Documentation
¶
Overview ¶
+kubebuilder:object:generate=true +groupName=transit.vault.upbound.io +versionName=v1alpha1
Index ¶
- Constants
- Variables
- type SecretBackendKey
- func (in *SecretBackendKey) DeepCopy() *SecretBackendKey
- func (in *SecretBackendKey) DeepCopyInto(out *SecretBackendKey)
- func (in *SecretBackendKey) DeepCopyObject() runtime.Object
- func (mg *SecretBackendKey) GetCondition(ct xpv1.ConditionType) xpv1.Condition
- func (tr *SecretBackendKey) GetConnectionDetailsMapping() map[string]string
- func (mg *SecretBackendKey) GetDeletionPolicy() xpv1.DeletionPolicy
- func (tr *SecretBackendKey) GetID() string
- func (tr *SecretBackendKey) GetInitParameters() (map[string]any, error)
- func (mg *SecretBackendKey) GetManagementPolicies() xpv1.ManagementPolicies
- func (tr *SecretBackendKey) GetObservation() (map[string]any, error)
- func (tr *SecretBackendKey) GetParameters() (map[string]any, error)
- func (mg *SecretBackendKey) GetProviderConfigReference() *xpv1.Reference
- func (mg *SecretBackendKey) GetProviderReference() *xpv1.Reference
- func (mg *SecretBackendKey) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
- func (mg *SecretBackendKey) GetTerraformResourceType() string
- func (tr *SecretBackendKey) GetTerraformSchemaVersion() int
- func (mg *SecretBackendKey) GetWriteConnectionSecretToReference() *xpv1.SecretReference
- func (tr *SecretBackendKey) LateInitialize(attrs []byte) (bool, error)
- func (mg *SecretBackendKey) SetConditions(c ...xpv1.Condition)
- func (mg *SecretBackendKey) SetDeletionPolicy(r xpv1.DeletionPolicy)
- func (mg *SecretBackendKey) SetManagementPolicies(r xpv1.ManagementPolicies)
- func (tr *SecretBackendKey) SetObservation(obs map[string]any) error
- func (tr *SecretBackendKey) SetParameters(params map[string]any) error
- func (mg *SecretBackendKey) SetProviderConfigReference(r *xpv1.Reference)
- func (mg *SecretBackendKey) SetProviderReference(r *xpv1.Reference)
- func (mg *SecretBackendKey) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
- func (mg *SecretBackendKey) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
- type SecretBackendKeyInitParameters
- type SecretBackendKeyList
- type SecretBackendKeyObservation
- type SecretBackendKeyParameters
- type SecretBackendKeySpec
- type SecretBackendKeyStatus
Constants ¶
const ( CRDGroup = "transit.vault.upbound.io" CRDVersion = "v1alpha1" )
Package type metadata.
Variables ¶
var ( // CRDGroupVersion is the API Group Version used to register the objects CRDGroupVersion = schema.GroupVersion{Group: CRDGroup, Version: CRDVersion} // SchemeBuilder is used to add go types to the GroupVersionKind scheme SchemeBuilder = &scheme.Builder{GroupVersion: CRDGroupVersion} // AddToScheme adds the types in this group-version to the given scheme. AddToScheme = SchemeBuilder.AddToScheme )
var ( SecretBackendKey_Kind = "SecretBackendKey" SecretBackendKey_GroupKind = schema.GroupKind{Group: CRDGroup, Kind: SecretBackendKey_Kind}.String() SecretBackendKey_KindAPIVersion = SecretBackendKey_Kind + "." + CRDGroupVersion.String() SecretBackendKey_GroupVersionKind = CRDGroupVersion.WithKind(SecretBackendKey_Kind) )
Repository type metadata.
Functions ¶
This section is empty.
Types ¶
type SecretBackendKey ¶
type SecretBackendKey struct {
metav1.TypeMeta `json:",inline"`
metav1.ObjectMeta `json:"metadata,omitempty"`
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.backend) || has(self.initProvider.backend)",message="backend is a required parameter"
// +kubebuilder:validation:XValidation:rule="!('*' in self.managementPolicies || 'Create' in self.managementPolicies || 'Update' in self.managementPolicies) || has(self.forProvider.name) || has(self.initProvider.name)",message="name is a required parameter"
Spec SecretBackendKeySpec `json:"spec"`
Status SecretBackendKeyStatus `json:"status,omitempty"`
}
SecretBackendKey is the Schema for the SecretBackendKeys API. Create an Encryption Keyring on a Transit Secret Backend for Vault. +kubebuilder:printcolumn:name="READY",type="string",JSONPath=".status.conditions[?(@.type=='Ready')].status" +kubebuilder:printcolumn:name="SYNCED",type="string",JSONPath=".status.conditions[?(@.type=='Synced')].status" +kubebuilder:printcolumn:name="EXTERNAL-NAME",type="string",JSONPath=".metadata.annotations.crossplane\\.io/external-name" +kubebuilder:printcolumn:name="AGE",type="date",JSONPath=".metadata.creationTimestamp" +kubebuilder:subresource:status +kubebuilder:resource:scope=Cluster,categories={crossplane,managed,vault}
func (*SecretBackendKey) DeepCopy ¶
func (in *SecretBackendKey) DeepCopy() *SecretBackendKey
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKey.
func (*SecretBackendKey) DeepCopyInto ¶
func (in *SecretBackendKey) DeepCopyInto(out *SecretBackendKey)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendKey) DeepCopyObject ¶
func (in *SecretBackendKey) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendKey) GetCondition ¶
func (mg *SecretBackendKey) GetCondition(ct xpv1.ConditionType) xpv1.Condition
GetCondition of this SecretBackendKey.
func (*SecretBackendKey) GetConnectionDetailsMapping ¶
func (tr *SecretBackendKey) GetConnectionDetailsMapping() map[string]string
GetConnectionDetailsMapping for this SecretBackendKey
func (*SecretBackendKey) GetDeletionPolicy ¶
func (mg *SecretBackendKey) GetDeletionPolicy() xpv1.DeletionPolicy
GetDeletionPolicy of this SecretBackendKey.
func (*SecretBackendKey) GetID ¶
func (tr *SecretBackendKey) GetID() string
GetID returns ID of underlying Terraform resource of this SecretBackendKey
func (*SecretBackendKey) GetInitParameters ¶ added in v0.2.0
func (tr *SecretBackendKey) GetInitParameters() (map[string]any, error)
GetInitParameters of this SecretBackendKey
func (*SecretBackendKey) GetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackendKey) GetManagementPolicies() xpv1.ManagementPolicies
GetManagementPolicies of this SecretBackendKey.
func (*SecretBackendKey) GetObservation ¶
func (tr *SecretBackendKey) GetObservation() (map[string]any, error)
GetObservation of this SecretBackendKey
func (*SecretBackendKey) GetParameters ¶
func (tr *SecretBackendKey) GetParameters() (map[string]any, error)
GetParameters of this SecretBackendKey
func (*SecretBackendKey) GetProviderConfigReference ¶
func (mg *SecretBackendKey) GetProviderConfigReference() *xpv1.Reference
GetProviderConfigReference of this SecretBackendKey.
func (*SecretBackendKey) GetProviderReference ¶
func (mg *SecretBackendKey) GetProviderReference() *xpv1.Reference
GetProviderReference of this SecretBackendKey. Deprecated: Use GetProviderConfigReference.
func (*SecretBackendKey) GetPublishConnectionDetailsTo ¶
func (mg *SecretBackendKey) GetPublishConnectionDetailsTo() *xpv1.PublishConnectionDetailsTo
GetPublishConnectionDetailsTo of this SecretBackendKey.
func (*SecretBackendKey) GetTerraformResourceType ¶
func (mg *SecretBackendKey) GetTerraformResourceType() string
GetTerraformResourceType returns Terraform resource type for this SecretBackendKey
func (*SecretBackendKey) GetTerraformSchemaVersion ¶
func (tr *SecretBackendKey) GetTerraformSchemaVersion() int
GetTerraformSchemaVersion returns the associated Terraform schema version
func (*SecretBackendKey) GetWriteConnectionSecretToReference ¶
func (mg *SecretBackendKey) GetWriteConnectionSecretToReference() *xpv1.SecretReference
GetWriteConnectionSecretToReference of this SecretBackendKey.
func (*SecretBackendKey) LateInitialize ¶
func (tr *SecretBackendKey) LateInitialize(attrs []byte) (bool, error)
LateInitialize this SecretBackendKey using its observed tfState. returns True if there are any spec changes for the resource.
func (*SecretBackendKey) SetConditions ¶
func (mg *SecretBackendKey) SetConditions(c ...xpv1.Condition)
SetConditions of this SecretBackendKey.
func (*SecretBackendKey) SetDeletionPolicy ¶
func (mg *SecretBackendKey) SetDeletionPolicy(r xpv1.DeletionPolicy)
SetDeletionPolicy of this SecretBackendKey.
func (*SecretBackendKey) SetManagementPolicies ¶ added in v0.2.0
func (mg *SecretBackendKey) SetManagementPolicies(r xpv1.ManagementPolicies)
SetManagementPolicies of this SecretBackendKey.
func (*SecretBackendKey) SetObservation ¶
func (tr *SecretBackendKey) SetObservation(obs map[string]any) error
SetObservation for this SecretBackendKey
func (*SecretBackendKey) SetParameters ¶
func (tr *SecretBackendKey) SetParameters(params map[string]any) error
SetParameters for this SecretBackendKey
func (*SecretBackendKey) SetProviderConfigReference ¶
func (mg *SecretBackendKey) SetProviderConfigReference(r *xpv1.Reference)
SetProviderConfigReference of this SecretBackendKey.
func (*SecretBackendKey) SetProviderReference ¶
func (mg *SecretBackendKey) SetProviderReference(r *xpv1.Reference)
SetProviderReference of this SecretBackendKey. Deprecated: Use SetProviderConfigReference.
func (*SecretBackendKey) SetPublishConnectionDetailsTo ¶
func (mg *SecretBackendKey) SetPublishConnectionDetailsTo(r *xpv1.PublishConnectionDetailsTo)
SetPublishConnectionDetailsTo of this SecretBackendKey.
func (*SecretBackendKey) SetWriteConnectionSecretToReference ¶
func (mg *SecretBackendKey) SetWriteConnectionSecretToReference(r *xpv1.SecretReference)
SetWriteConnectionSecretToReference of this SecretBackendKey.
type SecretBackendKeyInitParameters ¶ added in v0.2.0
type SecretBackendKeyInitParameters struct {
// Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
// If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled.
AllowPlaintextBackup *bool `json:"allowPlaintextBackup,omitempty" tf:"allow_plaintext_backup,omitempty"`
// Replaced by auto_rotate_period.
// Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
AutoRotateInterval *float64 `json:"autoRotateInterval,omitempty" tf:"auto_rotate_interval,omitempty"`
// Amount of seconds the key should live before being automatically rotated.
// A value of 0 disables automatic rotation for the key.
// Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
AutoRotatePeriod *float64 `json:"autoRotatePeriod,omitempty" tf:"auto_rotate_period,omitempty"`
// The path the transit secret backend is mounted at, with no leading or trailing /s.
// The Transit secret backend the resource belongs to.
Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`
// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
ConvergentEncryption *bool `json:"convergentEncryption,omitempty" tf:"convergent_encryption,omitempty"`
// Specifies if the keyring is allowed to be deleted.
// Specifies if the key is allowed to be deleted.
DeletionAllowed *bool `json:"deletionAllowed,omitempty" tf:"deletion_allowed,omitempty"`
// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
Derived *bool `json:"derived,omitempty" tf:"derived,omitempty"`
// Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
// Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled.
Exportable *bool `json:"exportable,omitempty" tf:"exportable,omitempty"`
// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512.
KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"`
// Minimum key version to use for decryption.
// Minimum key version to use for decryption.
MinDecryptionVersion *float64 `json:"minDecryptionVersion,omitempty" tf:"min_decryption_version,omitempty"`
// Minimum key version to use for encryption
// Minimum key version to use for encryption
MinEncryptionVersion *float64 `json:"minEncryptionVersion,omitempty" tf:"min_encryption_version,omitempty"`
// The name to identify this key within the backend. Must be unique within the backend.
// Name of the encryption key to create.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The namespace to provision the resource in.
// The value should not contain leading or trailing forward slashes.
// The namespace is always relative to the provider's configured namespace.
// Available only for Vault Enterprise.
// Target namespace. (requires Enterprise)
Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072 and rsa-4096.
// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096
Type *string `json:"type,omitempty" tf:"type,omitempty"`
}
func (*SecretBackendKeyInitParameters) DeepCopy ¶ added in v0.2.0
func (in *SecretBackendKeyInitParameters) DeepCopy() *SecretBackendKeyInitParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyInitParameters.
func (*SecretBackendKeyInitParameters) DeepCopyInto ¶ added in v0.2.0
func (in *SecretBackendKeyInitParameters) DeepCopyInto(out *SecretBackendKeyInitParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendKeyList ¶
type SecretBackendKeyList struct {
metav1.TypeMeta `json:",inline"`
metav1.ListMeta `json:"metadata,omitempty"`
Items []SecretBackendKey `json:"items"`
}
SecretBackendKeyList contains a list of SecretBackendKeys
func (*SecretBackendKeyList) DeepCopy ¶
func (in *SecretBackendKeyList) DeepCopy() *SecretBackendKeyList
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyList.
func (*SecretBackendKeyList) DeepCopyInto ¶
func (in *SecretBackendKeyList) DeepCopyInto(out *SecretBackendKeyList)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
func (*SecretBackendKeyList) DeepCopyObject ¶
func (in *SecretBackendKeyList) DeepCopyObject() runtime.Object
DeepCopyObject is an autogenerated deepcopy function, copying the receiver, creating a new runtime.Object.
func (*SecretBackendKeyList) GetItems ¶
func (l *SecretBackendKeyList) GetItems() []resource.Managed
GetItems of this SecretBackendKeyList.
type SecretBackendKeyObservation ¶
type SecretBackendKeyObservation struct {
// Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
// If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled.
AllowPlaintextBackup *bool `json:"allowPlaintextBackup,omitempty" tf:"allow_plaintext_backup,omitempty"`
// Replaced by auto_rotate_period.
// Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
AutoRotateInterval *float64 `json:"autoRotateInterval,omitempty" tf:"auto_rotate_interval,omitempty"`
// Amount of seconds the key should live before being automatically rotated.
// A value of 0 disables automatic rotation for the key.
// Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
AutoRotatePeriod *float64 `json:"autoRotatePeriod,omitempty" tf:"auto_rotate_period,omitempty"`
// The path the transit secret backend is mounted at, with no leading or trailing /s.
// The Transit secret backend the resource belongs to.
Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`
// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
ConvergentEncryption *bool `json:"convergentEncryption,omitempty" tf:"convergent_encryption,omitempty"`
// Specifies if the keyring is allowed to be deleted.
// Specifies if the key is allowed to be deleted.
DeletionAllowed *bool `json:"deletionAllowed,omitempty" tf:"deletion_allowed,omitempty"`
// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
Derived *bool `json:"derived,omitempty" tf:"derived,omitempty"`
// Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
// Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled.
Exportable *bool `json:"exportable,omitempty" tf:"exportable,omitempty"`
ID *string `json:"id,omitempty" tf:"id,omitempty"`
// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512.
KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"`
// List of key versions in the keyring. This attribute is zero-indexed and will contain a map of values depending on the type of the encryption key.
// List of key versions in the keyring.
Keys []map[string]*string `json:"keys,omitempty" tf:"keys,omitempty"`
// Latest key version available. This value is 1-indexed, so if latest_version is 1, then the key's information can be referenced from keys by selecting element 0
// Latest key version in use in the keyring
LatestVersion *float64 `json:"latestVersion,omitempty" tf:"latest_version,omitempty"`
// Minimum key version available for use. If keys have been archived by increasing min_decryption_version, this attribute will reflect that change.
// Minimum key version available for use.
MinAvailableVersion *float64 `json:"minAvailableVersion,omitempty" tf:"min_available_version,omitempty"`
// Minimum key version to use for decryption.
// Minimum key version to use for decryption.
MinDecryptionVersion *float64 `json:"minDecryptionVersion,omitempty" tf:"min_decryption_version,omitempty"`
// Minimum key version to use for encryption
// Minimum key version to use for encryption
MinEncryptionVersion *float64 `json:"minEncryptionVersion,omitempty" tf:"min_encryption_version,omitempty"`
// The name to identify this key within the backend. Must be unique within the backend.
// Name of the encryption key to create.
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The namespace to provision the resource in.
// The value should not contain leading or trailing forward slashes.
// The namespace is always relative to the provider's configured namespace.
// Available only for Vault Enterprise.
// Target namespace. (requires Enterprise)
Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
// Whether or not the key supports decryption, based on key type.
// Whether or not the key supports decryption, based on key type.
SupportsDecryption *bool `json:"supportsDecryption,omitempty" tf:"supports_decryption,omitempty"`
// Whether or not the key supports derivation, based on key type.
// Whether or not the key supports derivation, based on key type.
SupportsDerivation *bool `json:"supportsDerivation,omitempty" tf:"supports_derivation,omitempty"`
// Whether or not the key supports encryption, based on key type.
// Whether or not the key supports encryption, based on key type.
SupportsEncryption *bool `json:"supportsEncryption,omitempty" tf:"supports_encryption,omitempty"`
// Whether or not the key supports signing, based on key type.
// Whether or not the key supports signing, based on key type.
SupportsSigning *bool `json:"supportsSigning,omitempty" tf:"supports_signing,omitempty"`
// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072 and rsa-4096.
// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096
Type *string `json:"type,omitempty" tf:"type,omitempty"`
}
func (*SecretBackendKeyObservation) DeepCopy ¶
func (in *SecretBackendKeyObservation) DeepCopy() *SecretBackendKeyObservation
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyObservation.
func (*SecretBackendKeyObservation) DeepCopyInto ¶
func (in *SecretBackendKeyObservation) DeepCopyInto(out *SecretBackendKeyObservation)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendKeyParameters ¶
type SecretBackendKeyParameters struct {
// Enables taking backup of entire keyring in the plaintext format. Once set, this cannot be disabled.
// If set, enables taking backup of named key in the plaintext format. Once set, this cannot be disabled.
// +kubebuilder:validation:Optional
AllowPlaintextBackup *bool `json:"allowPlaintextBackup,omitempty" tf:"allow_plaintext_backup,omitempty"`
// Replaced by auto_rotate_period.
// Amount of time the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
// +kubebuilder:validation:Optional
AutoRotateInterval *float64 `json:"autoRotateInterval,omitempty" tf:"auto_rotate_interval,omitempty"`
// Amount of seconds the key should live before being automatically rotated.
// A value of 0 disables automatic rotation for the key.
// Amount of seconds the key should live before being automatically rotated. A value of 0 disables automatic rotation for the key.
// +kubebuilder:validation:Optional
AutoRotatePeriod *float64 `json:"autoRotatePeriod,omitempty" tf:"auto_rotate_period,omitempty"`
// The path the transit secret backend is mounted at, with no leading or trailing /s.
// The Transit secret backend the resource belongs to.
// +kubebuilder:validation:Optional
Backend *string `json:"backend,omitempty" tf:"backend,omitempty"`
// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
// Whether or not to support convergent encryption, where the same plaintext creates the same ciphertext. This requires derived to be set to true.
// +kubebuilder:validation:Optional
ConvergentEncryption *bool `json:"convergentEncryption,omitempty" tf:"convergent_encryption,omitempty"`
// Specifies if the keyring is allowed to be deleted.
// Specifies if the key is allowed to be deleted.
// +kubebuilder:validation:Optional
DeletionAllowed *bool `json:"deletionAllowed,omitempty" tf:"deletion_allowed,omitempty"`
// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
// Specifies if key derivation is to be used. If enabled, all encrypt/decrypt requests to this key must provide a context which is used for key derivation.
// +kubebuilder:validation:Optional
Derived *bool `json:"derived,omitempty" tf:"derived,omitempty"`
// Enables keys to be exportable. This allows for all valid private keys in the keyring to be exported. Once set, this cannot be disabled.
// Enables keys to be exportable. This allows for all the valid keys in the key ring to be exported. Once set, this cannot be disabled.
// +kubebuilder:validation:Optional
Exportable *bool `json:"exportable,omitempty" tf:"exportable,omitempty"`
// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC, where it must be between 32 and 512 bytes.
// The key size in bytes for algorithms that allow variable key sizes. Currently only applicable to HMAC; this value must be between 32 and 512.
// +kubebuilder:validation:Optional
KeySize *float64 `json:"keySize,omitempty" tf:"key_size,omitempty"`
// Minimum key version to use for decryption.
// Minimum key version to use for decryption.
// +kubebuilder:validation:Optional
MinDecryptionVersion *float64 `json:"minDecryptionVersion,omitempty" tf:"min_decryption_version,omitempty"`
// Minimum key version to use for encryption
// Minimum key version to use for encryption
// +kubebuilder:validation:Optional
MinEncryptionVersion *float64 `json:"minEncryptionVersion,omitempty" tf:"min_encryption_version,omitempty"`
// The name to identify this key within the backend. Must be unique within the backend.
// Name of the encryption key to create.
// +kubebuilder:validation:Optional
Name *string `json:"name,omitempty" tf:"name,omitempty"`
// The namespace to provision the resource in.
// The value should not contain leading or trailing forward slashes.
// The namespace is always relative to the provider's configured namespace.
// Available only for Vault Enterprise.
// Target namespace. (requires Enterprise)
// +kubebuilder:validation:Optional
Namespace *string `json:"namespace,omitempty" tf:"namespace,omitempty"`
// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96 (default), chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072 and rsa-4096.
// Specifies the type of key to create. The currently-supported types are: aes128-gcm96, aes256-gcm96, chacha20-poly1305, ed25519, ecdsa-p256, ecdsa-p384, ecdsa-p521, hmac, rsa-2048, rsa-3072, rsa-4096
// +kubebuilder:validation:Optional
Type *string `json:"type,omitempty" tf:"type,omitempty"`
}
func (*SecretBackendKeyParameters) DeepCopy ¶
func (in *SecretBackendKeyParameters) DeepCopy() *SecretBackendKeyParameters
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyParameters.
func (*SecretBackendKeyParameters) DeepCopyInto ¶
func (in *SecretBackendKeyParameters) DeepCopyInto(out *SecretBackendKeyParameters)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendKeySpec ¶
type SecretBackendKeySpec struct {
v1.ResourceSpec `json:",inline"`
ForProvider SecretBackendKeyParameters `json:"forProvider"`
// THIS IS AN ALPHA FIELD. Do not use it in production. It is not honored
// unless the relevant Crossplane feature flag is enabled, and may be
// changed or removed without notice.
// InitProvider holds the same fields as ForProvider, with the exception
// of Identifier and other resource reference fields. The fields that are
// in InitProvider are merged into ForProvider when the resource is created.
// The same fields are also added to the terraform ignore_changes hook, to
// avoid updating them after creation. This is useful for fields that are
// required on creation, but we do not desire to update them after creation,
// for example because of an external controller is managing them, like an
// autoscaler.
InitProvider SecretBackendKeyInitParameters `json:"initProvider,omitempty"`
}
SecretBackendKeySpec defines the desired state of SecretBackendKey
func (*SecretBackendKeySpec) DeepCopy ¶
func (in *SecretBackendKeySpec) DeepCopy() *SecretBackendKeySpec
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeySpec.
func (*SecretBackendKeySpec) DeepCopyInto ¶
func (in *SecretBackendKeySpec) DeepCopyInto(out *SecretBackendKeySpec)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.
type SecretBackendKeyStatus ¶
type SecretBackendKeyStatus struct {
v1.ResourceStatus `json:",inline"`
AtProvider SecretBackendKeyObservation `json:"atProvider,omitempty"`
}
SecretBackendKeyStatus defines the observed state of SecretBackendKey.
func (*SecretBackendKeyStatus) DeepCopy ¶
func (in *SecretBackendKeyStatus) DeepCopy() *SecretBackendKeyStatus
DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretBackendKeyStatus.
func (*SecretBackendKeyStatus) DeepCopyInto ¶
func (in *SecretBackendKeyStatus) DeepCopyInto(out *SecretBackendKeyStatus)
DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil.