v1alpha1

package
v0.4.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Feb 22, 2024 License: Apache-2.0 Imports: 9 Imported by: 0

Documentation

Overview

+kubebuilder:object:generate=true +groupName=transit.vault.upbound.io +versionName=v1alpha1

Index

Constants

View Source
const (
	CRDGroup   = "transit.vault.upbound.io"
	CRDVersion = "v1alpha1"
)

Package type metadata.

Variables

View Source
var (
	// CRDGroupVersion is the API Group Version used to register the objects
	CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion}

	// SchemeBuilder is used to add go types to the GroupVersionKind scheme
	SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion}

	// AddToScheme adds the types in this group-version to the given scheme.
	AddToScheme = SchemeBuilder.AddToScheme
)
View Source
var (
	SecretBackendKey_Kind             = "SecretBackendKey"
	SecretBackendKey_GroupKind        = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendKey_Kind}.String()
	SecretBackendKey_KindAPIVersion   = SecretBackendKey_Kind + "." + CRDGroupVersion.String()
	SecretBackendKey_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendKey_Kind)
)

Repository type metadata.

Functions

This section is empty.

Types

type SecretBackendKey

type SecretBackendKey struct {
	metav1.TypeMeta   `json:",inline"`
	metav1.ObjectMeta `json:"metadata,omitempty"`
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
	// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || has(self.initProvider.name)",message="name is a required parameter"
	Spec   SecretBackendKeySpec   `json:"spec"`
	Status SecretBackendKeyStatus `json:"status,omitempty"`
}

SecretBackendKey is the Schema for the SecretBackendKeys API. Create an Encryption Keyring on a Transit Secret Backend for Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}

func (*SecretBackendKey) DeepCopy

func (in *SecretBackendKey) DeepCopy() *SecretBackendKey

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKey.

func (*SecretBackendKey) DeepCopyInto

func (in *SecretBackendKey) DeepCopyInto(out *SecretBackendKey)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendKey) DeepCopyObject

func (in *SecretBackendKey) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendKey) GetCondition

func (mg *SecretBackendKey) GetCondition(ct xpv1.ConditionType) xpv1.Condition

GetCondition of this SecretBackendKey.

func (*SecretBackendKey) GetConnectionDetailsMapping

func (tr *SecretBackendKey) GetConnectionDetailsMapping() map[string]string

GetConnectionDetailsMapping for this SecretBackendKey

func (*SecretBackendKey) GetDeletionPolicy

func (mg *SecretBackendKey) GetDeletionPolicy() xpv1.DeletionPolicy

GetDeletionPolicy of this SecretBackendKey.

func (*SecretBackendKey) GetID

func (tr *SecretBackendKey) GetID() string

GetID returns ID of underlying Terraform resource of this SecretBackendKey

func (*SecretBackendKey) GetInitParameters added in v0.2.0

func (tr *SecretBackendKey) GetInitParameters() (map[string]any, error)

GetInitParameters of this SecretBackendKey

func (*SecretBackendKey) GetManagementPolicies added in v0.2.0

func (mg *SecretBackendKey) GetManagementPolicies() xpv1.ManagementPolicies

GetManagementPolicies of this SecretBackendKey.

func (*SecretBackendKey) GetObservation

func (tr *SecretBackendKey) GetObservation() (map[string]any, error)

GetObservation of this SecretBackendKey

func (*SecretBackendKey) GetParameters

func (tr *SecretBackendKey) GetParameters() (map[string]any, error)

GetParameters of this SecretBackendKey

func (*SecretBackendKey) GetProviderConfigReference

func (mg *SecretBackendKey) GetProviderConfigReference() *xpv1.Reference

GetProviderConfigReference of this SecretBackendKey.

func (*SecretBackendKey) GetProviderReference

func (mg *SecretBackendKey) GetProviderReference() *xpv1.Reference

GetProviderReference of this SecretBackendKey. Deprecated: Use GetProviderConfigReference.

func (*SecretBackendKey) GetPublishConnectionDetailsTo

func (mg *SecretBackendKey) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo

GetPublishConnectionDetailsTo of this SecretBackendKey.

func (*SecretBackendKey) GetTerraformResourceType

func (mg *SecretBackendKey) GetTerraformResourceType() string

GetTerraformResourceType returns Terraform resource type for this SecretBackendKey

func (*SecretBackendKey) GetTerraformSchemaVersion

func (tr *SecretBackendKey) GetTerraformSchemaVersion() int

GetTerraformSchemaVersion returns the associated Terraform schema version

func (*SecretBackendKey) GetWriteConnectionSecretToReference

func (mg *SecretBackendKey) GetWriteConnectionSecretToReference() *xpv1.SecretReference

GetWriteConnectionSecretToReference of this SecretBackendKey.

func (*SecretBackendKey) LateInitialize

func (tr *SecretBackendKey) LateInitialize(attrs []byte) (bool, error)

LateInitialize this SecretBackendKey using its observed tfState. returns True if there are any spec changes for the resource.

func (*SecretBackendKey) SetConditions

func (mg *SecretBackendKey) SetConditions(c ...xpv1.Condition)

SetConditions of this SecretBackendKey.

func (*SecretBackendKey) SetDeletionPolicy

func (mg *SecretBackendKey) SetDeletionPolicy(r xpv1.DeletionPolicy)

SetDeletionPolicy of this SecretBackendKey.

func (*SecretBackendKey) SetManagementPolicies added in v0.2.0

func (mg *SecretBackendKey) SetManagementPolicies(r xpv1.ManagementPolicies)

SetManagementPolicies of this SecretBackendKey.

func (*SecretBackendKey) SetObservation

func (tr *SecretBackendKey) SetObservation(obs map[string]any) error

SetObservation for this SecretBackendKey

func (*SecretBackendKey) SetParameters

func (tr *SecretBackendKey) SetParameters(params map[string]any) error

SetParameters for this SecretBackendKey

func (*SecretBackendKey) SetProviderConfigReference

func (mg *SecretBackendKey) SetProviderConfigReference(r *xpv1.Reference)

SetProviderConfigReference of this SecretBackendKey.

func (*SecretBackendKey) SetProviderReference

func (mg *SecretBackendKey) SetProviderReference(r *xpv1.Reference)

SetProviderReference of this SecretBackendKey. Deprecated: Use SetProviderConfigReference.

func (*SecretBackendKey) SetPublishConnectionDetailsTo

func (mg *SecretBackendKey) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)

SetPublishConnectionDetailsTo of this SecretBackendKey.

func (*SecretBackendKey) SetWriteConnectionSecretToReference

func (mg *SecretBackendKey) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)

SetWriteConnectionSecretToReference of this SecretBackendKey.

type SecretBackendKeyInitParameters added in v0.2.0

type SecretBackendKeyInitParameters struct {

	// Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
	// If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled.
	AllowPlaintextBackup *bool `json:"allowPlaintextBackup,omitempty" tf:"allow_plaintext_backup,omitempty"`

	// Replaced by auto_rotate_period.
	// Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
	AutoRotateInterval *float64 `json:"autoRotateInterval,omitempty" tf:"auto_rotate_interval,omitempty"`

	// Amount of seconds the key should live before being automatically rotated.
	// A value of 0 disables automatic rotation for the key.
	// Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
	AutoRotatePeriod *float64 `json:"autoRotatePeriod,omitempty" tf:"auto_rotate_period,omitempty"`

	// The path the transit secret backend is mounted at, with no leading or trailing /s.
	// The Transit secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
	// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
	ConvergentEncryption *bool `json:"convergentEncryption,omitempty" tf:"convergent_encryption,omitempty"`

	// Specifies if the keyring is allowed to be deleted.
	// Specifies if the key is allowed to be deleted.
	DeletionAllowed *bool `json:"deletionAllowed,omitempty" tf:"deletion_allowed,omitempty"`

	// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
	// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
	Derived *bool `json:"derived,omitempty" tf:"derived,omitempty"`

	// Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
	// Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled.
	Exportable *bool `json:"exportable,omitempty" tf:"exportable,omitempty"`

	// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
	// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512.
	KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"`

	// Minimum key version to use for decryption.
	// Minimum key version to use for decryption.
	MinDecryptionVersion *float64 `json:"minDecryptionVersion,omitempty" tf:"min_decryption_version,omitempty"`

	// Minimum key version to use for encryption
	// Minimum key version to use for encryption
	MinEncryptionVersion *float64 `json:"minEncryptionVersion,omitempty" tf:"min_encryption_version,omitempty"`

	// The name to identify this key within the backend. Must be unique within the backend.
	// Name of the encryption key to create.
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072 and rsa-4096.
	// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096
	Type *string `json:"type,omitempty" tf:"type,omitempty"`
}

func (*SecretBackendKeyInitParameters) DeepCopy added in v0.2.0

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyInitParameters.

func (*SecretBackendKeyInitParameters) DeepCopyInto added in v0.2.0

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendKeyList

type SecretBackendKeyList struct {
	metav1.TypeMeta `json:",inline"`
	metav1.ListMeta `json:"metadata,omitempty"`
	Items           []SecretBackendKey `json:"items"`
}

SecretBackendKeyList contains a list of SecretBackendKeys

func (*SecretBackendKeyList) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyList.

func (*SecretBackendKeyList) DeepCopyInto

func (in *SecretBackendKeyList) DeepCopyInto(out *SecretBackendKeyList)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

func (*SecretBackendKeyList) DeepCopyObject

func (in *SecretBackendKeyList) DeepCopyObject() runtime.Object

DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.

func (*SecretBackendKeyList) GetItems

func (l *SecretBackendKeyList) GetItems() []resource.Managed

GetItems of this SecretBackendKeyList.

type SecretBackendKeyObservation

type SecretBackendKeyObservation struct {

	// Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
	// If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled.
	AllowPlaintextBackup *bool `json:"allowPlaintextBackup,omitempty" tf:"allow_plaintext_backup,omitempty"`

	// Replaced by auto_rotate_period.
	// Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
	AutoRotateInterval *float64 `json:"autoRotateInterval,omitempty" tf:"auto_rotate_interval,omitempty"`

	// Amount of seconds the key should live before being automatically rotated.
	// A value of 0 disables automatic rotation for the key.
	// Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
	AutoRotatePeriod *float64 `json:"autoRotatePeriod,omitempty" tf:"auto_rotate_period,omitempty"`

	// The path the transit secret backend is mounted at, with no leading or trailing /s.
	// The Transit secret backend the resource belongs to.
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
	// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
	ConvergentEncryption *bool `json:"convergentEncryption,omitempty" tf:"convergent_encryption,omitempty"`

	// Specifies if the keyring is allowed to be deleted.
	// Specifies if the key is allowed to be deleted.
	DeletionAllowed *bool `json:"deletionAllowed,omitempty" tf:"deletion_allowed,omitempty"`

	// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
	// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
	Derived *bool `json:"derived,omitempty" tf:"derived,omitempty"`

	// Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
	// Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled.
	Exportable *bool `json:"exportable,omitempty" tf:"exportable,omitempty"`

	ID *string `json:"id,omitempty" tf:"id,omitempty"`

	// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
	// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512.
	KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"`

	// List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the type of the encryption key.
	// List of key versions in the keyring.
	Keys []map[string]*string `json:"keys,omitempty" tf:"keys,omitempty"`

	// Latest key version available. This value is 1-indexed, so if latest_version is 1, then the key's information can be referenced from keys by selecting element 0
	// Latest key version in use in the keyring
	LatestVersion *float64 `json:"latestVersion,omitempty" tf:"latest_version,omitempty"`

	// Minimum key version available for use. If keys have been archived by increasing min_decryption_version, this attribute will reflect that change.
	// Minimum key version available for use.
	MinAvailableVersion *float64 `json:"minAvailableVersion,omitempty" tf:"min_available_version,omitempty"`

	// Minimum key version to use for decryption.
	// Minimum key version to use for decryption.
	MinDecryptionVersion *float64 `json:"minDecryptionVersion,omitempty" tf:"min_decryption_version,omitempty"`

	// Minimum key version to use for encryption
	// Minimum key version to use for encryption
	MinEncryptionVersion *float64 `json:"minEncryptionVersion,omitempty" tf:"min_encryption_version,omitempty"`

	// The name to identify this key within the backend. Must be unique within the backend.
	// Name of the encryption key to create.
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Whether or not the key supports decryption, based on key type.
	// Whether or not the key supports decryption, based on key type.
	SupportsDecryption *bool `json:"supportsDecryption,omitempty" tf:"supports_decryption,omitempty"`

	// Whether or not the key supports derivation, based on key type.
	// Whether or not the key supports derivation, based on key type.
	SupportsDerivation *bool `json:"supportsDerivation,omitempty" tf:"supports_derivation,omitempty"`

	// Whether or not the key supports encryption, based on key type.
	// Whether or not the key supports encryption, based on key type.
	SupportsEncryption *bool `json:"supportsEncryption,omitempty" tf:"supports_encryption,omitempty"`

	// Whether or not the key supports signing, based on key type.
	// Whether or not the key supports signing, based on key type.
	SupportsSigning *bool `json:"supportsSigning,omitempty" tf:"supports_signing,omitempty"`

	// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072 and rsa-4096.
	// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096
	Type *string `json:"type,omitempty" tf:"type,omitempty"`
}

func (*SecretBackendKeyObservation) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyObservation.

func (*SecretBackendKeyObservation) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendKeyParameters

type SecretBackendKeyParameters struct {

	// Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
	// If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled.
	// +kubebuilder:validation:Optional
	AllowPlaintextBackup *bool `json:"allowPlaintextBackup,omitempty" tf:"allow_plaintext_backup,omitempty"`

	// Replaced by auto_rotate_period.
	// Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
	// +kubebuilder:validation:Optional
	AutoRotateInterval *float64 `json:"autoRotateInterval,omitempty" tf:"auto_rotate_interval,omitempty"`

	// Amount of seconds the key should live before being automatically rotated.
	// A value of 0 disables automatic rotation for the key.
	// Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
	// +kubebuilder:validation:Optional
	AutoRotatePeriod *float64 `json:"autoRotatePeriod,omitempty" tf:"auto_rotate_period,omitempty"`

	// The path the transit secret backend is mounted at, with no leading or trailing /s.
	// The Transit secret backend the resource belongs to.
	// +kubebuilder:validation:Optional
	Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`

	// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
	// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
	// +kubebuilder:validation:Optional
	ConvergentEncryption *bool `json:"convergentEncryption,omitempty" tf:"convergent_encryption,omitempty"`

	// Specifies if the keyring is allowed to be deleted.
	// Specifies if the key is allowed to be deleted.
	// +kubebuilder:validation:Optional
	DeletionAllowed *bool `json:"deletionAllowed,omitempty" tf:"deletion_allowed,omitempty"`

	// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
	// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
	// +kubebuilder:validation:Optional
	Derived *bool `json:"derived,omitempty" tf:"derived,omitempty"`

	// Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
	// Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled.
	// +kubebuilder:validation:Optional
	Exportable *bool `json:"exportable,omitempty" tf:"exportable,omitempty"`

	// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
	// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512.
	// +kubebuilder:validation:Optional
	KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"`

	// Minimum key version to use for decryption.
	// Minimum key version to use for decryption.
	// +kubebuilder:validation:Optional
	MinDecryptionVersion *float64 `json:"minDecryptionVersion,omitempty" tf:"min_decryption_version,omitempty"`

	// Minimum key version to use for encryption
	// Minimum key version to use for encryption
	// +kubebuilder:validation:Optional
	MinEncryptionVersion *float64 `json:"minEncryptionVersion,omitempty" tf:"min_encryption_version,omitempty"`

	// The name to identify this key within the backend. Must be unique within the backend.
	// Name of the encryption key to create.
	// +kubebuilder:validation:Optional
	Name *string `json:"name,omitempty" tf:"name,omitempty"`

	// The namespace to provision the resource in.
	// The value should not contain leading or trailing forward slashes.
	// The namespace is always relative to the provider's configured namespace.
	// Available only for Vault Enterprise.
	// Target namespace. (requires Enterprise)
	// +kubebuilder:validation:Optional
	Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`

	// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072 and rsa-4096.
	// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096
	// +kubebuilder:validation:Optional
	Type *string `json:"type,omitempty" tf:"type,omitempty"`
}

func (*SecretBackendKeyParameters) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyParameters.

func (*SecretBackendKeyParameters) DeepCopyInto

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendKeySpec

type SecretBackendKeySpec struct {
	v1.ResourceSpec `json:",inline"`
	ForProvider     SecretBackendKeyParameters `json:"forProvider"`
	// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
	// unless the relevant Crossplane feature flag is enabled, and may be
	// changed or removed without notice.
	// InitProvider holds the same fields as ForProvider, with the exception
	// of Identifier and other resource reference fields. The fields that are
	// in InitProvider are merged into ForProvider when the resource is created.
	// The same fields are also added to the terraform ignore_changes hook, to
	// avoid updating them after creation. This is useful for fields that are
	// required on creation, but we do not desire to update them after creation,
	// for example because of an external controller is managing them, like an
	// autoscaler.
	InitProvider SecretBackendKeyInitParameters `json:"initProvider,omitempty"`
}

SecretBackendKeySpec defines the desired state of SecretBackendKey

func (*SecretBackendKeySpec) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeySpec.

func (*SecretBackendKeySpec) DeepCopyInto

func (in *SecretBackendKeySpec) DeepCopyInto(out *SecretBackendKeySpec)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

type SecretBackendKeyStatus

type SecretBackendKeyStatus struct {
	v1.ResourceStatus `json:",inline"`
	AtProvider        SecretBackendKeyObservation `json:"atProvider,omitempty"`
}

SecretBackendKeyStatus defines the observed state of SecretBackendKey.

func (*SecretBackendKeyStatus) DeepCopy

DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyStatus.

func (*SecretBackendKeyStatus) DeepCopyInto

func (in *SecretBackendKeyStatus) DeepCopyInto(out *SecretBackendKeyStatus)

DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL