v1alpha1

package
v0.4.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Feb 22, 2024 License: Apache-2.0 Imports: 9 Imported by: 0

Documentation

Overview

+kubebuilder:object:generate=true +groupName=ssh.vault.upbound.io +versionName=v1alpha1

Index

Constants

View Source
const (
	CRDGroup   = "ssh.vault.upbound.io"
	CRDVersion = "v1alpha1"
)

Package type metadata.

Variables

View Source
var (
	// CRDGroupVersion is the API Group Version used to register the objects
	CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion}

	// SchemeBuilder is used to add go types to the GroupVersionKind scheme
	SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion}

	// AddToScheme adds the types in this group-version to the given scheme.
	AddToScheme = SchemeBuilder.AddToScheme
)
View Source
var (
	SecretBackendCA_Kind             = "SecretBackendCA"
	SecretBackendCA_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendCA_Kind}.String()
	SecretBackendCA_KindAPIVersion   = SecretBackendCA_Kind + "." + CRDGroupVersion.String()
	SecretBackendCA_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendCA_Kind)
)

Repository type metadata.

View Source
var (
	SecretBackendRole_Kind             = "SecretBackendRole"
	SecretBackendRole_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendRole_Kind}.String()
	SecretBackendRole_KindAPIVersion   = SecretBackendRole_Kind + "." + CRDGroupVersion.String()
	SecretBackendRole_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendRole_Kind)
)

Repository type metadata.

Functions

This section is empty.

Types

type AllowedUserKeyConfigInitParameters added in v0.2.0

type AllowedUserKeyConfigInitParameters struct {

	// A list of allowed key lengths as integers.
	// For key types that do not support setting the length a value of [0] should be used.
	// Setting multiple lengths is only supported on Vault 1.10+. For prior releases length
	// must be set to a single element list.
	// List of allowed key lengths, vault-1.10 and above
	Lengths []*float64 `json:"lengths,omitempty" tf:"lengths,omitempty"`

	// The SSH public key type.
	// Supported key types are:
	// rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519,
	// ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
	// Key type, choices:
	// rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
	Type *string `json:"type,omitempty" tf:"type,omitempty"`
}

func (*AllowedUserKeyConfigInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AllowedUserKeyConfigInitParameters.

func (*AllowedUserKeyConfigInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AllowedUserKeyConfigObservation

type AllowedUserKeyConfigObservation struct {

	// A list of allowed key lengths as integers.
	// For key types that do not support setting the length a value of [0] should be used.
	// Setting multiple lengths is only supported on Vault 1.10+. For prior releases length
	// must be set to a single element list.
	// List of allowed key lengths, vault-1.10 and above
	Lengths []*float64 `json:"lengths,omitempty" tf:"lengths,omitempty"`

	// The SSH public key type.
	// Supported key types are:
	// rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519,
	// ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
	// Key type, choices:
	// rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
	Type *string `json:"type,omitempty" tf:"type,omitempty"`
}

func (*AllowedUserKeyConfigObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AllowedUserKeyConfigObservation.

func (*AllowedUserKeyConfigObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type AllowedUserKeyConfigParameters

type AllowedUserKeyConfigParameters struct {

	// A list of allowed key lengths as integers.
	// For key types that do not support setting the length a value of [0] should be used.
	// Setting multiple lengths is only supported on Vault 1.10+. For prior releases length
	// must be set to a single element list.
	// List of allowed key lengths, vault-1.10 and above
	// +kubebuilder:validation:Optional
	Lengths []*float64 `json:"lengths,omitempty" tf:"lengths,omitempty"`

	// The SSH public key type.
	// Supported key types are:
	// rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519,
	// ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
	// Key type, choices:
	// rsa, ecdsa, ec, dsa, ed25519, ssh-rsa, ssh-dss, ssh-ed25519, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, ecdsa-sha2-nistp521
	// +kubebuilder:validation:Optional
	Type *string `json:"type,omitempty" tf:"type,omitempty"`
}

func (*AllowedUserKeyConfigParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AllowedUserKeyConfigParameters.

func (*AllowedUserKeyConfigParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCA

type SecretBackendCA struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	Spec              SecretBackendCASpec   `json:"spec"`
	Status            SecretBackendCAStatus `json:"status,omitempty"`
}

SecretBackendCA is the Schema for the SecretBackendCAs API. Managing CA information in an SSH secret backend in Vault +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendCA) DeepCopy

func (in *SecretBackendCA) DeepCopy() *SecretBackendCA

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCA.

func (*SecretBackendCA) DeepCopyInto

func (in *SecretBackendCA) DeepCopyInto(out *SecretBackendCA)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendCA) DeepCopyObject

func (in *SecretBackendCA) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendCA) GetCondition

func (mg *SecretBackendCA) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this SecretBackendCA.

func (*SecretBackendCA) GetConnectionDetailsMapping

func (tr *SecretBackendCA) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendCA

func (*SecretBackendCA) GetDeletionPolicy

func (mg *SecretBackendCA) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendCA.

func (*SecretBackendCA) GetID

func (tr *SecretBackendCA) GetID() string

GetID returns ID of underlying Terraform resource of this SecretBackendCA

func (*SecretBackendCA) GetInitParameters added in v0.2.0

func (tr *SecretBackendCA) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendCA

func (*SecretBackendCA) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendCA) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendCA.

func (*SecretBackendCA) GetObservation

func (tr *SecretBackendCA) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendCA

func (*SecretBackendCA) GetParameters

func (tr *SecretBackendCA) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendCA

func (*SecretBackendCA) GetProviderConfigReference

func (mg *SecretBackendCA) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendCA.

func (*SecretBackendCA) GetProviderReference

func (mg *SecretBackendCA) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendCA. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendCA) GetPublishConnectionDetailsTo

func (mg *SecretBackendCA) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendCA.

func (*SecretBackendCA) GetTerraformResourceType

func (mg *SecretBackendCA) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendCA

func (*SecretBackendCA) GetTerraformSchemaVersion

func (tr *SecretBackendCA) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendCA) GetWriteConnectionSecretToReference

func (mg *SecretBackendCA) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendCA.

func (*SecretBackendCA) LateInitialize

func (tr *SecretBackendCA) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendCA using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendCA) SetConditions

func (mg *SecretBackendCA) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendCA.

func (*SecretBackendCA) SetDeletionPolicy

func (mg *SecretBackendCA) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendCA.

func (*SecretBackendCA) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendCA) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendCA.

func (*SecretBackendCA) SetObservation

func (tr *SecretBackendCA) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendCA

func (*SecretBackendCA) SetParameters

func (tr *SecretBackendCA) SetParameters(params map[string]any) error

SetParameters for this SecretBackendCA

func (*SecretBackendCA) SetProviderConfigReference

func (mg *SecretBackendCA) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendCA.

func (*SecretBackendCA) SetProviderReference

func (mg *SecretBackendCA) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendCA. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendCA) SetPublishConnectionDetailsTo

func (mg *SecretBackendCA) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendCA.

func (*SecretBackendCA) SetWriteConnectionSecretToReference

func (mg *SecretBackendCA) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendCA.

type SecretBackendCAInitParameters added in v0.2.0

type SecretBackendCAInitParameters struct {

	// The path where the SSH secret backend is mounted. Defaults to 'ssh'
	// The path of the SSH Secret Backend where the CA should be configured
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Whether Vault should generate the signing key pair internally. Defaults to true
	// Whether Vault should generate the signing key pair internally.
	GenerateSigningKey *bool `json:"generateSigningKey,omitempty" tf:"generate_signing_key,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The public key part the SSH CA key pair; required if generate_signing_key is false.
	// Public key part the SSH CA key pair; required if generate_signing_key is false.
	PublicKey *string `json:"publicKey,omitempty" tf:"public_key,omitempty"`
}

func (*SecretBackendCAInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCAInitParameters.

func (*SecretBackendCAInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCAList

type SecretBackendCAList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendCA `json:"items"`
}

SecretBackendCAList contains a list of SecretBackendCAs

func (*SecretBackendCAList) DeepCopy

func (in *SecretBackendCAList) DeepCopy() *SecretBackendCAList

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCAList.

func (*SecretBackendCAList) DeepCopyInto

func (in *SecretBackendCAList) DeepCopyInto(out *SecretBackendCAList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendCAList) DeepCopyObject

func (in *SecretBackendCAList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendCAList) GetItems

func (l *SecretBackendCAList) GetItems() []resource.Managed

GetItems of this SecretBackendCAList.

type SecretBackendCAObservation

type SecretBackendCAObservation struct {

	// The path where the SSH secret backend is mounted. Defaults to 'ssh'
	// The path of the SSH Secret Backend where the CA should be configured
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Whether Vault should generate the signing key pair internally. Defaults to true
	// Whether Vault should generate the signing key pair internally.
	GenerateSigningKey *bool `json:"generateSigningKey,omitempty" tf:"generate_signing_key,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The public key part the SSH CA key pair; required if generate_signing_key is false.
	// Public key part the SSH CA key pair; required if generate_signing_key is false.
	PublicKey *string `json:"publicKey,omitempty" tf:"public_key,omitempty"`
}

func (*SecretBackendCAObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCAObservation.

func (*SecretBackendCAObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCAParameters

type SecretBackendCAParameters struct {

	// The path where the SSH secret backend is mounted. Defaults to 'ssh'
	// The path of the SSH Secret Backend where the CA should be configured
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Whether Vault should generate the signing key pair internally. Defaults to true
	// Whether Vault should generate the signing key pair internally.
	// +kubebuilder:validation:Optional
	GenerateSigningKey *bool `json:"generateSigningKey,omitempty" tf:"generate_signing_key,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// The private key part the SSH CA key pair; required if generate_signing_key is false.
	// Private key part the SSH CA key pair; required if generate_signing_key is false.
	// +kubebuilder:validation:Optional
	PrivateKeySecretRef *v1.SecretKeySelector `json:"privateKeySecretRef,omitempty" tf:"-"`

	// The public key part the SSH CA key pair; required if generate_signing_key is false.
	// Public key part the SSH CA key pair; required if generate_signing_key is false.
	// +kubebuilder:validation:Optional
	PublicKey *string `json:"publicKey,omitempty" tf:"public_key,omitempty"`
}

func (*SecretBackendCAParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCAParameters.

func (*SecretBackendCAParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCASpec

type SecretBackendCASpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendCAParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendCAInitParameters `json:"initProvider,omitempty"`
}

SecretBackendCASpec defines the desired state of SecretBackendCA

func (*SecretBackendCASpec) DeepCopy

func (in *SecretBackendCASpec) DeepCopy() *SecretBackendCASpec

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCASpec.

func (*SecretBackendCASpec) DeepCopyInto

func (in *SecretBackendCASpec) DeepCopyInto(out *SecretBackendCASpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendCAStatus

type SecretBackendCAStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendCAObservation `json:"atProvider,omitempty"`
}

SecretBackendCAStatus defines the observed state of SecretBackendCA.

func (*SecretBackendCAStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendCAStatus.

func (*SecretBackendCAStatus) DeepCopyInto

func (in *SecretBackendCAStatus) DeepCopyInto(out *SecretBackendCAStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRole

type SecretBackendRole struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.keyType) || has(self.initProvider.keyType)",message="keyType is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || has(self.initProvider.name)",message="name is a required parameter"
	Spec   SecretBackendRoleSpec   `json:"spec"`
	Status SecretBackendRoleStatus `json:"status,omitempty"`
}

SecretBackendRole is the Schema for the SecretBackendRoles API. Managing roles in an SSH secret backend in Vault +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendRole) DeepCopy

func (in *SecretBackendRole) DeepCopy() *SecretBackendRole

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRole.

func (*SecretBackendRole) DeepCopyInto

func (in *SecretBackendRole) DeepCopyInto(out *SecretBackendRole)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendRole) DeepCopyObject

func (in *SecretBackendRole) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendRole) GetCondition

func (mg *SecretBackendRole) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this SecretBackendRole.

func (*SecretBackendRole) GetConnectionDetailsMapping

func (tr *SecretBackendRole) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendRole

func (*SecretBackendRole) GetDeletionPolicy

func (mg *SecretBackendRole) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendRole.

func (*SecretBackendRole) GetID

func (tr *SecretBackendRole) GetID() string

GetID returns ID of underlying Terraform resource of this SecretBackendRole

func (*SecretBackendRole) GetInitParameters added in v0.2.0

func (tr *SecretBackendRole) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendRole

func (*SecretBackendRole) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendRole) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendRole.

func (*SecretBackendRole) GetObservation

func (tr *SecretBackendRole) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendRole

func (*SecretBackendRole) GetParameters

func (tr *SecretBackendRole) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendRole

func (*SecretBackendRole) GetProviderConfigReference

func (mg *SecretBackendRole) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendRole.

func (*SecretBackendRole) GetProviderReference

func (mg *SecretBackendRole) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendRole. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendRole) GetPublishConnectionDetailsTo

func (mg *SecretBackendRole) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendRole.

func (*SecretBackendRole) GetTerraformResourceType

func (mg *SecretBackendRole) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendRole

func (*SecretBackendRole) GetTerraformSchemaVersion

func (tr *SecretBackendRole) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendRole) GetWriteConnectionSecretToReference

func (mg *SecretBackendRole) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendRole.

func (*SecretBackendRole) LateInitialize

func (tr *SecretBackendRole) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendRole using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendRole) SetConditions

func (mg *SecretBackendRole) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendRole.

func (*SecretBackendRole) SetDeletionPolicy

func (mg *SecretBackendRole) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendRole.

func (*SecretBackendRole) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendRole) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendRole.

func (*SecretBackendRole) SetObservation

func (tr *SecretBackendRole) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendRole

func (*SecretBackendRole) SetParameters

func (tr *SecretBackendRole) SetParameters(params map[string]any) error

SetParameters for this SecretBackendRole

func (*SecretBackendRole) SetProviderConfigReference

func (mg *SecretBackendRole) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendRole.

func (*SecretBackendRole) SetProviderReference

func (mg *SecretBackendRole) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendRole. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendRole) SetPublishConnectionDetailsTo

func (mg *SecretBackendRole) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendRole.

func (*SecretBackendRole) SetWriteConnectionSecretToReference

func (mg *SecretBackendRole) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendRole.

type SecretBackendRoleInitParameters added in v0.2.0

type SecretBackendRoleInitParameters struct {

	// When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
	AlgorithmSigner *string `json:"algorithmSigner,omitempty" tf:"algorithm_signer,omitempty"`

	// Specifies if host certificates that are requested are allowed to use the base domains listed in allowed_domains.
	AllowBareDomains *bool `json:"allowBareDomains,omitempty" tf:"allow_bare_domains,omitempty"`

	// Specifies if certificates are allowed to be signed for use as a 'host'.
	AllowHostCertificates *bool `json:"allowHostCertificates,omitempty" tf:"allow_host_certificates,omitempty"`

	// Specifies if host certificates that are requested are allowed to be subdomains of those listed in allowed_domains.
	AllowSubdomains *bool `json:"allowSubdomains,omitempty" tf:"allow_subdomains,omitempty"`

	// Specifies if certificates are allowed to be signed for use as a 'user'.
	AllowUserCertificates *bool `json:"allowUserCertificates,omitempty" tf:"allow_user_certificates,omitempty"`

	// Specifies if users can override the key ID for a signed certificate with the key_id field.
	AllowUserKeyIds *bool `json:"allowUserKeyIds,omitempty" tf:"allow_user_key_ids,omitempty"`

	// Specifies a comma-separated list of critical options that certificates can have when signed.
	AllowedCriticalOptions *string `json:"allowedCriticalOptions,omitempty" tf:"allowed_critical_options,omitempty"`

	// The list of domains for which a client can request a host certificate.
	AllowedDomains *string `json:"allowedDomains,omitempty" tf:"allowed_domains,omitempty"`

	// Specifies if allowed_domains can be declared using
	// identity template policies. Non-templated domains are also permitted.
	AllowedDomainsTemplate *bool `json:"allowedDomainsTemplate,omitempty" tf:"allowed_domains_template,omitempty"`

	// Specifies a comma-separated list of extensions that certificates can have when signed.
	AllowedExtensions *string `json:"allowedExtensions,omitempty" tf:"allowed_extensions,omitempty"`

	// Set of configuration blocks to define allowed
	// user key configuration, like key type and their lengths. Can be specified multiple times.
	// See
	// Set of allowed public key types and their relevant configuration
	AllowedUserKeyConfig []AllowedUserKeyConfigInitParameters `json:"allowedUserKeyConfig,omitempty" tf:"allowed_user_key_config,omitempty"`

	// Specifies a map of ssh key types and their expected sizes which
	// are allowed to be signed by the CA type.
	// Deprecated: use allowed_user_key_config instead
	AllowedUserKeyLengths map[string]*float64 `json:"allowedUserKeyLengths,omitempty" tf:"allowed_user_key_lengths,omitempty"`

	// Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
	AllowedUsers *string `json:"allowedUsers,omitempty" tf:"allowed_users,omitempty"`

	// Specifies if allowed_users can be declared using identity template policies. Non-templated users are also permitted.
	AllowedUsersTemplate *bool `json:"allowedUsersTemplate,omitempty" tf:"allowed_users_template,omitempty"`

	// The path where the SSH secret backend is mounted.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The comma-separated string of CIDR blocks for which this role is applicable.
	CidrList *string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"`

	// Specifies a map of critical options that certificates have when signed.
	DefaultCriticalOptions map[string]*string `json:"defaultCriticalOptions,omitempty" tf:"default_critical_options,omitempty"`

	// Specifies a map of extensions that certificates have when signed.
	DefaultExtensions map[string]*string `json:"defaultExtensions,omitempty" tf:"default_extensions,omitempty"`

	// Specifies the default username for which a credential will be generated.
	DefaultUser *string `json:"defaultUser,omitempty" tf:"default_user,omitempty"`

	// If set, default_users can be specified using identity template values. A non-templated user is also permitted.
	DefaultUserTemplate *bool `json:"defaultUserTemplate,omitempty" tf:"default_user_template,omitempty"`

	// Specifies a custom format for the key id of a signed certificate.
	KeyIDFormat *string `json:"keyIdFormat,omitempty" tf:"key_id_format,omitempty"`

	// Specifies the type of credentials generated by this role. This can be either otp, dynamic or ca.
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// Specifies the maximum Time To Live value.
	MaxTTL *string `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"`

	// Specifies the name of the role to create.
	// Unique name for the role.
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Specifies the duration by which to backdate the ValidAfter property.
	// Uses duration format strings.
	// Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
	NotBeforeDuration *string `json:"notBeforeDuration,omitempty" tf:"not_before_duration,omitempty"`

	// Specifies the Time To Live value.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`
}

func (*SecretBackendRoleInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleInitParameters.

func (*SecretBackendRoleInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRoleList

type SecretBackendRoleList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendRole `json:"items"`
}

SecretBackendRoleList contains a list of SecretBackendRoles

func (*SecretBackendRoleList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleList.

func (*SecretBackendRoleList) DeepCopyInto

func (in *SecretBackendRoleList) DeepCopyInto(out *SecretBackendRoleList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendRoleList) DeepCopyObject

func (in *SecretBackendRoleList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendRoleList) GetItems

func (l *SecretBackendRoleList) GetItems() []resource.Managed

GetItems of this SecretBackendRoleList.

type SecretBackendRoleObservation

type SecretBackendRoleObservation struct {

	// When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
	AlgorithmSigner *string `json:"algorithmSigner,omitempty" tf:"algorithm_signer,omitempty"`

	// Specifies if host certificates that are requested are allowed to use the base domains listed in allowed_domains.
	AllowBareDomains *bool `json:"allowBareDomains,omitempty" tf:"allow_bare_domains,omitempty"`

	// Specifies if certificates are allowed to be signed for use as a 'host'.
	AllowHostCertificates *bool `json:"allowHostCertificates,omitempty" tf:"allow_host_certificates,omitempty"`

	// Specifies if host certificates that are requested are allowed to be subdomains of those listed in allowed_domains.
	AllowSubdomains *bool `json:"allowSubdomains,omitempty" tf:"allow_subdomains,omitempty"`

	// Specifies if certificates are allowed to be signed for use as a 'user'.
	AllowUserCertificates *bool `json:"allowUserCertificates,omitempty" tf:"allow_user_certificates,omitempty"`

	// Specifies if users can override the key ID for a signed certificate with the key_id field.
	AllowUserKeyIds *bool `json:"allowUserKeyIds,omitempty" tf:"allow_user_key_ids,omitempty"`

	// Specifies a comma-separated list of critical options that certificates can have when signed.
	AllowedCriticalOptions *string `json:"allowedCriticalOptions,omitempty" tf:"allowed_critical_options,omitempty"`

	// The list of domains for which a client can request a host certificate.
	AllowedDomains *string `json:"allowedDomains,omitempty" tf:"allowed_domains,omitempty"`

	// Specifies if allowed_domains can be declared using
	// identity template policies. Non-templated domains are also permitted.
	AllowedDomainsTemplate *bool `json:"allowedDomainsTemplate,omitempty" tf:"allowed_domains_template,omitempty"`

	// Specifies a comma-separated list of extensions that certificates can have when signed.
	AllowedExtensions *string `json:"allowedExtensions,omitempty" tf:"allowed_extensions,omitempty"`

	// Set of configuration blocks to define allowed
	// user key configuration, like key type and their lengths. Can be specified multiple times.
	// See
	// Set of allowed public key types and their relevant configuration
	AllowedUserKeyConfig []AllowedUserKeyConfigObservation `json:"allowedUserKeyConfig,omitempty" tf:"allowed_user_key_config,omitempty"`

	// Specifies a map of ssh key types and their expected sizes which
	// are allowed to be signed by the CA type.
	// Deprecated: use allowed_user_key_config instead
	AllowedUserKeyLengths map[string]*float64 `json:"allowedUserKeyLengths,omitempty" tf:"allowed_user_key_lengths,omitempty"`

	// Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
	AllowedUsers *string `json:"allowedUsers,omitempty" tf:"allowed_users,omitempty"`

	// Specifies if allowed_users can be declared using identity template policies. Non-templated users are also permitted.
	AllowedUsersTemplate *bool `json:"allowedUsersTemplate,omitempty" tf:"allowed_users_template,omitempty"`

	// The path where the SSH secret backend is mounted.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The comma-separated string of CIDR blocks for which this role is applicable.
	CidrList *string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"`

	// Specifies a map of critical options that certificates have when signed.
	DefaultCriticalOptions map[string]*string `json:"defaultCriticalOptions,omitempty" tf:"default_critical_options,omitempty"`

	// Specifies a map of extensions that certificates have when signed.
	DefaultExtensions map[string]*string `json:"defaultExtensions,omitempty" tf:"default_extensions,omitempty"`

	// Specifies the default username for which a credential will be generated.
	DefaultUser *string `json:"defaultUser,omitempty" tf:"default_user,omitempty"`

	// If set, default_users can be specified using identity template values. A non-templated user is also permitted.
	DefaultUserTemplate *bool `json:"defaultUserTemplate,omitempty" tf:"default_user_template,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// Specifies a custom format for the key id of a signed certificate.
	KeyIDFormat *string `json:"keyIdFormat,omitempty" tf:"key_id_format,omitempty"`

	// Specifies the type of credentials generated by this role. This can be either otp, dynamic or ca.
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// Specifies the maximum Time To Live value.
	MaxTTL *string `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"`

	// Specifies the name of the role to create.
	// Unique name for the role.
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Specifies the duration by which to backdate the ValidAfter property.
	// Uses duration format strings.
	// Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
	NotBeforeDuration *string `json:"notBeforeDuration,omitempty" tf:"not_before_duration,omitempty"`

	// Specifies the Time To Live value.
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`
}

func (*SecretBackendRoleObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleObservation.

func (*SecretBackendRoleObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRoleParameters

type SecretBackendRoleParameters struct {

	// When supplied, this value specifies a signing algorithm for the key. Possible values: ssh-rsa, rsa-sha2-256, rsa-sha2-512.
	// +kubebuilder:validation:Optional
	AlgorithmSigner *string `json:"algorithmSigner,omitempty" tf:"algorithm_signer,omitempty"`

	// Specifies if host certificates that are requested are allowed to use the base domains listed in allowed_domains.
	// +kubebuilder:validation:Optional
	AllowBareDomains *bool `json:"allowBareDomains,omitempty" tf:"allow_bare_domains,omitempty"`

	// Specifies if certificates are allowed to be signed for use as a 'host'.
	// +kubebuilder:validation:Optional
	AllowHostCertificates *bool `json:"allowHostCertificates,omitempty" tf:"allow_host_certificates,omitempty"`

	// Specifies if host certificates that are requested are allowed to be subdomains of those listed in allowed_domains.
	// +kubebuilder:validation:Optional
	AllowSubdomains *bool `json:"allowSubdomains,omitempty" tf:"allow_subdomains,omitempty"`

	// Specifies if certificates are allowed to be signed for use as a 'user'.
	// +kubebuilder:validation:Optional
	AllowUserCertificates *bool `json:"allowUserCertificates,omitempty" tf:"allow_user_certificates,omitempty"`

	// Specifies if users can override the key ID for a signed certificate with the key_id field.
	// +kubebuilder:validation:Optional
	AllowUserKeyIds *bool `json:"allowUserKeyIds,omitempty" tf:"allow_user_key_ids,omitempty"`

	// Specifies a comma-separated list of critical options that certificates can have when signed.
	// +kubebuilder:validation:Optional
	AllowedCriticalOptions *string `json:"allowedCriticalOptions,omitempty" tf:"allowed_critical_options,omitempty"`

	// The list of domains for which a client can request a host certificate.
	// +kubebuilder:validation:Optional
	AllowedDomains *string `json:"allowedDomains,omitempty" tf:"allowed_domains,omitempty"`

	// Specifies if allowed_domains can be declared using
	// identity template policies. Non-templated domains are also permitted.
	// +kubebuilder:validation:Optional
	AllowedDomainsTemplate *bool `json:"allowedDomainsTemplate,omitempty" tf:"allowed_domains_template,omitempty"`

	// Specifies a comma-separated list of extensions that certificates can have when signed.
	// +kubebuilder:validation:Optional
	AllowedExtensions *string `json:"allowedExtensions,omitempty" tf:"allowed_extensions,omitempty"`

	// Set of configuration blocks to define allowed
	// user key configuration, like key type and their lengths. Can be specified multiple times.
	// See
	// Set of allowed public key types and their relevant configuration
	// +kubebuilder:validation:Optional
	AllowedUserKeyConfig []AllowedUserKeyConfigParameters `json:"allowedUserKeyConfig,omitempty" tf:"allowed_user_key_config,omitempty"`

	// Specifies a map of ssh key types and their expected sizes which
	// are allowed to be signed by the CA type.
	// Deprecated: use allowed_user_key_config instead
	// +kubebuilder:validation:Optional
	AllowedUserKeyLengths map[string]*float64 `json:"allowedUserKeyLengths,omitempty" tf:"allowed_user_key_lengths,omitempty"`

	// Specifies a comma-separated list of usernames that are to be allowed, only if certain usernames are to be allowed.
	// +kubebuilder:validation:Optional
	AllowedUsers *string `json:"allowedUsers,omitempty" tf:"allowed_users,omitempty"`

	// Specifies if allowed_users can be declared using identity template policies. Non-templated users are also permitted.
	// +kubebuilder:validation:Optional
	AllowedUsersTemplate *bool `json:"allowedUsersTemplate,omitempty" tf:"allowed_users_template,omitempty"`

	// The path where the SSH secret backend is mounted.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// The comma-separated string of CIDR blocks for which this role is applicable.
	// +kubebuilder:validation:Optional
	CidrList *string `json:"cidrList,omitempty" tf:"cidr_list,omitempty"`

	// Specifies a map of critical options that certificates have when signed.
	// +kubebuilder:validation:Optional
	DefaultCriticalOptions map[string]*string `json:"defaultCriticalOptions,omitempty" tf:"default_critical_options,omitempty"`

	// Specifies a map of extensions that certificates have when signed.
	// +kubebuilder:validation:Optional
	DefaultExtensions map[string]*string `json:"defaultExtensions,omitempty" tf:"default_extensions,omitempty"`

	// Specifies the default username for which a credential will be generated.
	// +kubebuilder:validation:Optional
	DefaultUser *string `json:"defaultUser,omitempty" tf:"default_user,omitempty"`

	// If set, default_users can be specified using identity template values. A non-templated user is also permitted.
	// +kubebuilder:validation:Optional
	DefaultUserTemplate *bool `json:"defaultUserTemplate,omitempty" tf:"default_user_template,omitempty"`

	// Specifies a custom format for the key id of a signed certificate.
	// +kubebuilder:validation:Optional
	KeyIDFormat *string `json:"keyIdFormat,omitempty" tf:"key_id_format,omitempty"`

	// Specifies the type of credentials generated by this role. This can be either otp, dynamic or ca.
	// +kubebuilder:validation:Optional
	KeyType *string `json:"keyType,omitempty" tf:"key_type,omitempty"`

	// Specifies the maximum Time To Live value.
	// +kubebuilder:validation:Optional
	MaxTTL *string `json:"maxTtl,omitempty" tf:"max_ttl,omitempty"`

	// Specifies the name of the role to create.
	// Unique name for the role.
	// +kubebuilder:validation:Optional
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Specifies the duration by which to backdate the ValidAfter property.
	// Uses duration format strings.
	// Specifies the duration by which to backdate the ValidAfter property. Uses duration format strings.
	// +kubebuilder:validation:Optional
	NotBeforeDuration *string `json:"notBeforeDuration,omitempty" tf:"not_before_duration,omitempty"`

	// Specifies the Time To Live value.
	// +kubebuilder:validation:Optional
	TTL *string `json:"ttl,omitempty" tf:"ttl,omitempty"`
}

func (*SecretBackendRoleParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleParameters.

func (*SecretBackendRoleParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRoleSpec

type SecretBackendRoleSpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendRoleParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendRoleInitParameters `json:"initProvider,omitempty"`
}

SecretBackendRoleSpec defines the desired state of SecretBackendRole

func (*SecretBackendRoleSpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleSpec.

func (*SecretBackendRoleSpec) DeepCopyInto

func (in *SecretBackendRoleSpec) DeepCopyInto(out *SecretBackendRoleSpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendRoleStatus

type SecretBackendRoleStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendRoleObservation `json:"atProvider,omitempty"`
}

SecretBackendRoleStatus defines the observed state of SecretBackendRole.

func (*SecretBackendRoleStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendRoleStatus.

func (*SecretBackendRoleStatus) DeepCopyInto

func (in *SecretBackendRoleStatus) DeepCopyInto(out *SecretBackendRoleStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL