) SetProviderConfigReference

func (mg *Secret) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this Secret.

func (*Secret) SetProviderReference

func (mg *Secret) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this Secret. Deprecated: Use SetProviderConfigReference.

func (*Secret) SetPublishConnectionDetailsTo

func (mg *Secret) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this Secret.

func (*Secret) SetWriteConnectionSecretToReference

func (mg *Secret) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this Secret.

type SecretInitParameters added in v0.2.0

type SecretInitParameters struct {

	// true/false.  Only applicable for kv-v2 stores.
	// If set to true, permanently deletes all versions for
	// the specified key. The default behavior is to only delete the latest version of the
	// secret.
	// Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key.
	DeleteAllVersions *bool `json:"deleteAllVersions,omitempty" tf:"delete_all_versions,omitempty"`

	// true/false. Set this to true if your vault
	// authentication is not able to read the data. Setting this to true will
	// break drift detection. Defaults to false.
	// Don't attempt to read the token from Vault if true; drift won't be detected.
	DisableRead *bool `json:"disableRead,omitempty" tf:"disable_read,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The full logical path at which to write the given data.
	// To write data into the "generic" secret backend mounted in Vault by default,
	// this should be prefixed with secret/. Writing to other backends with this
	// resource is possible; consult each backend's documentation to see which
	// endpoints support the PUT and DELETE methods.
	// Full path where the generic secret will be written.
	Path *string `json:"path,omitempty" tf:"path,omitempty"`
}

func (*SecretInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretInitParameters.

func (*SecretInitParameters) DeepCopyInto added in v0.2.0

func (in *SecretInitParameters) DeepCopyInto(out *SecretInitParameters)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretList

type SecretList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []Secret `json:"items"`
}

SecretList contains a list of Secrets

func (*SecretList) DeepCopy

func (in *SecretList) DeepCopy() *SecretList

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretList.

func (*SecretList) DeepCopyInto

func (in *SecretList) DeepCopyInto(out *SecretList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretList) DeepCopyObject

func (in *SecretList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretList) GetItems

func (l *SecretList) GetItems() []resource.Managed

GetItems of this SecretList.

type SecretObservation

type SecretObservation struct {

	// true/false.  Only applicable for kv-v2 stores.
	// If set to true, permanently deletes all versions for
	// the specified key. The default behavior is to only delete the latest version of the
	// secret.
	// Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key.
	DeleteAllVersions *bool `json:"deleteAllVersions,omitempty" tf:"delete_all_versions,omitempty"`

	// true/false. Set this to true if your vault
	// authentication is not able to read the data. Setting this to true will
	// break drift detection. Defaults to false.
	// Don't attempt to read the token from Vault if true; drift won't be detected.
	DisableRead *bool `json:"disableRead,omitempty" tf:"disable_read,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The full logical path at which to write the given data.
	// To write data into the "generic" secret backend mounted in Vault by default,
	// this should be prefixed with secret/. Writing to other backends with this
	// resource is possible; consult each backend's documentation to see which
	// endpoints support the PUT and DELETE methods.
	// Full path where the generic secret will be written.
	Path *string `json:"path,omitempty" tf:"path,omitempty"`
}

func (*SecretObservation) DeepCopy

func (in *SecretObservation) DeepCopy() *SecretObservation

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretObservation.

func (*SecretObservation) DeepCopyInto

func (in *SecretObservation) DeepCopyInto(out *SecretObservation)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretParameters

type SecretParameters struct {

	// String containing a JSON-encoded object that will be
	// written as the secret data at the given path.
	// JSON-encoded secret data to write.
	// +kubebuilder:validation:Optional
	DataJSONSecretRef v1.SecretKeySelector `json:"dataJsonSecretRef" tf:"-"`

	// true/false.  Only applicable for kv-v2 stores.
	// If set to true, permanently deletes all versions for
	// the specified key. The default behavior is to only delete the latest version of the
	// secret.
	// Only applicable for kv-v2 stores. If set, permanently deletes all versions for the specified key.
	// +kubebuilder:validation:Optional
	DeleteAllVersions *bool `json:"deleteAllVersions,omitempty" tf:"delete_all_versions,omitempty"`

	// true/false. Set this to true if your vault
	// authentication is not able to read the data. Setting this to true will
	// break drift detection. Defaults to false.
	// Don't attempt to read the token from Vault if true; drift won't be detected.
	// +kubebuilder:validation:Optional
	DisableRead *bool `json:"disableRead,omitempty" tf:"disable_read,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The full logical path at which to write the given data.
	// To write data into the "generic" secret backend mounted in Vault by default,
	// this should be prefixed with secret/. Writing to other backends with this
	// resource is possible; consult each backend's documentation to see which
	// endpoints support the PUT and DELETE methods.
	// Full path where the generic secret will be written.
	// +kubebuilder:validation:Optional
	Path *string `json:"path,omitempty" tf:"path,omitempty"`
}

func (*SecretParameters) DeepCopy

func (in *SecretParameters) DeepCopy() *SecretParameters

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretParameters.

func (*SecretParameters) DeepCopyInto

func (in *SecretParameters) DeepCopyInto(out *SecretParameters)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretSpec

type SecretSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretInitParameters `json:"initProvider,omitempty"`
}

SecretSpec defines the desired state of Secret

func (*SecretSpec) DeepCopy

func (in *SecretSpec) DeepCopy() *SecretSpec

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretSpec.

func (*SecretSpec) DeepCopyInto

func (in *SecretSpec) DeepCopyInto(out *SecretSpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretStatus

type SecretStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretObservation `json:"atProvider,omitempty"`
}

SecretStatus defines the observed state of Secret.

func (*SecretStatus) DeepCopy

func (in *SecretStatus) DeepCopy() *SecretStatus

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretStatus.

func (*SecretStatus) DeepCopyInto

func (in *SecretStatus) DeepCopyInto(out *SecretStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL