From 0cb506c2da5458bdd1c12580b5e13aa54870ed22 Mon Sep 17 00:00:00 2001 From: Alper Rifat Ulucinar Date: Thu, 30 May 2024 12:54:22 +0300 Subject: [PATCH] Add examples manifests for the converted singleton list API versions - Also refactor some catch-all manifests into individual unit test manifests. - Add the missing example-id annotations for some manifests. There are still over 100 manifests with missing annotations. Signed-off-by: Alper Rifat Ulucinar --- examples/accessanalyzer/v1beta2/analyzer.yaml | 15 + examples/acm/v1beta2/certificate.yaml | 39 ++ examples/acmpca/v1beta2/certificate.yaml | 31 ++ .../acmpca/v1beta2/certificateauthority.yaml | 27 ++ examples/amp/v1beta1/workspace.yaml | 4 + examples/amp/v1beta2/workspace.yaml | 62 +++ examples/amplify/v1beta2/app.yaml | 39 ++ examples/apigateway/v1beta1/restapi.yaml | 25 ++ examples/apigateway/v1beta2/domainname.yaml | 23 + .../v1beta2/integrationresponse.yaml | 169 ++++++++ examples/apigateway/v1beta2/restapi.yaml | 166 +++++++ examples/apigateway/v1beta2/stage.yaml | 181 ++++++++ examples/apigatewayv2/v1beta1/api-http.yaml | 22 + .../apigatewayv2/v1beta1/api-websocket.yaml | 19 + examples/apigatewayv2/v1beta1/api.yaml | 17 + examples/apigatewayv2/v1beta1/apimapping.yaml | 95 ++++ examples/apigatewayv2/v1beta1/domainname.yaml | 42 ++ examples/apigatewayv2/v1beta2/api-http.yaml | 119 +++++ .../apigatewayv2/v1beta2/api-websocket.yaml | 135 ++++++ examples/apigatewayv2/v1beta2/api.yaml | 17 + examples/apigatewayv2/v1beta2/domainname.yaml | 44 ++ examples/apigatewayv2/v1beta2/stage.yaml | 34 ++ examples/appautoscaling/v1beta1/policy.yaml | 2 + .../v1beta1/scheduledaction.yaml | 2 + examples/appautoscaling/v1beta2/policy.yaml | 84 ++++ .../v1beta2/scheduledaction.yaml | 84 ++++ examples/appflow/v1beta2/flow.yaml | 182 ++++++++ .../v1beta2/eventintegration.yaml | 21 + examples/appmesh/v1beta2/gatewayroute.yaml | 122 ++++++ examples/appmesh/v1beta2/mesh.yaml | 15 + examples/appmesh/v1beta2/route.yaml | 131 ++++++ examples/appmesh/v1beta2/virtualgateway.yaml | 38 ++ examples/appmesh/v1beta2/virtualnode.yaml | 44 ++ examples/appmesh/v1beta2/virtualrouter.yaml | 38 ++ examples/appmesh/v1beta2/virtualservice.yaml | 68 +++ .../v1beta2/observabilityconfiguration.yaml | 20 + examples/apprunner/v1beta2/service.yaml | 25 ++ .../appstream/v1beta2/directoryconfig.yaml | 35 ++ examples/appstream/v1beta2/fleet.yaml | 63 +++ examples/appstream/v1beta2/imagebuilder.yaml | 57 +++ examples/appstream/v1beta2/stack.yaml | 36 ++ examples/appsync/v1beta2/datasource.yaml | 88 ++++ examples/appsync/v1beta2/function.yaml | 91 ++++ examples/appsync/v1beta2/graphqlapi.yaml | 17 + examples/appsync/v1beta2/resolver.yaml | 97 +++++ examples/athena/v1beta1/database.yaml | 4 + examples/athena/v1beta1/workgroup.yaml | 4 + examples/athena/v1beta2/database.yaml | 33 ++ examples/athena/v1beta2/workgroup.yaml | 39 ++ examples/autoscaling/v1beta2/attachment.yaml | 17 +- examples/autoscaling/v1beta2/grouptag.yaml | 66 +++ .../v1beta2/launchconfiguration.yaml | 17 + examples/autoscaling/v1beta2/policy.yaml | 71 +++ .../autoscaling/v1beta3/autoscalinggroup.yaml | 42 ++ .../autoscalingplans/v1beta2/scalingplan.yaml | 78 ++++ examples/backup/v1beta1/framework.yaml | 2 + examples/backup/v1beta1/reportplan.yaml | 2 + examples/backup/v1beta2/framework.yaml | 36 ++ examples/backup/v1beta2/plan.yaml | 55 +++ examples/backup/v1beta2/reportplan.yaml | 24 ++ examples/batch/v1beta2/jobdefinition.yaml | 63 +++ examples/batch/v1beta2/schedulingpolicy.yaml | 25 ++ examples/budgets/v1beta2/budget.yaml | 20 + examples/budgets/v1beta2/budgetaction.yaml | 113 +++++ .../v1beta2/voiceconnectorstreaming.yaml | 37 ++ examples/cloudformation/v1beta2/stackset.yaml | 67 +++ .../v1beta2/stacksetinstance.yaml | 85 ++++ examples/cloudfront/v1beta1/cachepolicy.yaml | 4 +- examples/cloudfront/v1beta1/distribution.yaml | 8 +- .../v1beta1/originrequestpolicy.yaml | 2 + examples/cloudfront/v1beta2/cachepolicy.yaml | 36 ++ examples/cloudfront/v1beta2/distribution.yaml | 122 ++++++ .../v1beta2/fieldlevelencryptionconfig.yaml | 90 ++++ .../v1beta2/fieldlevelencryptionprofile.yaml | 63 +++ .../v1beta2/originrequestpolicy.yaml | 29 ++ .../cloudfront/v1beta2/realtimelogconfig.yaml | 78 ++++ .../v1beta2/responseheaderspolicy.yaml | 27 ++ examples/cloudsearch/v1beta2/domain.yaml | 64 +++ .../cloudwatch/v1beta2/compositealarm.yaml | 26 ++ examples/cloudwatch/v1beta2/metricalarm.yaml | 24 ++ .../cloudwatchevents/v1beta2/connection.yaml | 33 ++ .../cloudwatchevents/v1beta2/permission.yaml | 32 ++ examples/cloudwatchevents/v1beta2/target.yaml | 92 ++++ .../cloudwatchlogs/v1beta2/metricfilter.yaml | 37 ++ .../v1beta2/customactiontype.yaml | 24 ++ examples/codepipeline/v1beta2/webhook.yaml | 145 +++++++ .../codestarconnections/v1beta2/host.yaml | 18 + .../cognitoidp/v1beta2/riskconfiguration.yaml | 42 ++ examples/cognitoidp/v1beta2/userpool.yaml | 179 ++++++++ .../cognitoidp/v1beta2/userpoolclient.yaml | 52 +++ .../configservice/v1beta2/configrule.yaml | 62 +++ .../v1beta2/configurationaggregator.yaml | 20 + .../v1beta2/configurationrecorder.yaml | 45 ++ .../v1beta2/deliverychannel.yaml | 125 ++++++ .../v1beta2/remediationconfiguration.yaml | 94 ++++ examples/connect/v1beta2/botassociation.yaml | 105 +++++ .../v1beta2/instancestorageconfig.yaml | 107 +++++ examples/connect/v1beta2/quickconnect.yaml | 44 ++ examples/connect/v1beta2/routingprofile.yaml | 26 +- examples/connect/v1beta2/user.yaml | 181 ++++++++ .../v1beta2/userhierarchystructure.yaml | 39 ++ .../connect/v1beta3/hoursofoperation.yaml | 56 +++ examples/connect/v1beta3/queue.yaml | 80 ++++ examples/datasync/v1beta2/task.yaml | 207 +++++++++ examples/dax/v1beta2/cluster.yaml | 41 ++ examples/deploy/v1beta2/deploymentconfig.yaml | 18 + examples/deploy/v1beta2/deploymentgroup.yaml | 116 +++++ .../devicefarm/v1beta2/testgridproject.yaml | 76 ++++ examples/dlm/v1beta2/lifecyclepolicy.yaml | 64 +++ .../v1beta2/endpoint-with-role-selector.yaml | 91 ++++ examples/dms/v1beta2/endpoint.yaml | 63 +++ examples/ds/v1beta2/directory.yaml | 99 +++++ examples/ds/v1beta2/shareddirectory.yaml | 113 +++++ examples/dynamodb/v1beta2/table.yaml | 37 ++ examples/ec2/v1beta2/ebssnapshotimport.yaml | 23 + examples/ec2/v1beta2/flowlog.yaml | 83 ++++ examples/ec2/v1beta2/instance.yaml | 80 ++++ examples/ec2/v1beta2/launchtemplate.yaml | 51 +++ .../ec2/v1beta2/launchtemplate_encrypted.yaml | 71 +++ examples/ec2/v1beta2/route.yaml | 11 +- examples/ec2/v1beta2/spotfleetrequest.yaml | 71 +++ examples/ec2/v1beta2/spotinstancerequest.yaml | 15 + .../ec2/v1beta2/trafficmirrorfilterrule.yaml | 41 ++ examples/ec2/v1beta2/vpcendpoint.yaml | 33 ++ examples/ec2/v1beta2/vpcipampoolcidr.yaml | 72 ++++ .../ec2/v1beta2/vpcpeeringconnection.yaml | 23 + .../v1beta2/vpcpeeringconnectionaccepter.yaml | 76 ++++ .../v1beta2/vpcpeeringconnectionoptions.yaml | 78 ++++ examples/ec2/v1beta2/vpnconnection.yaml | 55 +++ .../ecr/v1beta2/replicationconfiguration.yaml | 22 + examples/ecr/v1beta2/repository.yaml | 14 + examples/ecrpublic/v1beta2/repository.yaml | 37 ++ examples/ecs/v1beta2/capacityprovider.yaml | 71 +++ examples/ecs/v1beta2/cluster.yaml | 15 + .../ecs/v1beta2/service-static-cluster.yaml | 61 +++ examples/ecs/v1beta2/service.yaml | 61 +++ examples/ecs/v1beta2/taskdefinition.yaml | 24 ++ examples/efs/v1beta2/accesspoint.yaml | 17 + examples/efs/v1beta2/backuppolicy.yaml | 35 ++ .../v1beta2/filesystem-with-encrypted.yaml | 37 ++ examples/efs/v1beta2/filesystem.yaml | 18 + .../efs/v1beta2/replicationconfiguration.yaml | 34 ++ examples/eks/v1beta2/cluster.yaml | 190 ++++++++ .../eks/v1beta2/identityproviderconfig.yaml | 18 + examples/eks/v1beta2/nodegroup.yaml | 281 ++++++++++++ .../replicationgroup-engineVersion.yaml | 23 + .../elasticache/v1beta2/replicationgroup.yaml | 4 +- examples/elasticache/v1beta2/user.yaml | 30 ++ .../elasticbeanstalk/v1beta2/application.yaml | 19 + examples/elasticsearch/v1beta2/domain.yaml | 36 ++ .../v1beta2/domainsamloptions.yaml | 44 ++ .../elastictranscoder/v1beta2/pipeline.yaml | 78 ++++ .../elastictranscoder/v1beta2/preset.yaml | 62 +++ examples/elb/v1beta2/elb.yaml | 128 ++++++ examples/elbv2/v1beta2/lb.yaml | 122 ++++++ examples/elbv2/v1beta2/lblistener.yaml | 167 +++++++ examples/elbv2/v1beta2/lblistenerrule.yaml | 194 +++++++++ .../v1beta2/lbtargetgroupattachment.yaml | 41 ++ .../emrserverless/v1beta2/application.yaml | 21 + examples/evidently/v1beta2/feature.yaml | 43 ++ examples/evidently/v1beta2/project.yaml | 19 + examples/firehose/v1beta2/deliverystream.yaml | 65 +++ examples/fis/v1beta2/experimenttemplate.yaml | 60 +++ .../v1beta2/datarepositoryassociation.yaml | 100 +++++ examples/fsx/v1beta2/lustrefilesystem.yaml | 53 +++ examples/fsx/v1beta2/ontapfilesystem.yaml | 59 +++ .../v1beta2/ontapstoragevirtualmachine.yaml | 77 ++++ examples/fsx/v1beta2/windowsfilesystem.yaml | 141 ++++++ examples/gamelift/v1beta2/alias.yaml | 18 + examples/gamelift/v1beta2/build.yaml | 21 + examples/gamelift/v1beta2/fleet.yaml | 22 + examples/gamelift/v1beta2/script.yaml | 20 + examples/glacier/v1beta2/vault.yaml | 38 ++ .../v1beta2/accelerator.yaml | 18 + examples/glue/v1beta2/catalogdatabase.yaml | 16 + examples/glue/v1beta2/catalogtable.yaml | 25 ++ examples/glue/v1beta2/classifier.yaml | 22 + examples/glue/v1beta2/connection.yaml | 34 ++ examples/glue/v1beta2/crawler.yaml | 65 +++ .../datacatalogencryptionsettings.yaml | 36 ++ examples/glue/v1beta2/job.yaml | 46 ++ .../glue/v1beta2/securityconfiguration.yaml | 41 ++ examples/glue/v1beta2/trigger.yaml | 20 + examples/grafana/v1beta2/workspace.yaml | 49 +++ examples/guardduty/v1beta2/detector.yaml | 19 + examples/guardduty/v1beta2/filter.yaml | 52 +++ examples/identitystore/v1beta2/user.yaml | 25 ++ .../imagebuilder/v1beta2/containerrecipe.yaml | 51 +++ .../v1beta2/distributionconfiguration.yaml | 21 + examples/imagebuilder/v1beta2/image.yaml | 196 +++++++++ .../imagebuilder/v1beta2/imagepipeline.yaml | 112 +++++ .../imagebuilder/v1beta2/imagerecipe.yaml | 28 ++ .../v1beta2/infrastructureconfiguration.yaml | 63 +++ .../iot/v1beta2/indexingconfiguration.yaml | 18 + .../iot/v1beta2/provisioningtemplate.yaml | 123 ++++++ examples/iot/v1beta2/thinggroup.yaml | 15 + examples/iot/v1beta2/thingtype.yaml | 16 + examples/iot/v1beta2/topicrule.yaml | 90 ++++ .../iot/v1beta2/topicruledestination.yaml | 169 ++++++++ .../ivs/v1beta2/recordingconfiguration.yaml | 19 + examples/kafka/v1beta2/serverlesscluster.yaml | 98 +++++ examples/kafka/v1beta3/cluster-ligth.yaml | 97 +++++ examples/kafka/v1beta3/cluster.yaml | 176 ++++++++ .../v1beta2/connector-nokafka.yaml | 285 ++++++++++++ examples/kafkaconnect/v1beta2/connector.yaml | 407 ++++++++++++++++++ .../kafkaconnect/v1beta2/customplugin.yaml | 62 +++ examples/kendra/v1beta2/datasource.yaml | 44 ++ examples/kendra/v1beta2/experience.yaml | 44 ++ examples/kendra/v1beta2/index.yaml | 20 + .../v1beta2/querysuggestionsblocklist.yaml | 84 ++++ examples/kendra/v1beta2/thesaurus.yaml | 86 ++++ examples/keyspaces/v1beta2/table.yaml | 39 ++ examples/kinesis/v1beta2/stream.yaml | 22 + .../kinesisanalytics/v1beta2/application.yaml | 77 ++++ .../v1beta2/application.yaml | 54 +++ .../lakeformation/v1beta2/permissions.yaml | 59 +++ examples/lambda/v1beta2/alias.yaml | 119 +++++ .../lambda/v1beta2/codesigningconfig.yaml | 19 + .../lambda/v1beta2/eventsourcemapping.yaml | 17 + examples/lambda/v1beta2/function.yaml | 165 +++++++ .../v1beta2/functioneventinvokeconfig.yaml | 18 + examples/lambda/v1beta2/functionurl.yaml | 16 + examples/lexmodels/v1beta2/bot.yaml | 32 ++ examples/lexmodels/v1beta2/botalias.yaml | 16 + examples/lexmodels/v1beta2/intent.yaml | 30 ++ .../lightsail/v1beta2/containerservice.yaml | 22 + examples/lightsail/v1beta2/instance.yaml | 18 + examples/location/v1beta2/placeindex.yaml | 16 + .../macie2/v1beta2/classificationjob.yaml | 36 ++ examples/macie2/v1beta2/findingsfilter.yaml | 38 ++ examples/mediaconvert/v1beta2/queue.yaml | 15 + examples/medialive/v1beta2/channel.yaml | 157 +++++++ examples/medialive/v1beta2/input.yaml | 41 ++ examples/medialive/v1beta2/multiplex.yaml | 27 ++ examples/memorydb/v1beta2/user.yaml | 58 +++ examples/mq/v1beta2/broker.yaml | 61 +++ examples/neptune/v1beta2/cluster.yaml | 19 + .../networkfirewall/v1beta2/firewall.yaml | 193 +++++++++ .../v1beta2/firewallpolicy-complex.yaml | 127 ++++++ .../v1beta2/firewallpolicy.yaml | 82 ++++ .../networkfirewall/v1beta2/rulegroup.yaml | 29 ++ .../v1beta2/connectattachment.yaml | 146 +++++++ examples/networkmanager/v1beta2/device.yaml | 52 +++ examples/networkmanager/v1beta2/link.yaml | 56 +++ examples/networkmanager/v1beta2/site.yaml | 32 ++ .../networkmanager/v1beta2/vpcattachment.yaml | 115 +++++ examples/opensearch/v1beta2/domain.yaml | 23 + .../opensearch/v1beta2/domainsamloptions.yaml | 22 + examples/opsworks/v1beta2/customlayer.yaml | 81 ++++ .../opsworks/v1beta2/ecsclusterlayer.yaml | 157 +++++++ examples/opsworks/v1beta2/ganglialayer.yaml | 80 ++++ examples/opsworks/v1beta2/haproxylayer.yaml | 80 ++++ examples/opsworks/v1beta2/javaapplayer.yaml | 79 ++++ examples/opsworks/v1beta2/memcachedlayer.yaml | 79 ++++ examples/opsworks/v1beta2/mysqllayer.yaml | 79 ++++ examples/opsworks/v1beta2/nodejsapplayer.yaml | 79 ++++ examples/opsworks/v1beta2/phpapplayer.yaml | 79 ++++ examples/opsworks/v1beta2/railsapplayer.yaml | 79 ++++ examples/opsworks/v1beta2/stack.yaml | 55 +++ examples/opsworks/v1beta2/staticweblayer.yaml | 79 ++++ examples/pinpoint/v1beta2/app.yaml | 22 + examples/qldb/v1beta2/stream.yaml | 138 ++++++ examples/rds/v1beta2/cluster.yaml | 70 +++ .../rds/v1beta2/proxydefaulttargetgroup.yaml | 23 + examples/rds/v1beta3/instance.yaml | 57 +++ examples/redshift/v1beta2/cluster.yaml | 40 ++ .../redshift/v1beta2/scheduledaction.yaml | 138 ++++++ examples/resourcegroups/v1beta2/group.yaml | 28 ++ examples/route53/v1beta2/record.yaml | 35 ++ .../v1beta2/safetyrule.yaml | 80 ++++ .../v1beta2/resourceset.yaml | 43 ++ examples/rum/v1beta2/appmonitor.yaml | 31 ++ examples/s3/v1beta2/bucket.yaml | 34 ++ examples/s3/v1beta2/bucketacl-canned.yaml | 33 ++ examples/s3/v1beta2/bucketacl.yaml | 26 ++ .../v1beta2/bucketanalyticsconfiguration.yaml | 24 ++ ...bucketintelligenttieringconfiguration.yaml | 22 + examples/s3/v1beta2/bucketinventory.yaml | 26 ++ .../v1beta2/bucketlifecycleconfiguration.yaml | 42 ++ examples/s3/v1beta2/bucketlogging.yaml | 50 +++ examples/s3/v1beta2/bucketmetric.yaml | 17 + .../bucketobjectlockconfiguration.yaml | 22 + .../s3/v1beta2/bucketownershipcontrols.yaml | 18 + .../bucketreplicationconfiguration.yaml | 31 ++ ...cketserversideencryptionconfiguration.yaml | 54 +++ examples/s3/v1beta2/bucketversioning.yaml | 34 ++ .../v1beta2/bucketwebsiteconfiguration.yaml | 25 ++ examples/s3/v1beta2/object.yaml | 38 ++ examples/s3control/v1beta2/accesspoint.yaml | 34 ++ .../v1beta2/multiregionaccesspoint.yaml | 54 +++ .../v1beta2/multiregionaccesspointpolicy.yaml | 69 +++ .../v1beta2/objectlambdaaccesspoint.yaml | 111 +++++ .../v1beta2/storagelensconfiguration.yaml | 24 ++ examples/sagemaker/v1beta2/app.yaml | 132 ++++++ .../sagemaker/v1beta2/appimageconfig.yaml | 18 + .../sagemaker/v1beta2/coderepository.yaml | 17 + examples/sagemaker/v1beta2/device.yaml | 117 +++++ examples/sagemaker/v1beta2/devicefleet.yaml | 98 +++++ examples/sagemaker/v1beta2/domain.yaml | 91 ++++ examples/sagemaker/v1beta2/endpoint.yaml | 116 +++++ .../v1beta2/endpointconfiguration.yaml | 95 ++++ examples/sagemaker/v1beta2/featuregroup.yaml | 53 +++ examples/sagemaker/v1beta2/model.yaml | 70 +++ .../sagemaker/v1beta2/notebookinstance.yaml | 49 +++ examples/sagemaker/v1beta2/space.yaml | 114 +++++ examples/sagemaker/v1beta2/userprofile.yaml | 110 +++++ examples/sagemaker/v1beta2/workforce.yaml | 74 ++++ examples/sagemaker/v1beta2/workteam.yaml | 160 +++++++ examples/scheduler/v1beta2/schedule.yaml | 74 ++++ .../v1beta2/secretrotation.yaml | 147 +++++++ examples/securityhub/v1beta2/insight.yaml | 23 + examples/servicecatalog/v1beta2/product.yaml | 23 + .../servicecatalog/v1beta2/serviceaction.yaml | 20 + .../servicediscovery/v1beta2/service.yaml | 62 +++ examples/ses/v1beta2/configurationset.yaml | 15 + examples/ses/v1beta2/eventdestination.yaml | 55 +++ examples/sesv2/v1beta2/configurationset.yaml | 25 ++ .../configurationseteventdestination.yaml | 42 ++ examples/sesv2/v1beta2/emailidentity.yaml | 16 + examples/sfn/v1beta2/statemachine.yaml | 54 +++ examples/signer/v1beta2/signingjob.yaml | 27 ++ examples/signer/v1beta2/signingprofile.yaml | 14 + examples/ssm/v1beta2/association.yaml | 55 +++ .../ssm/v1beta2/maintenancewindowtask.yaml | 172 ++++++++ examples/ssm/v1beta2/resourcedatasync.yaml | 83 ++++ .../customermanagedpolicyattachment.yaml | 74 ++++ .../permissionsboundaryattachment.yaml | 74 ++++ examples/timestreamwrite/v1beta2/table.yaml | 33 ++ .../transcribe/v1beta2/languagemodel.yaml | 133 ++++++ examples/transfer/v1beta2/server.yaml | 15 + examples/transfer/v1beta2/user.yaml | 21 + examples/transfer/v1beta2/workflow.yaml | 21 + examples/waf/v1beta2/bytematchset.yaml | 23 + examples/waf/v1beta2/regexmatchset.yaml | 42 ++ examples/waf/v1beta2/sizeconstraintset.yaml | 22 + .../waf/v1beta2/sqlinjectionmatchset.yaml | 20 + examples/waf/v1beta2/webacl.yaml | 67 +++ examples/waf/v1beta2/xssmatchset.yaml | 23 + .../wafregional/v1beta2/bytematchset.yaml | 23 + .../wafregional/v1beta2/regexmatchset.yaml | 42 ++ .../v1beta2/sizeconstraintset.yaml | 22 + .../v1beta2/sqlinjectionmatchset.yaml | 20 + examples/wafregional/v1beta2/webacl.yaml | 67 +++ examples/wafregional/v1beta2/xssmatchset.yaml | 23 + examples/workspaces/v1beta2/directory.yaml | 196 +++++++++ examples/xray/v1beta2/group.yaml | 20 + 346 files changed, 20682 insertions(+), 23 deletions(-) create mode 100644 examples/accessanalyzer/v1beta2/analyzer.yaml create mode 100644 examples/acm/v1beta2/certificate.yaml create mode 100644 examples/acmpca/v1beta2/certificate.yaml create mode 100644 examples/acmpca/v1beta2/certificateauthority.yaml create mode 100644 examples/amp/v1beta2/workspace.yaml create mode 100644 examples/amplify/v1beta2/app.yaml create mode 100644 examples/apigateway/v1beta2/domainname.yaml create mode 100644 examples/apigateway/v1beta2/integrationresponse.yaml create mode 100644 examples/apigateway/v1beta2/restapi.yaml create mode 100644 examples/apigateway/v1beta2/stage.yaml create mode 100644 examples/apigatewayv2/v1beta1/api.yaml create mode 100644 examples/apigatewayv2/v1beta1/apimapping.yaml create mode 100644 examples/apigatewayv2/v1beta1/domainname.yaml create mode 100644 examples/apigatewayv2/v1beta2/api-http.yaml create mode 100644 examples/apigatewayv2/v1beta2/api-websocket.yaml create mode 100644 examples/apigatewayv2/v1beta2/api.yaml create mode 100644 examples/apigatewayv2/v1beta2/domainname.yaml create mode 100644 examples/apigatewayv2/v1beta2/stage.yaml create mode 100644 examples/appautoscaling/v1beta2/policy.yaml create mode 100644 examples/appautoscaling/v1beta2/scheduledaction.yaml create mode 100644 examples/appflow/v1beta2/flow.yaml create mode 100644 examples/appintegrations/v1beta2/eventintegration.yaml create mode 100644 examples/appmesh/v1beta2/gatewayroute.yaml create mode 100644 examples/appmesh/v1beta2/mesh.yaml create mode 100644 examples/appmesh/v1beta2/route.yaml create mode 100644 examples/appmesh/v1beta2/virtualgateway.yaml create mode 100644 examples/appmesh/v1beta2/virtualnode.yaml create mode 100644 examples/appmesh/v1beta2/virtualrouter.yaml create mode 100644 examples/appmesh/v1beta2/virtualservice.yaml create mode 100644 examples/apprunner/v1beta2/observabilityconfiguration.yaml create mode 100644 examples/apprunner/v1beta2/service.yaml create mode 100644 examples/appstream/v1beta2/directoryconfig.yaml create mode 100644 examples/appstream/v1beta2/fleet.yaml create mode 100644 examples/appstream/v1beta2/imagebuilder.yaml create mode 100644 examples/appstream/v1beta2/stack.yaml create mode 100644 examples/appsync/v1beta2/datasource.yaml create mode 100644 examples/appsync/v1beta2/function.yaml create mode 100644 examples/appsync/v1beta2/graphqlapi.yaml create mode 100644 examples/appsync/v1beta2/resolver.yaml create mode 100644 examples/athena/v1beta2/database.yaml create mode 100644 examples/athena/v1beta2/workgroup.yaml create mode 100644 examples/autoscaling/v1beta2/grouptag.yaml create mode 100644 examples/autoscaling/v1beta2/launchconfiguration.yaml create mode 100644 examples/autoscaling/v1beta2/policy.yaml create mode 100644 examples/autoscaling/v1beta3/autoscalinggroup.yaml create mode 100644 examples/autoscalingplans/v1beta2/scalingplan.yaml create mode 100644 examples/backup/v1beta2/framework.yaml create mode 100644 examples/backup/v1beta2/plan.yaml create mode 100644 examples/backup/v1beta2/reportplan.yaml create mode 100644 examples/batch/v1beta2/jobdefinition.yaml create mode 100644 examples/batch/v1beta2/schedulingpolicy.yaml create mode 100644 examples/budgets/v1beta2/budget.yaml create mode 100644 examples/budgets/v1beta2/budgetaction.yaml create mode 100644 examples/chime/v1beta2/voiceconnectorstreaming.yaml create mode 100644 examples/cloudformation/v1beta2/stackset.yaml create mode 100644 examples/cloudformation/v1beta2/stacksetinstance.yaml create mode 100644 examples/cloudfront/v1beta2/cachepolicy.yaml create mode 100644 examples/cloudfront/v1beta2/distribution.yaml create mode 100644 examples/cloudfront/v1beta2/fieldlevelencryptionconfig.yaml create mode 100644 examples/cloudfront/v1beta2/fieldlevelencryptionprofile.yaml create mode 100644 examples/cloudfront/v1beta2/originrequestpolicy.yaml create mode 100644 examples/cloudfront/v1beta2/realtimelogconfig.yaml create mode 100644 examples/cloudfront/v1beta2/responseheaderspolicy.yaml create mode 100644 examples/cloudsearch/v1beta2/domain.yaml create mode 100644 examples/cloudwatch/v1beta2/compositealarm.yaml create mode 100644 examples/cloudwatch/v1beta2/metricalarm.yaml create mode 100644 examples/cloudwatchevents/v1beta2/connection.yaml create mode 100644 examples/cloudwatchevents/v1beta2/permission.yaml create mode 100644 examples/cloudwatchevents/v1beta2/target.yaml create mode 100644 examples/cloudwatchlogs/v1beta2/metricfilter.yaml create mode 100644 examples/codepipeline/v1beta2/customactiontype.yaml create mode 100644 examples/codepipeline/v1beta2/webhook.yaml create mode 100644 examples/codestarconnections/v1beta2/host.yaml create mode 100644 examples/cognitoidp/v1beta2/riskconfiguration.yaml create mode 100644 examples/cognitoidp/v1beta2/userpool.yaml create mode 100644 examples/cognitoidp/v1beta2/userpoolclient.yaml create mode 100644 examples/configservice/v1beta2/configrule.yaml create mode 100644 examples/configservice/v1beta2/configurationaggregator.yaml create mode 100644 examples/configservice/v1beta2/configurationrecorder.yaml create mode 100644 examples/configservice/v1beta2/deliverychannel.yaml create mode 100644 examples/configservice/v1beta2/remediationconfiguration.yaml create mode 100644 examples/connect/v1beta2/botassociation.yaml create mode 100644 examples/connect/v1beta2/instancestorageconfig.yaml create mode 100644 examples/connect/v1beta2/quickconnect.yaml create mode 100644 examples/connect/v1beta2/user.yaml create mode 100644 examples/connect/v1beta2/userhierarchystructure.yaml create mode 100644 examples/connect/v1beta3/hoursofoperation.yaml create mode 100644 examples/connect/v1beta3/queue.yaml create mode 100644 examples/datasync/v1beta2/task.yaml create mode 100644 examples/dax/v1beta2/cluster.yaml create mode 100644 examples/deploy/v1beta2/deploymentconfig.yaml create mode 100644 examples/deploy/v1beta2/deploymentgroup.yaml create mode 100644 examples/devicefarm/v1beta2/testgridproject.yaml create mode 100644 examples/dlm/v1beta2/lifecyclepolicy.yaml create mode 100644 examples/dms/v1beta2/endpoint-with-role-selector.yaml create mode 100644 examples/dms/v1beta2/endpoint.yaml create mode 100644 examples/ds/v1beta2/directory.yaml create mode 100644 examples/ds/v1beta2/shareddirectory.yaml create mode 100644 examples/dynamodb/v1beta2/table.yaml create mode 100644 examples/ec2/v1beta2/ebssnapshotimport.yaml create mode 100644 examples/ec2/v1beta2/flowlog.yaml create mode 100644 examples/ec2/v1beta2/instance.yaml create mode 100644 examples/ec2/v1beta2/launchtemplate.yaml create mode 100644 examples/ec2/v1beta2/launchtemplate_encrypted.yaml create mode 100644 examples/ec2/v1beta2/spotfleetrequest.yaml create mode 100644 examples/ec2/v1beta2/spotinstancerequest.yaml create mode 100644 examples/ec2/v1beta2/trafficmirrorfilterrule.yaml create mode 100644 examples/ec2/v1beta2/vpcendpoint.yaml create mode 100644 examples/ec2/v1beta2/vpcipampoolcidr.yaml create mode 100644 examples/ec2/v1beta2/vpcpeeringconnection.yaml create mode 100644 examples/ec2/v1beta2/vpcpeeringconnectionaccepter.yaml create mode 100644 examples/ec2/v1beta2/vpcpeeringconnectionoptions.yaml create mode 100644 examples/ec2/v1beta2/vpnconnection.yaml create mode 100644 examples/ecr/v1beta2/replicationconfiguration.yaml create mode 100644 examples/ecr/v1beta2/repository.yaml create mode 100644 examples/ecrpublic/v1beta2/repository.yaml create mode 100644 examples/ecs/v1beta2/capacityprovider.yaml create mode 100644 examples/ecs/v1beta2/cluster.yaml create mode 100644 examples/ecs/v1beta2/service-static-cluster.yaml create mode 100644 examples/ecs/v1beta2/service.yaml create mode 100644 examples/ecs/v1beta2/taskdefinition.yaml create mode 100644 examples/efs/v1beta2/accesspoint.yaml create mode 100644 examples/efs/v1beta2/backuppolicy.yaml create mode 100644 examples/efs/v1beta2/filesystem-with-encrypted.yaml create mode 100644 examples/efs/v1beta2/filesystem.yaml create mode 100644 examples/efs/v1beta2/replicationconfiguration.yaml create mode 100644 examples/eks/v1beta2/cluster.yaml create mode 100644 examples/eks/v1beta2/identityproviderconfig.yaml create mode 100644 examples/eks/v1beta2/nodegroup.yaml create mode 100644 examples/elasticache/v1beta2/replicationgroup-engineVersion.yaml create mode 100644 examples/elasticache/v1beta2/user.yaml create mode 100644 examples/elasticbeanstalk/v1beta2/application.yaml create mode 100644 examples/elasticsearch/v1beta2/domain.yaml create mode 100644 examples/elasticsearch/v1beta2/domainsamloptions.yaml create mode 100644 examples/elastictranscoder/v1beta2/pipeline.yaml create mode 100644 examples/elastictranscoder/v1beta2/preset.yaml create mode 100644 examples/elb/v1beta2/elb.yaml create mode 100644 examples/elbv2/v1beta2/lb.yaml create mode 100644 examples/elbv2/v1beta2/lblistener.yaml create mode 100644 examples/elbv2/v1beta2/lblistenerrule.yaml create mode 100644 examples/elbv2/v1beta2/lbtargetgroupattachment.yaml create mode 100644 examples/emrserverless/v1beta2/application.yaml create mode 100644 examples/evidently/v1beta2/feature.yaml create mode 100644 examples/evidently/v1beta2/project.yaml create mode 100644 examples/firehose/v1beta2/deliverystream.yaml create mode 100644 examples/fis/v1beta2/experimenttemplate.yaml create mode 100644 examples/fsx/v1beta2/datarepositoryassociation.yaml create mode 100644 examples/fsx/v1beta2/lustrefilesystem.yaml create mode 100644 examples/fsx/v1beta2/ontapfilesystem.yaml create mode 100644 examples/fsx/v1beta2/ontapstoragevirtualmachine.yaml create mode 100644 examples/fsx/v1beta2/windowsfilesystem.yaml create mode 100644 examples/gamelift/v1beta2/alias.yaml create mode 100644 examples/gamelift/v1beta2/build.yaml create mode 100644 examples/gamelift/v1beta2/fleet.yaml create mode 100644 examples/gamelift/v1beta2/script.yaml create mode 100644 examples/glacier/v1beta2/vault.yaml create mode 100644 examples/globalaccelerator/v1beta2/accelerator.yaml create mode 100644 examples/glue/v1beta2/catalogdatabase.yaml create mode 100644 examples/glue/v1beta2/catalogtable.yaml create mode 100644 examples/glue/v1beta2/classifier.yaml create mode 100644 examples/glue/v1beta2/connection.yaml create mode 100644 examples/glue/v1beta2/crawler.yaml create mode 100644 examples/glue/v1beta2/datacatalogencryptionsettings.yaml create mode 100644 examples/glue/v1beta2/job.yaml create mode 100644 examples/glue/v1beta2/securityconfiguration.yaml create mode 100644 examples/glue/v1beta2/trigger.yaml create mode 100644 examples/grafana/v1beta2/workspace.yaml create mode 100644 examples/guardduty/v1beta2/detector.yaml create mode 100644 examples/guardduty/v1beta2/filter.yaml create mode 100644 examples/identitystore/v1beta2/user.yaml create mode 100644 examples/imagebuilder/v1beta2/containerrecipe.yaml create mode 100644 examples/imagebuilder/v1beta2/distributionconfiguration.yaml create mode 100644 examples/imagebuilder/v1beta2/image.yaml create mode 100644 examples/imagebuilder/v1beta2/imagepipeline.yaml create mode 100644 examples/imagebuilder/v1beta2/imagerecipe.yaml create mode 100644 examples/imagebuilder/v1beta2/infrastructureconfiguration.yaml create mode 100644 examples/iot/v1beta2/indexingconfiguration.yaml create mode 100644 examples/iot/v1beta2/provisioningtemplate.yaml create mode 100644 examples/iot/v1beta2/thinggroup.yaml create mode 100644 examples/iot/v1beta2/thingtype.yaml create mode 100644 examples/iot/v1beta2/topicrule.yaml create mode 100644 examples/iot/v1beta2/topicruledestination.yaml create mode 100644 examples/ivs/v1beta2/recordingconfiguration.yaml create mode 100644 examples/kafka/v1beta2/serverlesscluster.yaml create mode 100644 examples/kafka/v1beta3/cluster-ligth.yaml create mode 100644 examples/kafka/v1beta3/cluster.yaml create mode 100644 examples/kafkaconnect/v1beta2/connector-nokafka.yaml create mode 100644 examples/kafkaconnect/v1beta2/connector.yaml create mode 100644 examples/kafkaconnect/v1beta2/customplugin.yaml create mode 100644 examples/kendra/v1beta2/datasource.yaml create mode 100644 examples/kendra/v1beta2/experience.yaml create mode 100644 examples/kendra/v1beta2/index.yaml create mode 100644 examples/kendra/v1beta2/querysuggestionsblocklist.yaml create mode 100644 examples/kendra/v1beta2/thesaurus.yaml create mode 100644 examples/keyspaces/v1beta2/table.yaml create mode 100644 examples/kinesis/v1beta2/stream.yaml create mode 100644 examples/kinesisanalytics/v1beta2/application.yaml create mode 100644 examples/kinesisanalyticsv2/v1beta2/application.yaml create mode 100644 examples/lakeformation/v1beta2/permissions.yaml create mode 100644 examples/lambda/v1beta2/alias.yaml create mode 100644 examples/lambda/v1beta2/codesigningconfig.yaml create mode 100644 examples/lambda/v1beta2/eventsourcemapping.yaml create mode 100644 examples/lambda/v1beta2/function.yaml create mode 100644 examples/lambda/v1beta2/functioneventinvokeconfig.yaml create mode 100644 examples/lambda/v1beta2/functionurl.yaml create mode 100644 examples/lexmodels/v1beta2/bot.yaml create mode 100644 examples/lexmodels/v1beta2/botalias.yaml create mode 100644 examples/lexmodels/v1beta2/intent.yaml create mode 100644 examples/lightsail/v1beta2/containerservice.yaml create mode 100644 examples/lightsail/v1beta2/instance.yaml create mode 100644 examples/location/v1beta2/placeindex.yaml create mode 100644 examples/macie2/v1beta2/classificationjob.yaml create mode 100644 examples/macie2/v1beta2/findingsfilter.yaml create mode 100644 examples/mediaconvert/v1beta2/queue.yaml create mode 100644 examples/medialive/v1beta2/channel.yaml create mode 100644 examples/medialive/v1beta2/input.yaml create mode 100644 examples/medialive/v1beta2/multiplex.yaml create mode 100644 examples/memorydb/v1beta2/user.yaml create mode 100644 examples/mq/v1beta2/broker.yaml create mode 100644 examples/neptune/v1beta2/cluster.yaml create mode 100644 examples/networkfirewall/v1beta2/firewall.yaml create mode 100644 examples/networkfirewall/v1beta2/firewallpolicy-complex.yaml create mode 100644 examples/networkfirewall/v1beta2/firewallpolicy.yaml create mode 100644 examples/networkfirewall/v1beta2/rulegroup.yaml create mode 100644 examples/networkmanager/v1beta2/connectattachment.yaml create mode 100644 examples/networkmanager/v1beta2/device.yaml create mode 100644 examples/networkmanager/v1beta2/link.yaml create mode 100644 examples/networkmanager/v1beta2/site.yaml create mode 100644 examples/networkmanager/v1beta2/vpcattachment.yaml create mode 100644 examples/opensearch/v1beta2/domain.yaml create mode 100644 examples/opensearch/v1beta2/domainsamloptions.yaml create mode 100644 examples/opsworks/v1beta2/customlayer.yaml create mode 100644 examples/opsworks/v1beta2/ecsclusterlayer.yaml create mode 100644 examples/opsworks/v1beta2/ganglialayer.yaml create mode 100644 examples/opsworks/v1beta2/haproxylayer.yaml create mode 100644 examples/opsworks/v1beta2/javaapplayer.yaml create mode 100644 examples/opsworks/v1beta2/memcachedlayer.yaml create mode 100644 examples/opsworks/v1beta2/mysqllayer.yaml create mode 100644 examples/opsworks/v1beta2/nodejsapplayer.yaml create mode 100644 examples/opsworks/v1beta2/phpapplayer.yaml create mode 100644 examples/opsworks/v1beta2/railsapplayer.yaml create mode 100644 examples/opsworks/v1beta2/stack.yaml create mode 100644 examples/opsworks/v1beta2/staticweblayer.yaml create mode 100644 examples/pinpoint/v1beta2/app.yaml create mode 100644 examples/qldb/v1beta2/stream.yaml create mode 100644 examples/rds/v1beta2/cluster.yaml create mode 100644 examples/rds/v1beta2/proxydefaulttargetgroup.yaml create mode 100644 examples/rds/v1beta3/instance.yaml create mode 100644 examples/redshift/v1beta2/cluster.yaml create mode 100644 examples/redshift/v1beta2/scheduledaction.yaml create mode 100644 examples/resourcegroups/v1beta2/group.yaml create mode 100644 examples/route53/v1beta2/record.yaml create mode 100644 examples/route53recoverycontrolconfig/v1beta2/safetyrule.yaml create mode 100644 examples/route53recoveryreadiness/v1beta2/resourceset.yaml create mode 100644 examples/rum/v1beta2/appmonitor.yaml create mode 100644 examples/s3/v1beta2/bucket.yaml create mode 100644 examples/s3/v1beta2/bucketacl-canned.yaml create mode 100644 examples/s3/v1beta2/bucketacl.yaml create mode 100644 examples/s3/v1beta2/bucketanalyticsconfiguration.yaml create mode 100644 examples/s3/v1beta2/bucketintelligenttieringconfiguration.yaml create mode 100644 examples/s3/v1beta2/bucketinventory.yaml create mode 100644 examples/s3/v1beta2/bucketlifecycleconfiguration.yaml create mode 100644 examples/s3/v1beta2/bucketlogging.yaml create mode 100644 examples/s3/v1beta2/bucketmetric.yaml create mode 100644 examples/s3/v1beta2/bucketobjectlockconfiguration.yaml create mode 100644 examples/s3/v1beta2/bucketownershipcontrols.yaml create mode 100644 examples/s3/v1beta2/bucketreplicationconfiguration.yaml create mode 100644 examples/s3/v1beta2/bucketserversideencryptionconfiguration.yaml create mode 100644 examples/s3/v1beta2/bucketversioning.yaml create mode 100644 examples/s3/v1beta2/bucketwebsiteconfiguration.yaml create mode 100644 examples/s3/v1beta2/object.yaml create mode 100644 examples/s3control/v1beta2/accesspoint.yaml create mode 100644 examples/s3control/v1beta2/multiregionaccesspoint.yaml create mode 100644 examples/s3control/v1beta2/multiregionaccesspointpolicy.yaml create mode 100644 examples/s3control/v1beta2/objectlambdaaccesspoint.yaml create mode 100644 examples/s3control/v1beta2/storagelensconfiguration.yaml create mode 100644 examples/sagemaker/v1beta2/app.yaml create mode 100644 examples/sagemaker/v1beta2/appimageconfig.yaml create mode 100644 examples/sagemaker/v1beta2/coderepository.yaml create mode 100644 examples/sagemaker/v1beta2/device.yaml create mode 100644 examples/sagemaker/v1beta2/devicefleet.yaml create mode 100644 examples/sagemaker/v1beta2/domain.yaml create mode 100644 examples/sagemaker/v1beta2/endpoint.yaml create mode 100644 examples/sagemaker/v1beta2/endpointconfiguration.yaml create mode 100644 examples/sagemaker/v1beta2/featuregroup.yaml create mode 100644 examples/sagemaker/v1beta2/model.yaml create mode 100644 examples/sagemaker/v1beta2/notebookinstance.yaml create mode 100644 examples/sagemaker/v1beta2/space.yaml create mode 100644 examples/sagemaker/v1beta2/userprofile.yaml create mode 100644 examples/sagemaker/v1beta2/workforce.yaml create mode 100644 examples/sagemaker/v1beta2/workteam.yaml create mode 100644 examples/scheduler/v1beta2/schedule.yaml create mode 100644 examples/secretsmanager/v1beta2/secretrotation.yaml create mode 100644 examples/securityhub/v1beta2/insight.yaml create mode 100644 examples/servicecatalog/v1beta2/product.yaml create mode 100644 examples/servicecatalog/v1beta2/serviceaction.yaml create mode 100644 examples/servicediscovery/v1beta2/service.yaml create mode 100644 examples/ses/v1beta2/configurationset.yaml create mode 100644 examples/ses/v1beta2/eventdestination.yaml create mode 100644 examples/sesv2/v1beta2/configurationset.yaml create mode 100644 examples/sesv2/v1beta2/configurationseteventdestination.yaml create mode 100644 examples/sesv2/v1beta2/emailidentity.yaml create mode 100644 examples/sfn/v1beta2/statemachine.yaml create mode 100644 examples/signer/v1beta2/signingjob.yaml create mode 100644 examples/signer/v1beta2/signingprofile.yaml create mode 100644 examples/ssm/v1beta2/association.yaml create mode 100644 examples/ssm/v1beta2/maintenancewindowtask.yaml create mode 100644 examples/ssm/v1beta2/resourcedatasync.yaml create mode 100644 examples/ssoadmin/v1beta2/customermanagedpolicyattachment.yaml create mode 100644 examples/ssoadmin/v1beta2/permissionsboundaryattachment.yaml create mode 100644 examples/timestreamwrite/v1beta2/table.yaml create mode 100644 examples/transcribe/v1beta2/languagemodel.yaml create mode 100644 examples/transfer/v1beta2/server.yaml create mode 100644 examples/transfer/v1beta2/user.yaml create mode 100644 examples/transfer/v1beta2/workflow.yaml create mode 100644 examples/waf/v1beta2/bytematchset.yaml create mode 100644 examples/waf/v1beta2/regexmatchset.yaml create mode 100644 examples/waf/v1beta2/sizeconstraintset.yaml create mode 100644 examples/waf/v1beta2/sqlinjectionmatchset.yaml create mode 100644 examples/waf/v1beta2/webacl.yaml create mode 100644 examples/waf/v1beta2/xssmatchset.yaml create mode 100644 examples/wafregional/v1beta2/bytematchset.yaml create mode 100644 examples/wafregional/v1beta2/regexmatchset.yaml create mode 100644 examples/wafregional/v1beta2/sizeconstraintset.yaml create mode 100644 examples/wafregional/v1beta2/sqlinjectionmatchset.yaml create mode 100644 examples/wafregional/v1beta2/webacl.yaml create mode 100644 examples/wafregional/v1beta2/xssmatchset.yaml create mode 100644 examples/workspaces/v1beta2/directory.yaml create mode 100644 examples/xray/v1beta2/group.yaml diff --git a/examples/accessanalyzer/v1beta2/analyzer.yaml b/examples/accessanalyzer/v1beta2/analyzer.yaml new file mode 100644 index 0000000000..471ee61b52 --- /dev/null +++ b/examples/accessanalyzer/v1beta2/analyzer.yaml @@ -0,0 +1,15 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: accessanalyzer.aws.upbound.io/v1beta2 +kind: Analyzer +metadata: + annotations: + meta.upbound.io/example-id: accessanalyzer/v1beta2/analyzer + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 diff --git a/examples/acm/v1beta2/certificate.yaml b/examples/acm/v1beta2/certificate.yaml new file mode 100644 index 0000000000..59ad44d5da --- /dev/null +++ b/examples/acm/v1beta2/certificate.yaml @@ -0,0 +1,39 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: acm.aws.upbound.io/v1beta2 +kind: Certificate +metadata: + annotations: + meta.upbound.io/example-id: acm/v1beta2/certificate + labels: + testing.upbound.io/example-name: certificate + name: example-dns +spec: + forProvider: + domainName: example-dns.upbound-providers.io + region: us-west-1 + tags: + Environment: test + validationMethod: DNS + +--- + +apiVersion: acm.aws.upbound.io/v1beta1 +kind: CertificateValidation +metadata: + annotations: + meta.upbound.io/example-id: acm/v1beta2/certificate + upjet.upbound.io/manual-intervention: It requires a real domain to be bought + labels: + testing.upbound.io/example-name: certificate + name: example-dns +spec: + forProvider: + certificateArnSelector: + matchLabels: + testing.upbound.io/example-name: certificate + region: us-west-1 + validationRecordFqdns: + - _6a48817259ef461524224d64f7a209f4.example-dns.upbound-providers.io diff --git a/examples/acmpca/v1beta2/certificate.yaml b/examples/acmpca/v1beta2/certificate.yaml new file mode 100644 index 0000000000..a171586590 --- /dev/null +++ b/examples/acmpca/v1beta2/certificate.yaml @@ -0,0 +1,31 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: acmpca.aws.upbound.io/v1beta2 +kind: Certificate +metadata: + annotations: + meta.upbound.io/example-id: acmpca/v1beta2/certificate + upjet.upbound.io/manual-intervention: It depends on CertificateAuthority which + is not suitable for continuous automated testing. + name: example +spec: + forProvider: + certificateAuthorityArnRef: + name: example + certificateSigningRequestSecretRef: + key: certificate_signing_request + name: acmpca-ca + namespace: upbound-system + region: eu-central-1 + signingAlgorithm: SHA256WITHRSA + templateArn: arn:aws:acm-pca:::template/RootCACertificate/V1 + validity: + type: YEARS + value: "1" + providerConfigRef: + name: default + writeConnectionSecretToRef: + name: acmpca-certificate + namespace: upbound-system diff --git a/examples/acmpca/v1beta2/certificateauthority.yaml b/examples/acmpca/v1beta2/certificateauthority.yaml new file mode 100644 index 0000000000..2fc5c83b14 --- /dev/null +++ b/examples/acmpca/v1beta2/certificateauthority.yaml @@ -0,0 +1,27 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: acmpca.aws.upbound.io/v1beta2 +kind: CertificateAuthority +metadata: + annotations: + meta.upbound.io/example-id: acmpca/v1beta2/certificateauthority + upjet.upbound.io/manual-intervention: Creation of this resource costs over $100, + so it is not suitable for continuous testing. + name: example +spec: + forProvider: + certificateAuthorityConfiguration: + keyAlgorithm: RSA_4096 + signingAlgorithm: SHA512WITHRSA + subject: + commonName: example.com + permanentDeletionTimeInDays: 7 + region: eu-central-1 + type: ROOT + providerConfigRef: + name: default + writeConnectionSecretToRef: + name: acmpca-ca + namespace: upbound-system diff --git a/examples/amp/v1beta1/workspace.yaml b/examples/amp/v1beta1/workspace.yaml index accf3ee9dc..adc1bba971 100644 --- a/examples/amp/v1beta1/workspace.yaml +++ b/examples/amp/v1beta1/workspace.yaml @@ -18,6 +18,8 @@ spec: apiVersion: amp.aws.upbound.io/v1beta1 kind: RuleGroupNamespace metadata: + annotations: + meta.upbound.io/example-id: amp/v1beta1/workspace labels: testing.upbound.io/example-name: amp name: demo @@ -37,6 +39,8 @@ spec: apiVersion: amp.aws.upbound.io/v1beta1 kind: AlertManagerDefinition metadata: + annotations: + meta.upbound.io/example-id: amp/v1beta1/workspace labels: testing.upbound.io/example-name: amp name: demo diff --git a/examples/amp/v1beta2/workspace.yaml b/examples/amp/v1beta2/workspace.yaml new file mode 100644 index 0000000000..8ae35d52b6 --- /dev/null +++ b/examples/amp/v1beta2/workspace.yaml @@ -0,0 +1,62 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: amp.aws.upbound.io/v1beta2 +kind: Workspace +metadata: + annotations: + meta.upbound.io/example-id: amp/v1beta2/workspace + uptest.upbound.io/update-parameter: '{"tags":{"update-test-tag":"val"}}' + labels: + testing.upbound.io/example-name: amp + name: demo +spec: + forProvider: + region: us-east-1 + +--- + +apiVersion: amp.aws.upbound.io/v1beta1 +kind: RuleGroupNamespace +metadata: + annotations: + meta.upbound.io/example-id: amp/v1beta2/workspace + labels: + testing.upbound.io/example-name: amp + name: demo +spec: + forProvider: + data: | + groups: + - name: test + rules: + - record: metric:recording_rule + expr: avg(rate(container_cpu_usage_seconds_total[5m])) + region: us-east-1 + workspaceIdSelector: + matchLabels: + testing.upbound.io/example-name: amp + +--- + +apiVersion: amp.aws.upbound.io/v1beta1 +kind: AlertManagerDefinition +metadata: + annotations: + meta.upbound.io/example-id: amp/v1beta2/workspace + labels: + testing.upbound.io/example-name: amp + name: demo +spec: + forProvider: + definition: | + alertmanager_config: | + route: + receiver: 'default' + receivers: + - name: 'default' + region: us-east-1 + workspaceIdSelector: + matchLabels: + testing.upbound.io/example-name: amp diff --git a/examples/amplify/v1beta2/app.yaml b/examples/amplify/v1beta2/app.yaml new file mode 100644 index 0000000000..54ca2a5f3e --- /dev/null +++ b/examples/amplify/v1beta2/app.yaml @@ -0,0 +1,39 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: amplify.aws.upbound.io/v1beta2 +kind: App +metadata: + annotations: + meta.upbound.io/example-id: amplify/v1beta2/app + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + buildSpec: | + version: 0.1 + frontend: + phases: + preBuild: + commands: + - yarn install + build: + commands: + - yarn run build + artifacts: + baseDirectory: build + files: + - '**/*' + cache: + paths: + - node_modules/**/* + customRule: + - source: /<*> + status: "404" + target: /index.html + environmentVariables: + ENV: test + name: example + region: us-west-1 diff --git a/examples/apigateway/v1beta1/restapi.yaml b/examples/apigateway/v1beta1/restapi.yaml index 03650ec38b..96708ce3fc 100644 --- a/examples/apigateway/v1beta1/restapi.yaml +++ b/examples/apigateway/v1beta1/restapi.yaml @@ -5,6 +5,8 @@ apiVersion: apigateway.aws.upbound.io/v1beta1 kind: RestAPI metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta1/restapi labels: testing.upbound.io/example-name: restapi name: auth-demo @@ -12,11 +14,14 @@ spec: forProvider: name: auth-demo region: us-west-1 + --- + apiVersion: apigateway.aws.upbound.io/v1beta1 kind: RestAPIPolicy metadata: annotations: + meta.upbound.io/example-id: apigateway/v1beta1/restapi upjet.upbound.io/manual-intervention: "RestAPIPolicy needs a valid arn for its policy json." labels: testing.upbound.io/example-name: restapi @@ -46,10 +51,14 @@ spec: restApiIdSelector: matchLabels: testing.upbound.io/example-name: test + --- + apiVersion: apigateway.aws.upbound.io/v1beta1 kind: Authorizer metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta1/restapi labels: testing.upbound.io/example-name: demo name: demo @@ -64,10 +73,14 @@ spec: restApiIdSelector: matchLabels: testing.upbound.io/example-name: restapi + --- + apiVersion: apigateway.aws.upbound.io/v1beta1 kind: DocumentationVersion metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta1/restapi labels: testing.upbound.io/example-name: example name: example @@ -79,10 +92,14 @@ spec: matchLabels: testing.upbound.io/example-name: restapi version: example_version + --- + apiVersion: apigateway.aws.upbound.io/v1beta1 kind: DocumentationPart metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta1/restapi labels: testing.upbound.io/example-name: restapi name: example @@ -95,10 +112,14 @@ spec: restApiIdSelector: matchLabels: testing.upbound.io/example-name: restapi + --- + apiVersion: apigateway.aws.upbound.io/v1beta1 kind: GatewayResponse metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta1/restapi labels: testing.upbound.io/example-name: test name: test @@ -114,10 +135,14 @@ spec: matchLabels: testing.upbound.io/example-name: restapi statusCode: "401" + --- + apiVersion: iam.aws.upbound.io/v1beta1 kind: Role metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta1/restapi labels: testing.upbound.io/example-name: restapi name: test-invocation-role-${Rand.RFC1123Subdomain} diff --git a/examples/apigateway/v1beta2/domainname.yaml b/examples/apigateway/v1beta2/domainname.yaml new file mode 100644 index 0000000000..6c78b56148 --- /dev/null +++ b/examples/apigateway/v1beta2/domainname.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: CC0-1.0 + +apiVersion: apigateway.aws.upbound.io/v1beta2 +kind: DomainName +metadata: + annotations: + upjet.upbound.io/manual-intervention: "The DomainName resource needs valid certificates." + labels: + testing.upbound.io/example-name: domainname + name: example +spec: + forProvider: + certificateBody: + certificateChain: + certificateName: example-api + certificatePrivateKeySecretRef: + key: attribute.example.key + name: example-secret + namespace: upbound-system + domainName: example.com + region: us-west-1 diff --git a/examples/apigateway/v1beta2/integrationresponse.yaml b/examples/apigateway/v1beta2/integrationresponse.yaml new file mode 100644 index 0000000000..54117667d5 --- /dev/null +++ b/examples/apigateway/v1beta2/integrationresponse.yaml @@ -0,0 +1,169 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: apigateway.aws.upbound.io/v1beta2 +kind: RestAPI +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + labels: + testing.upbound.io/example-name: integration + name: mydemoapi +spec: + forProvider: + description: This is my API for demonstration purposes + name: MyDemoAPI + region: us-west-1 + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: IntegrationResponse +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + uptest.upbound.io/disable-import: "true" + labels: + testing.upbound.io/example-name: integration + name: mydemointegrationresponse +spec: + forProvider: + httpMethodSelector: + matchLabels: + testing.upbound.io/example-name: integration + region: us-west-1 + resourceIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + responseTemplates: + application/xml: | + #set($inputRoot = $input.path('$')) + + + $inputRoot.body + + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + statusCodeSelector: + matchLabels: + testing.upbound.io/example-name: integration + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta2 +kind: Integration +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + uptest.upbound.io/disable-import: "true" + labels: + testing.upbound.io/example-name: integration + name: mydemointegration +spec: + forProvider: + httpMethodSelector: + matchLabels: + testing.upbound.io/example-name: integration + region: us-west-1 + resourceIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + type: MOCK + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: Method +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + uptest.upbound.io/disable-import: "true" + labels: + testing.upbound.io/example-name: integration + name: mydemomethod +spec: + forProvider: + authorization: NONE + httpMethod: GET + region: us-west-1 + resourceIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: MethodResponse +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + uptest.upbound.io/disable-import: "true" + labels: + testing.upbound.io/example-name: integration + name: response-200 +spec: + forProvider: + httpMethodSelector: + matchLabels: + testing.upbound.io/example-name: integration + region: us-west-1 + resourceIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + statusCode: "200" + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: Resource +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + labels: + testing.upbound.io/example-name: integration + name: mydemoresource +spec: + forProvider: + parentIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + pathPart: mydemoresource + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: Model +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + labels: + testing.upbound.io/example-name: integration + name: mydemomodel +spec: + forProvider: + contentType: application/json + description: a JSON schema + name: user + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: integration + schema: | + { + "type": "object" + } diff --git a/examples/apigateway/v1beta2/restapi.yaml b/examples/apigateway/v1beta2/restapi.yaml new file mode 100644 index 0000000000..9b7b92a495 --- /dev/null +++ b/examples/apigateway/v1beta2/restapi.yaml @@ -0,0 +1,166 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: apigateway.aws.upbound.io/v1beta2 +kind: RestAPI +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + labels: + testing.upbound.io/example-name: restapi + name: auth-demo +spec: + forProvider: + name: auth-demo + region: us-west-1 + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: RestAPIPolicy +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + upjet.upbound.io/manual-intervention: RestAPIPolicy needs a valid arn for its + policy json. + labels: + testing.upbound.io/example-name: restapi + name: test +spec: + forProvider: + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "AWS": "*" + }, + "Action": "execute-api:Invoke", + "Resource": "", + "Condition": { + "IpAddress": { + "aws:SourceIp": "123.123.123.123/32" + } + } + } + ] + } + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: test + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: Authorizer +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + labels: + testing.upbound.io/example-name: demo + name: demo +spec: + forProvider: + authorizerCredentialsSelector: + matchLabels: + testing.upbound.io/example-name: restapi + authorizerUri: arn:aws:apigateway:us-west-1:lambda:path/2015-03-31/functions/arn:aws:lambda:us-west-1:609897127049:function:official-providers-noop-test-func/invocations + name: demo + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: restapi + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: DocumentationVersion +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: Example description + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: restapi + version: example_version + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta2 +kind: DocumentationPart +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + labels: + testing.upbound.io/example-name: restapi + name: example +spec: + forProvider: + location: + type: API + properties: '{"description":"Example"}' + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: restapi + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: GatewayResponse +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + region: us-west-1 + responseParameters: + gatewayresponse.header.Authorization: '''Basic''' + responseTemplates: + application/json: '{"message":$context.error.messageString}' + responseType: UNAUTHORIZED + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: restapi + statusCode: "401" + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: apigateway/v1beta2/restapi + labels: + testing.upbound.io/example-name: restapi + name: test-invocation-role-${Rand.RFC1123Subdomain} +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "apigateway.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + path: / diff --git a/examples/apigateway/v1beta2/stage.yaml b/examples/apigateway/v1beta2/stage.yaml new file mode 100644 index 0000000000..cffabb13f3 --- /dev/null +++ b/examples/apigateway/v1beta2/stage.yaml @@ -0,0 +1,181 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: CC0-1.0 + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: UsagePlanKey +metadata: + labels: + testing.upbound.io/example-name: stage + name: main +spec: + forProvider: + keyIdSelector: + matchLabels: + testing.upbound.io/example-name: stage + keyType: API_KEY + region: us-west-1 + usagePlanIdSelector: + matchLabels: + testing.upbound.io/example-name: stage + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta2 +kind: UsagePlan +metadata: + labels: + testing.upbound.io/example-name: stage + name: example +spec: + forProvider: + apiStages: + - apiIdSelector: + matchLabels: + testing.upbound.io/example-name: stage + stageSelector: + matchLabels: + testing.upbound.io/example-name: stage + - apiIdSelector: + matchLabels: + testing.upbound.io/example-name: stage + stageSelector: + matchLabels: + testing.upbound.io/example-name: stage + description: my description + name: my-usage-plan + productCode: MYCODE + quotaSettings: + limit: 20 + offset: 2 + period: WEEK + region: us-west-1 + throttleSettings: + burstLimit: 5 + rateLimit: 10 + +--- + +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: APIKey +metadata: + labels: + testing.upbound.io/example-name: stage + name: mykey +spec: + forProvider: + name: my_key + region: us-west-1 +--- +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: Deployment +metadata: + labels: + testing.upbound.io/example-name: stage + name: stage +spec: + forProvider: + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: stage +--- +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: RestAPI +metadata: + labels: + testing.upbound.io/example-name: stage + name: test-demo +spec: + forProvider: + body: |- + ${jsonencode({ + openapi = "3.0.1" + info = { + title = "example" + version = "1.0" + } + paths = { + "/path1" = { + get = { + x-amazon-apigateway-integration = { + httpMethod = "GET" + payloadFormatVersion = "1.0" + type = "HTTP_PROXY" + uri = "https://ip-ranges.amazonaws.com/ip-ranges.json" + } + } + } + } + })} + name: test-demo + region: us-west-1 +--- +apiVersion: apigateway.aws.upbound.io/v1beta2 +kind: Stage +metadata: + labels: + testing.upbound.io/example-name: stage + name: development +spec: + forProvider: + deploymentIdSelector: + matchLabels: + testing.upbound.io/example-name: stage + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: stage + stageName: development +--- +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: Stage +metadata: + labels: + testing.upbound.io/example-name: stage + name: production +spec: + forProvider: + deploymentIdSelector: + matchLabels: + testing.upbound.io/example-name: stage + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: stage + stageName: production +--- +apiVersion: apigateway.aws.upbound.io/v1beta2 +kind: MethodSettings +metadata: + labels: + testing.upbound.io/example-name: stage + name: all +spec: + forProvider: + methodPath: '*/*' + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: stage + settings: + metricsEnabled: true + stageNameSelector: + matchLabels: + testing.upbound.io/example-name: stage +--- +apiVersion: apigateway.aws.upbound.io/v1beta1 +kind: RequestValidator +metadata: + labels: + testing.upbound.io/example-name: stage + name: example +spec: + forProvider: + name: example + region: us-west-1 + restApiIdSelector: + matchLabels: + testing.upbound.io/example-name: stage + validateRequestBody: true + validateRequestParameters: true diff --git a/examples/apigatewayv2/v1beta1/api-http.yaml b/examples/apigatewayv2/v1beta1/api-http.yaml index 3b91afd0a0..e9c24e4933 100644 --- a/examples/apigatewayv2/v1beta1/api-http.yaml +++ b/examples/apigatewayv2/v1beta1/api-http.yaml @@ -5,6 +5,8 @@ apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: API metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/api name: auth-api labels: upjet.upbound.io/test-group: apigatewayv2-http @@ -13,10 +15,14 @@ spec: region: us-west-1 name: test-http-api protocolType: HTTP + --- + apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: Route metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/route name: example labels: upjet.upbound.io/test-group: apigatewayv2-http @@ -30,10 +36,14 @@ spec: targetSelector: matchLabels: upjet.upbound.io/test-group: apigatewayv2-http + --- + apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: Integration metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/integration name: example labels: upjet.upbound.io/test-group: apigatewayv2-http @@ -46,10 +56,14 @@ spec: integrationMethod: POST integrationUri: "https://api.example.com" region: us-west-1 + --- + apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: Deployment metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/deployment name: example labels: upjet.upbound.io/test-group: apigatewayv2-http @@ -60,10 +74,14 @@ spec: upjet.upbound.io/test-group: apigatewayv2-http description: Example deployment region: us-west-1 + --- + apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: Authorizer metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/authorizer name: test-authorizer labels: upjet.upbound.io/test-group: apigatewayv2-http @@ -80,10 +98,14 @@ spec: jwtConfiguration: - issuer: https://accounts.google.com/ audience: [example] + --- + apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: Stage metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/stage name: example labels: upjet.upbound.io/test-group: apigatewayv2-http diff --git a/examples/apigatewayv2/v1beta1/api-websocket.yaml b/examples/apigatewayv2/v1beta1/api-websocket.yaml index 04b2ac132e..aa1be2d555 100644 --- a/examples/apigatewayv2/v1beta1/api-websocket.yaml +++ b/examples/apigatewayv2/v1beta1/api-websocket.yaml @@ -5,6 +5,8 @@ apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: API metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/api name: websocket-api labels: upjet.upbound.io/test-group: apigatewayv2-websocket @@ -14,10 +16,14 @@ spec: protocolType: WEBSOCKET region: us-west-1 routeSelectionExpression: $request.body.action + --- + apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: Model metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/model name: example-websocket labels: upjet.upbound.io/test-group: apigatewayv2-websocket @@ -38,10 +44,14 @@ spec: "id": { "type": "string" } } } + --- + apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: Integration metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/integration name: example-websocket labels: upjet.upbound.io/test-group: apigatewayv2-websocket @@ -54,12 +64,15 @@ spec: integrationMethod: POST integrationUri: "https://api.example.com" region: us-west-1 + --- + apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: IntegrationResponse metadata: name: example-websocket annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/integrationresponse upjet.upbound.io/manual-intervention: "It requires a working Lambda function ARN and we cannot upload a working function code." labels: upjet.upbound.io/test-group: apigatewayv2-websocket @@ -73,12 +86,15 @@ spec: upjet.upbound.io/test-group: apigatewayv2-websocket integrationResponseKey: "/400/" region: us-west-1 + --- + apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: Route metadata: name: example-websocket annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/route upjet.upbound.io/manual-intervention: "It requires a working Lambda function ARN and we cannot upload a working function code." labels: upjet.upbound.io/test-group: apigatewayv2-websocket @@ -92,12 +108,15 @@ spec: targetSelector: matchLabels: upjet.upbound.io/test-group: apigatewayv2-websocket + --- + apiVersion: apigatewayv2.aws.upbound.io/v1beta1 kind: RouteResponse metadata: name: example-websocket annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/routeresponse upjet.upbound.io/manual-intervention: "Route resource this depends on requires manual intervention." labels: upjet.upbound.io/test-group: apigatewayv2-websocket diff --git a/examples/apigatewayv2/v1beta1/api.yaml b/examples/apigatewayv2/v1beta1/api.yaml new file mode 100644 index 0000000000..687d1bb158 --- /dev/null +++ b/examples/apigatewayv2/v1beta1/api.yaml @@ -0,0 +1,17 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: CC0-1.0 + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: API +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/api + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname + name: domainname-api +spec: + forProvider: + region: us-west-1 + name: test-http-api + protocolType: HTTP diff --git a/examples/apigatewayv2/v1beta1/apimapping.yaml b/examples/apigatewayv2/v1beta1/apimapping.yaml new file mode 100644 index 0000000000..85412a23ce --- /dev/null +++ b/examples/apigatewayv2/v1beta1/apimapping.yaml @@ -0,0 +1,95 @@ +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: APIMapping +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/apimapping + upjet.upbound.io/manual-intervention: "The DomainName resource should be ready and that requires a real domain." + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname + name: example +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-domainname + domainNameSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-domainname + region: us-west-1 + stageSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-domainname + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: API +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/apimapping + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname + name: domainname-api +spec: + forProvider: + region: us-west-1 + name: test-http-api + protocolType: HTTP + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: Stage +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/apimapping + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname + name: example-domainname +spec: + forProvider: + region: us-west-1 + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-domainname + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: DomainName +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/apimapping + upjet.upbound.io/manual-intervention: "The Certificate needs to be provisioned successfully which requires a real domain." + crossplane.io/external-name: example-email.upbound-providers.io + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname + name: example +spec: + forProvider: + region: us-west-1 + domainNameConfiguration: + - certificateArnSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-domainname + endpointType: REGIONAL + securityPolicy: TLS_1_2 + +--- + +apiVersion: acm.aws.upbound.io/v1beta1 +kind: Certificate +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/apimapping + upjet.upbound.io/manual-intervention: "The domain given as spec.forProvider.domainName needs to be created beforehand." + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname + name: example +spec: + forProvider: + region: us-west-1 + domainName: example-email.upbound-providers.io + tags: + Environment: test + validationMethod: EMAIL diff --git a/examples/apigatewayv2/v1beta1/domainname.yaml b/examples/apigatewayv2/v1beta1/domainname.yaml new file mode 100644 index 0000000000..68d3757d99 --- /dev/null +++ b/examples/apigatewayv2/v1beta1/domainname.yaml @@ -0,0 +1,42 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: CC0-1.0 + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: DomainName +metadata: + name: example + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/domainname + upjet.upbound.io/manual-intervention: "The Certificate needs to be provisioned successfully which requires a real domain." + crossplane.io/external-name: example-email.upbound-providers.io + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname +spec: + forProvider: + region: us-west-1 + domainNameConfiguration: + - certificateArnSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-domainname + endpointType: REGIONAL + securityPolicy: TLS_1_2 + +--- + +apiVersion: acm.aws.upbound.io/v1beta1 +kind: Certificate +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta1/domainname + upjet.upbound.io/manual-intervention: "The domain given as spec.forProvider.domainName needs to be created beforehand." + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname + name: example +spec: + forProvider: + region: us-west-1 + domainName: example-email.upbound-providers.io + tags: + Environment: test + validationMethod: EMAIL diff --git a/examples/apigatewayv2/v1beta2/api-http.yaml b/examples/apigatewayv2/v1beta2/api-http.yaml new file mode 100644 index 0000000000..1df83bc259 --- /dev/null +++ b/examples/apigatewayv2/v1beta2/api-http.yaml @@ -0,0 +1,119 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: apigatewayv2.aws.upbound.io/v1beta2 +kind: API +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + labels: + upjet.upbound.io/test-group: apigatewayv2-http + name: auth-api +spec: + forProvider: + name: test-http-api + protocolType: HTTP + region: us-west-1 + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: Route +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + labels: + upjet.upbound.io/test-group: apigatewayv2-http + name: example +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-http + region: us-west-1 + routeKey: POST /login + targetSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-http + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta2 +kind: Integration +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + labels: + upjet.upbound.io/test-group: apigatewayv2-http + name: example +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-http + integrationMethod: POST + integrationType: HTTP_PROXY + integrationUri: https://api.example.com + region: us-west-1 + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: Deployment +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + labels: + upjet.upbound.io/test-group: apigatewayv2-http + name: example +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-http + description: Example deployment + region: us-west-1 + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta2 +kind: Authorizer +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + labels: + upjet.upbound.io/test-group: apigatewayv2-http + name: test-authorizer +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-http + authorizerType: JWT + identitySources: + - $request.header.Authorization + jwtConfiguration: + audience: + - example + issuer: https://accounts.google.com/ + name: example-authorizer + region: us-west-1 + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta2 +kind: Stage +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + labels: + upjet.upbound.io/test-group: apigatewayv2-http + name: example +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-http + name: example-stage + region: us-west-1 diff --git a/examples/apigatewayv2/v1beta2/api-websocket.yaml b/examples/apigatewayv2/v1beta2/api-websocket.yaml new file mode 100644 index 0000000000..f437ccd835 --- /dev/null +++ b/examples/apigatewayv2/v1beta2/api-websocket.yaml @@ -0,0 +1,135 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: apigatewayv2.aws.upbound.io/v1beta2 +kind: API +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + labels: + upjet.upbound.io/test-group: apigatewayv2-websocket + name: websocket-api +spec: + forProvider: + name: example-websocket-api + protocolType: WEBSOCKET + region: us-west-1 + routeSelectionExpression: $request.body.action + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: Model +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + labels: + upjet.upbound.io/test-group: apigatewayv2-websocket + name: example-websocket +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-websocket + contentType: application/json + name: example + region: us-west-1 + schema: | + { + "$schema": "http://json-schema.org/draft-04/schema#", + "title": "ExampleModel", + "type": "object", + "properties": { + "id": { "type": "string" } + } + } + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta2 +kind: Integration +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + labels: + upjet.upbound.io/test-group: apigatewayv2-websocket + name: example-websocket +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-websocket + integrationMethod: POST + integrationType: HTTP + integrationUri: https://api.example.com + region: us-west-1 + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: IntegrationResponse +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + upjet.upbound.io/manual-intervention: It requires a working Lambda function ARN + and we cannot upload a working function code. + labels: + upjet.upbound.io/test-group: apigatewayv2-websocket + name: example-websocket +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-websocket + integrationIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-websocket + integrationResponseKey: /400/ + region: us-west-1 + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: Route +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + upjet.upbound.io/manual-intervention: It requires a working Lambda function ARN + and we cannot upload a working function code. + labels: + upjet.upbound.io/test-group: apigatewayv2-websocket + name: example-websocket +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-websocket + region: us-west-1 + routeKey: POST /login + targetSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-websocket + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta1 +kind: RouteResponse +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + upjet.upbound.io/manual-intervention: Route resource this depends on requires + manual intervention. + labels: + upjet.upbound.io/test-group: apigatewayv2-websocket + name: example-websocket +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-websocket + region: us-west-1 + routeIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-websocket + routeResponseKey: $default diff --git a/examples/apigatewayv2/v1beta2/api.yaml b/examples/apigatewayv2/v1beta2/api.yaml new file mode 100644 index 0000000000..a0be4984d3 --- /dev/null +++ b/examples/apigatewayv2/v1beta2/api.yaml @@ -0,0 +1,17 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: apigatewayv2.aws.upbound.io/v1beta2 +kind: API +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/api + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname + name: domainname-api +spec: + forProvider: + name: test-http-api + protocolType: HTTP + region: us-west-1 diff --git a/examples/apigatewayv2/v1beta2/domainname.yaml b/examples/apigatewayv2/v1beta2/domainname.yaml new file mode 100644 index 0000000000..659ce9385a --- /dev/null +++ b/examples/apigatewayv2/v1beta2/domainname.yaml @@ -0,0 +1,44 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: apigatewayv2.aws.upbound.io/v1beta2 +kind: DomainName +metadata: + annotations: + crossplane.io/external-name: example-email.upbound-providers.io + meta.upbound.io/example-id: apigatewayv2/v1beta2/domainname + upjet.upbound.io/manual-intervention: The Certificate needs to be provisioned + successfully which requires a real domain. + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname + name: example +spec: + forProvider: + domainNameConfiguration: + certificateArnSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-domainname + endpointType: REGIONAL + securityPolicy: TLS_1_2 + region: us-west-1 + +--- + +apiVersion: acm.aws.upbound.io/v1beta2 +kind: Certificate +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/domainname + upjet.upbound.io/manual-intervention: The domain given as spec.forProvider.domainName + needs to be created beforehand. + labels: + upjet.upbound.io/test-group: apigatewayv2-domainname + name: example +spec: + forProvider: + domainName: example-email.upbound-providers.io + region: us-west-1 + tags: + Environment: test + validationMethod: EMAIL diff --git a/examples/apigatewayv2/v1beta2/stage.yaml b/examples/apigatewayv2/v1beta2/stage.yaml new file mode 100644 index 0000000000..9059309694 --- /dev/null +++ b/examples/apigatewayv2/v1beta2/stage.yaml @@ -0,0 +1,34 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: apigatewayv2.aws.upbound.io/v1beta2 +kind: Stage +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/stage + labels: + upjet.upbound.io/test-group: apigatewayv2-http + name: example +spec: + forProvider: + apiIdSelector: + matchLabels: + upjet.upbound.io/test-group: apigatewayv2-http + region: us-west-1 + +--- + +apiVersion: apigatewayv2.aws.upbound.io/v1beta2 +kind: API +metadata: + annotations: + meta.upbound.io/example-id: apigatewayv2/v1beta2/stage + labels: + upjet.upbound.io/test-group: apigatewayv2-http + name: auth-api +spec: + forProvider: + name: test-http-api + protocolType: HTTP + region: us-west-1 diff --git a/examples/appautoscaling/v1beta1/policy.yaml b/examples/appautoscaling/v1beta1/policy.yaml index 4987b30385..583a6f1b5f 100644 --- a/examples/appautoscaling/v1beta1/policy.yaml +++ b/examples/appautoscaling/v1beta1/policy.yaml @@ -52,6 +52,8 @@ spec: apiVersion: dynamodb.aws.upbound.io/v1beta1 kind: Table metadata: + annotations: + meta.upbound.io/example-id: appautoscaling/v1beta1/policy name: table spec: forProvider: diff --git a/examples/appautoscaling/v1beta1/scheduledaction.yaml b/examples/appautoscaling/v1beta1/scheduledaction.yaml index 0f60879b5d..3273b807f0 100644 --- a/examples/appautoscaling/v1beta1/scheduledaction.yaml +++ b/examples/appautoscaling/v1beta1/scheduledaction.yaml @@ -52,6 +52,8 @@ spec: apiVersion: dynamodb.aws.upbound.io/v1beta1 kind: Table metadata: + annotations: + meta.upbound.io/example-id: appautoscaling/v1beta1/scheduledaction name: table spec: forProvider: diff --git a/examples/appautoscaling/v1beta2/policy.yaml b/examples/appautoscaling/v1beta2/policy.yaml new file mode 100644 index 0000000000..5ff47a623d --- /dev/null +++ b/examples/appautoscaling/v1beta2/policy.yaml @@ -0,0 +1,84 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appautoscaling.aws.upbound.io/v1beta2 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: appautoscaling/v1beta2/policy + labels: + testing.upbound.io/example-name: dynamodb_table_read_policy + name: dynamodb-table-read-policy +spec: + forProvider: + policyType: TargetTrackingScaling + region: us-west-1 + resourceIdSelector: + matchLabels: + testing.upbound.io/example-name: dynamodb_table_read_target + scalableDimensionSelector: + matchLabels: + testing.upbound.io/example-name: dynamodb_table_read_target + serviceNamespaceSelector: + matchLabels: + testing.upbound.io/example-name: dynamodb_table_read_target + targetTrackingScalingPolicyConfiguration: + predefinedMetricSpecification: + predefinedMetricType: DynamoDBReadCapacityUtilization + targetValue: 70 + +--- + +apiVersion: appautoscaling.aws.upbound.io/v1beta1 +kind: Target +metadata: + annotations: + meta.upbound.io/example-id: appautoscaling/v1beta2/policy + labels: + testing.upbound.io/example-name: dynamodb_table_read_target + name: dynamodb-table-read-target +spec: + forProvider: + maxCapacity: 100 + minCapacity: 5 + region: us-west-1 + resourceId: table/table + scalableDimension: dynamodb:table:ReadCapacityUnits + serviceNamespace: dynamodb + +--- + +apiVersion: dynamodb.aws.upbound.io/v1beta2 +kind: Table +metadata: + annotations: + meta.upbound.io/example-id: appautoscaling/v1beta2/policy + name: table +spec: + forProvider: + attribute: + - name: UserId + type: S + - name: GameTitle + type: S + - name: TopScore + type: "N" + billingMode: PROVISIONED + globalSecondaryIndex: + - hashKey: GameTitle + name: GameTitleIndex + nonKeyAttributes: + - UserId + projectionType: INCLUDE + rangeKey: TopScore + readCapacity: 10 + writeCapacity: 10 + hashKey: UserId + rangeKey: GameTitle + readCapacity: 20 + region: us-west-1 + tags: + Environment: production + Name: table + writeCapacity: 20 diff --git a/examples/appautoscaling/v1beta2/scheduledaction.yaml b/examples/appautoscaling/v1beta2/scheduledaction.yaml new file mode 100644 index 0000000000..2cdc6e2fb4 --- /dev/null +++ b/examples/appautoscaling/v1beta2/scheduledaction.yaml @@ -0,0 +1,84 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appautoscaling.aws.upbound.io/v1beta2 +kind: ScheduledAction +metadata: + annotations: + meta.upbound.io/example-id: appautoscaling/v1beta2/scheduledaction + labels: + testing.upbound.io/example-name: dynamodb + name: dynamodb +spec: + forProvider: + name: dynamodb + region: us-west-1 + resourceIdSelector: + matchLabels: + testing.upbound.io/example-name: dynamodb + scalableDimensionSelector: + matchLabels: + testing.upbound.io/example-name: dynamodb + scalableTargetAction: + maxCapacity: "200" + minCapacity: "1" + schedule: at(2006-01-02T15:04:05) + serviceNamespaceSelector: + matchLabels: + testing.upbound.io/example-name: dynamodb + +--- + +apiVersion: appautoscaling.aws.upbound.io/v1beta1 +kind: Target +metadata: + annotations: + meta.upbound.io/example-id: appautoscaling/v1beta2/scheduledaction + labels: + testing.upbound.io/example-name: dynamodb + name: dynamodb +spec: + forProvider: + maxCapacity: 100 + minCapacity: 5 + region: us-west-1 + resourceId: table/table + scalableDimension: dynamodb:table:ReadCapacityUnits + serviceNamespace: dynamodb + +--- + +apiVersion: dynamodb.aws.upbound.io/v1beta2 +kind: Table +metadata: + annotations: + meta.upbound.io/example-id: appautoscaling/v1beta2/scheduledaction + name: table +spec: + forProvider: + attribute: + - name: UserId + type: S + - name: GameTitle + type: S + - name: TopScore + type: "N" + billingMode: PROVISIONED + globalSecondaryIndex: + - hashKey: GameTitle + name: GameTitleIndex + nonKeyAttributes: + - UserId + projectionType: INCLUDE + rangeKey: TopScore + readCapacity: 10 + writeCapacity: 10 + hashKey: UserId + rangeKey: GameTitle + readCapacity: 20 + region: us-west-1 + tags: + Environment: production + Name: table + writeCapacity: 20 diff --git a/examples/appflow/v1beta2/flow.yaml b/examples/appflow/v1beta2/flow.yaml new file mode 100644 index 0000000000..8b7e90c8e0 --- /dev/null +++ b/examples/appflow/v1beta2/flow.yaml @@ -0,0 +1,182 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appflow.aws.upbound.io/v1beta2 +kind: Flow +metadata: + annotations: + meta.upbound.io/example-id: appflow/v1beta2/flow + upjet.upbound.io/manual-intervention: This resource depends on BucketPolicy. This + resource is skipping because the BucketPolicy resource was skipped. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + destinationFlowConfig: + - connectorType: S3 + destinationConnectorProperties: + s3: + bucketNameSelector: + matchLabels: + testing.upbound.io/example-name: example_destination + s3OutputFormatConfig: + prefixConfig: + prefixType: PATH + region: us-west-1 + sourceFlowConfig: + connectorType: S3 + sourceConnectorProperties: + s3: + bucketNameSelector: + matchLabels: + testing.upbound.io/example-name: example_source + bucketPrefix: example + task: + - connectorOperator: + - s3: NO_OP + destinationField: exampleField + sourceFields: + - exampleField + taskType: Map + triggerConfig: + triggerType: OnDemand + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: appflow/v1beta2/flow + upjet.upbound.io/manual-intervention: This resource is skipping because the parent + resource was skipped. + labels: + testing.upbound.io/example-name: example_destination + name: example-destination-${Rand.RFC1123Subdomain} +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: appflow/v1beta2/flow + upjet.upbound.io/manual-intervention: This resource is skipping because the parent + resource was skipped. + labels: + testing.upbound.io/example-name: example_source + name: example-source-${Rand.RFC1123Subdomain} +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta1 +kind: BucketPolicy +metadata: + annotations: + meta.upbound.io/example-id: appflow/v1beta2/flow + upjet.upbound.io/manual-intervention: The bucket ARN in policy should be changed + manually. + labels: + testing.upbound.io/example-name: example_destination + name: example-destination +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example_destination + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "AllowAppFlowDestinationActions", + "Effect": "Allow", + "Principal": { + "Service": "appflow.amazonaws.com" + }, + "Action": [ + "s3:PutObject", + "s3:AbortMultipartUpload", + "s3:ListMultipartUploadParts", + "s3:ListBucketMultipartUploads", + "s3:GetBucketAcl", + "s3:PutObjectAcl" + ], + "Resource": [ + "arn:aws:s3:::", + "arn:aws:s3:::/*" + ] + } + ] + } + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta1 +kind: BucketPolicy +metadata: + annotations: + meta.upbound.io/example-id: appflow/v1beta2/flow + upjet.upbound.io/manual-intervention: The bucket ARN in policy should be changed + manually. + labels: + testing.upbound.io/example-name: example_source + name: example-source +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example_source + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "AllowAppFlowSourceActions", + "Effect": "Allow", + "Principal": { + "Service": "appflow.amazonaws.com" + }, + "Action": [ + "s3:ListBucket", + "s3:GetObject" + ], + "Resource": [ + "arn:aws:s3:::", + "arn:aws:s3:::/*" + ] + + } + ] + } + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Object +metadata: + annotations: + meta.upbound.io/example-id: appflow/v1beta2/flow + upjet.upbound.io/manual-intervention: This resource is skipping because the parent + resource was skipped. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example_source + contentBase64: dGhpcyBpcyBhIHRleHQg + key: object_key + region: us-west-1 diff --git a/examples/appintegrations/v1beta2/eventintegration.yaml b/examples/appintegrations/v1beta2/eventintegration.yaml new file mode 100644 index 0000000000..57e5335818 --- /dev/null +++ b/examples/appintegrations/v1beta2/eventintegration.yaml @@ -0,0 +1,21 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appintegrations.aws.upbound.io/v1beta2 +kind: EventIntegration +metadata: + annotations: + meta.upbound.io/example-id: appintegrations/v1beta2/eventintegration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: Example Description + eventFilter: + source: aws.partner/examplepartner.com + eventbridgeBus: default + region: us-east-1 + tags: + Name: Example Event Integration diff --git a/examples/appmesh/v1beta2/gatewayroute.yaml b/examples/appmesh/v1beta2/gatewayroute.yaml new file mode 100644 index 0000000000..81f7a244e1 --- /dev/null +++ b/examples/appmesh/v1beta2/gatewayroute.yaml @@ -0,0 +1,122 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: GatewayRoute +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/gatewayroute + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + meshName: simple + name: example-gateway-route + region: us-west-1 + spec: + httpRoute: + action: + target: + virtualService: + virtualServiceNameSelector: + matchLabels: + testing.upbound.io/example-name: servicea + match: + prefix: / + tags: + Environment: test + virtualGatewayNameSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualGateway +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/gatewayroute + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + meshName: simple + name: example-virtual-gateway + region: us-west-1 + spec: + listener: + - portMapping: + port: 8080 + protocol: http + tags: + Environment: test + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: Mesh +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/gatewayroute + labels: + testing.upbound.io/example-name: simple + name: simple +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualService +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/gatewayroute + labels: + testing.upbound.io/example-name: servicea + name: servicea +spec: + forProvider: + meshNameSelector: + matchLabels: + testing.upbound.io/example-name: simple + name: servicea.simpleapp.local + region: us-west-1 + spec: + provider: + virtualNode: + virtualNodeNameSelector: + matchLabels: + testing.upbound.io/example-name: serviceb1 + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualNode +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/gatewayroute + labels: + testing.upbound.io/example-name: serviceb1 + name: serviceb1 +spec: + forProvider: + meshNameSelector: + matchLabels: + testing.upbound.io/example-name: simple + name: serviceBv1 + region: us-west-1 + spec: + backend: + - virtualService: + virtualServiceName: servicea.simpleapp.local + listener: + - portMapping: + port: 8080 + protocol: http + serviceDiscovery: + dns: + hostname: serviceb.simpleapp.local diff --git a/examples/appmesh/v1beta2/mesh.yaml b/examples/appmesh/v1beta2/mesh.yaml new file mode 100644 index 0000000000..2cd7640f36 --- /dev/null +++ b/examples/appmesh/v1beta2/mesh.yaml @@ -0,0 +1,15 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: Mesh +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/mesh + labels: + testing.upbound.io/example-name: simple + name: simple +spec: + forProvider: + region: us-west-1 diff --git a/examples/appmesh/v1beta2/route.yaml b/examples/appmesh/v1beta2/route.yaml new file mode 100644 index 0000000000..336d26b3bf --- /dev/null +++ b/examples/appmesh/v1beta2/route.yaml @@ -0,0 +1,131 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: Route +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/route + labels: + testing.upbound.io/example-name: serviceb + name: serviceb +spec: + forProvider: + meshNameSelector: + matchLabels: + testing.upbound.io/example-name: simple + name: serviceB-route + region: us-west-1 + spec: + httpRoute: + action: + weightedTarget: + - virtualNodeSelector: + matchLabels: + testing.upbound.io/example-name: serviceb1 + weight: 90 + - virtualNodeSelector: + matchLabels: + testing.upbound.io/example-name: serviceb2 + weight: 10 + match: + prefix: / + virtualRouterNameSelector: + matchLabels: + testing.upbound.io/example-name: serviceb + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualNode +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/route + labels: + testing.upbound.io/example-name: serviceb1 + name: serviceb1 +spec: + forProvider: + meshNameSelector: + matchLabels: + testing.upbound.io/example-name: simple + name: serviceBv1 + region: us-west-1 + spec: + backend: + - virtualService: + virtualServiceName: servicea.simpleapp.local + listener: + - portMapping: + port: 8080 + protocol: http + serviceDiscovery: + dns: + hostname: serviceb.simpleapp.local + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: Mesh +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/route + labels: + testing.upbound.io/example-name: simple + name: simple +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualNode +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/route + labels: + testing.upbound.io/example-name: serviceb2 + name: serviceb2 +spec: + forProvider: + meshNameSelector: + matchLabels: + testing.upbound.io/example-name: simple + name: serviceBv2 + region: us-west-1 + spec: + backend: + - virtualService: + virtualServiceName: servicea2.simpleapp.local + listener: + - portMapping: + port: 8080 + protocol: http + serviceDiscovery: + dns: + hostname: serviceb2.simpleapp.local + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualRouter +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/route + labels: + testing.upbound.io/example-name: serviceb + name: serviceb +spec: + forProvider: + meshNameSelector: + matchLabels: + testing.upbound.io/example-name: simple + name: serviceB + region: us-west-1 + spec: + listener: + - portMapping: + port: 8080 + protocol: http diff --git a/examples/appmesh/v1beta2/virtualgateway.yaml b/examples/appmesh/v1beta2/virtualgateway.yaml new file mode 100644 index 0000000000..2ace58220c --- /dev/null +++ b/examples/appmesh/v1beta2/virtualgateway.yaml @@ -0,0 +1,38 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualGateway +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/virtualgateway + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + meshName: simple + name: example-virtual-gateway + region: us-west-1 + spec: + listener: + - portMapping: + port: 8080 + protocol: http + tags: + Environment: test + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: Mesh +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/virtualgateway + labels: + testing.upbound.io/example-name: simple + name: simple +spec: + forProvider: + region: us-west-1 diff --git a/examples/appmesh/v1beta2/virtualnode.yaml b/examples/appmesh/v1beta2/virtualnode.yaml new file mode 100644 index 0000000000..b0bdc63062 --- /dev/null +++ b/examples/appmesh/v1beta2/virtualnode.yaml @@ -0,0 +1,44 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualNode +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/virtualnode + labels: + testing.upbound.io/example-name: serviceb1 + name: serviceb1 +spec: + forProvider: + meshNameSelector: + matchLabels: + testing.upbound.io/example-name: simple + name: serviceBv1 + region: us-west-1 + spec: + backend: + - virtualService: + virtualServiceName: servicea.simpleapp.local + listener: + - portMapping: + port: 8080 + protocol: http + serviceDiscovery: + dns: + hostname: serviceb.simpleapp.local + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: Mesh +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/virtualnode + labels: + testing.upbound.io/example-name: simple + name: simple +spec: + forProvider: + region: us-west-1 diff --git a/examples/appmesh/v1beta2/virtualrouter.yaml b/examples/appmesh/v1beta2/virtualrouter.yaml new file mode 100644 index 0000000000..03912c8661 --- /dev/null +++ b/examples/appmesh/v1beta2/virtualrouter.yaml @@ -0,0 +1,38 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualRouter +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/virtualrouter + labels: + testing.upbound.io/example-name: serviceb + name: serviceb +spec: + forProvider: + meshNameSelector: + matchLabels: + testing.upbound.io/example-name: simple + name: serviceB + region: us-west-1 + spec: + listener: + - portMapping: + port: 8080 + protocol: http + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: Mesh +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/virtualrouter + labels: + testing.upbound.io/example-name: simple + name: simple +spec: + forProvider: + region: us-west-1 diff --git a/examples/appmesh/v1beta2/virtualservice.yaml b/examples/appmesh/v1beta2/virtualservice.yaml new file mode 100644 index 0000000000..ccf54f5f6d --- /dev/null +++ b/examples/appmesh/v1beta2/virtualservice.yaml @@ -0,0 +1,68 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualService +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/virtualservice + labels: + testing.upbound.io/example-name: servicea + name: servicea +spec: + forProvider: + meshNameSelector: + matchLabels: + testing.upbound.io/example-name: simple + name: servicea.simpleapp.local + region: us-west-1 + spec: + provider: + virtualNode: + virtualNodeNameSelector: + matchLabels: + testing.upbound.io/example-name: serviceb1 + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: Mesh +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/virtualservice + labels: + testing.upbound.io/example-name: simple + name: simple +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: appmesh.aws.upbound.io/v1beta2 +kind: VirtualNode +metadata: + annotations: + meta.upbound.io/example-id: appmesh/v1beta2/virtualservice + labels: + testing.upbound.io/example-name: serviceb1 + name: serviceb1 +spec: + forProvider: + meshNameSelector: + matchLabels: + testing.upbound.io/example-name: simple + name: serviceBv1 + region: us-west-1 + spec: + backend: + - virtualService: + virtualServiceName: servicea.simpleapp.local + listener: + - portMapping: + port: 8080 + protocol: http + serviceDiscovery: + dns: + hostname: serviceb.simpleapp.local diff --git a/examples/apprunner/v1beta2/observabilityconfiguration.yaml b/examples/apprunner/v1beta2/observabilityconfiguration.yaml new file mode 100644 index 0000000000..00744893d0 --- /dev/null +++ b/examples/apprunner/v1beta2/observabilityconfiguration.yaml @@ -0,0 +1,20 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: apprunner.aws.upbound.io/v1beta2 +kind: ObservabilityConfiguration +metadata: + annotations: + meta.upbound.io/example-id: apprunner/v1beta2/observabilityconfiguration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + observabilityConfigurationName: example + region: us-east-1 + tags: + Name: example-apprunner-observability-configuration + traceConfiguration: + vendor: AWSXRAY diff --git a/examples/apprunner/v1beta2/service.yaml b/examples/apprunner/v1beta2/service.yaml new file mode 100644 index 0000000000..7aa90bf46b --- /dev/null +++ b/examples/apprunner/v1beta2/service.yaml @@ -0,0 +1,25 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: apprunner.aws.upbound.io/v1beta2 +kind: Service +metadata: + annotations: + meta.upbound.io/example-id: apprunner/v1beta2/service + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-east-1 + serviceName: example + sourceConfiguration: + autoDeploymentsEnabled: false + imageRepository: + imageConfiguration: + port: "8000" + imageIdentifier: public.ecr.aws/aws-containers/hello-app-runner:latest + imageRepositoryType: ECR_PUBLIC + tags: + Name: example-apprunner-service diff --git a/examples/appstream/v1beta2/directoryconfig.yaml b/examples/appstream/v1beta2/directoryconfig.yaml new file mode 100644 index 0000000000..d6d208343b --- /dev/null +++ b/examples/appstream/v1beta2/directoryconfig.yaml @@ -0,0 +1,35 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appstream.aws.upbound.io/v1beta2 +kind: DirectoryConfig +metadata: + annotations: + meta.upbound.io/example-id: appstream/v1beta2/directoryconfig + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + directoryName: corp.example.com + organizationalUnitDistinguishedNames: + - DISTINGUISHED NAME + region: us-east-1 + serviceAccountCredentials: + accountName: DOMAIN\username + accountPasswordSecretRef: + key: credentials + name: example-secret + namespace: upbound-system + +--- + +apiVersion: v1 +kind: Secret +metadata: + name: example-secret + namespace: upbound-system +stringData: + credentials: change-me +type: Opaque diff --git a/examples/appstream/v1beta2/fleet.yaml b/examples/appstream/v1beta2/fleet.yaml new file mode 100644 index 0000000000..a38206e793 --- /dev/null +++ b/examples/appstream/v1beta2/fleet.yaml @@ -0,0 +1,63 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appstream.aws.upbound.io/v1beta2 +kind: Fleet +metadata: + annotations: + meta.upbound.io/example-id: appstream/v1beta2/fleet + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + computeCapacity: + desiredInstances: 1 + description: test fleet + displayName: test-fleet + enableDefaultInternetAccess: false + fleetType: ON_DEMAND + idleDisconnectTimeoutInSeconds: 60 + imageName: Amazon-AppStream2-Sample-Image-02-04-2019 + instanceType: stream.standard.large + maxUserDurationInSeconds: 960 + name: test-fleet + region: us-east-1 + tags: + TagName: tag-value + vpcConfig: + subnetIdRefs: + - name: sample-subnet1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: appstream/v1beta2/fleet + name: sample-subnet1 +spec: + forProvider: + availabilityZone: us-east-1b + cidrBlock: 172.16.10.0/24 + region: us-east-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: appstream/v1beta2/fleet + name: sample-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-east-1 + tags: + Name: DemoVpc diff --git a/examples/appstream/v1beta2/imagebuilder.yaml b/examples/appstream/v1beta2/imagebuilder.yaml new file mode 100644 index 0000000000..8fb4e63cc5 --- /dev/null +++ b/examples/appstream/v1beta2/imagebuilder.yaml @@ -0,0 +1,57 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appstream.aws.upbound.io/v1beta2 +kind: ImageBuilder +metadata: + annotations: + meta.upbound.io/example-id: appstream/v1beta2/imagebuilder + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: Description of a ImageBuilder + displayName: Display name of a ImageBuilder + enableDefaultInternetAccess: false + imageArn: arn:aws:appstream:us-east-1::image/Amazon-AppStream2-Sample-Image-02-04-2019 + instanceType: stream.standard.large + region: us-east-1 + tags: + Name: Example Image Builder + vpcConfig: + subnetIdRefs: + - name: sample-subnet1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: appstream/v1beta2/imagebuilder + name: sample-subnet1 +spec: + forProvider: + availabilityZone: us-east-1b + cidrBlock: 172.16.10.0/24 + region: us-east-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: appstream/v1beta2/imagebuilder + name: sample-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-east-1 + tags: + Name: DemoVpc diff --git a/examples/appstream/v1beta2/stack.yaml b/examples/appstream/v1beta2/stack.yaml new file mode 100644 index 0000000000..fd5e66597f --- /dev/null +++ b/examples/appstream/v1beta2/stack.yaml @@ -0,0 +1,36 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appstream.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: appstream/v1beta2/stack + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + applicationSettings: + enabled: true + settingsGroup: SettingsGroup + description: stack description + displayName: stack display name + feedbackUrl: https://aws.amazon.com + name: new-test-stack-example + redirectUrl: https://aws.amazon.com + region: us-east-1 + storageConnectors: + - connectorType: HOMEFOLDERS + tags: + TagName: TagValue + userSettings: + - action: CLIPBOARD_COPY_FROM_LOCAL_DEVICE + permission: ENABLED + - action: CLIPBOARD_COPY_TO_LOCAL_DEVICE + permission: ENABLED + - action: FILE_UPLOAD + permission: ENABLED + - action: FILE_DOWNLOAD + permission: ENABLED diff --git a/examples/appsync/v1beta2/datasource.yaml b/examples/appsync/v1beta2/datasource.yaml new file mode 100644 index 0000000000..50a6523cbf --- /dev/null +++ b/examples/appsync/v1beta2/datasource.yaml @@ -0,0 +1,88 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appsync.aws.upbound.io/v1beta2 +kind: Datasource +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/datasource + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + apiIdSelector: + matchLabels: + testing.upbound.io/example-name: example + dynamodbConfig: + tableNameSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + serviceRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + type: AMAZON_DYNAMODB + +--- + +apiVersion: appsync.aws.upbound.io/v1beta2 +kind: GraphQLAPI +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/datasource + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + authenticationType: API_KEY + name: tf_appsync_example + region: us-west-1 + +--- + +apiVersion: dynamodb.aws.upbound.io/v1beta2 +kind: Table +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/datasource + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + attribute: + - name: UserId + type: S + hashKey: UserId + readCapacity: 1 + region: us-west-1 + writeCapacity: 1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/datasource + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "appsync.amazonaws.com" + }, + "Effect": "Allow" + } + ] + } diff --git a/examples/appsync/v1beta2/function.yaml b/examples/appsync/v1beta2/function.yaml new file mode 100644 index 0000000000..0a7a505db8 --- /dev/null +++ b/examples/appsync/v1beta2/function.yaml @@ -0,0 +1,91 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appsync.aws.upbound.io/v1beta2 +kind: Function +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/function + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + apiIdSelector: + matchLabels: + testing.upbound.io/example-name: example + dataSourceSelector: + matchLabels: + testing.upbound.io/example-name: example + name: example + region: us-west-1 + requestMappingTemplate: | + { + "version": "2018-05-29", + "method": "GET", + "resourcePath": "/", + "params":{ + "headers": $utils.http.copyheaders($ctx.request.headers) + } + } + responseMappingTemplate: | + #if($ctx.result.statusCode == 200) + $ctx.result.body + #else + $utils.appendError($ctx.result.body, $ctx.result.statusCode) + #end + +--- + +apiVersion: appsync.aws.upbound.io/v1beta2 +kind: Datasource +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/function + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + apiIdSelector: + matchLabels: + testing.upbound.io/example-name: example + httpConfig: + endpoint: http://example.com + region: us-west-1 + type: HTTP + +--- + +apiVersion: appsync.aws.upbound.io/v1beta2 +kind: GraphQLAPI +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/function + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + authenticationType: API_KEY + name: example + region: us-west-1 + schema: | + type Mutation { + putPost(id: ID!, title: String!): Post + } + + type Post { + id: ID! + title: String! + } + + type Query { + singlePost(id: ID!): Post + } + + schema { + query: Query + mutation: Mutation + } diff --git a/examples/appsync/v1beta2/graphqlapi.yaml b/examples/appsync/v1beta2/graphqlapi.yaml new file mode 100644 index 0000000000..360db0d367 --- /dev/null +++ b/examples/appsync/v1beta2/graphqlapi.yaml @@ -0,0 +1,17 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appsync.aws.upbound.io/v1beta2 +kind: GraphQLAPI +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/graphqlapi + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + authenticationType: API_KEY + name: example + region: us-west-1 diff --git a/examples/appsync/v1beta2/resolver.yaml b/examples/appsync/v1beta2/resolver.yaml new file mode 100644 index 0000000000..efef46da88 --- /dev/null +++ b/examples/appsync/v1beta2/resolver.yaml @@ -0,0 +1,97 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: appsync.aws.upbound.io/v1beta2 +kind: Resolver +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/resolver + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + apiIdSelector: + matchLabels: + testing.upbound.io/example-name: test + cachingConfig: + cachingKeys: + - $context.identity.sub + - $context.arguments.id + ttl: 60 + dataSourceSelector: + matchLabels: + testing.upbound.io/example-name: test + field: singlePost + region: us-west-1 + requestTemplate: | + { + "version": "2018-05-29", + "method": "GET", + "resourcePath": "/", + "params":{ + "headers": $utils.http.copyheaders($ctx.request.headers) + } + } + responseTemplate: | + #if($ctx.result.statusCode == 200) + $ctx.result.body + #else + $utils.appendError($ctx.result.body, $ctx.result.statusCode) + #end + type: Query + +--- + +apiVersion: appsync.aws.upbound.io/v1beta2 +kind: Datasource +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/resolver + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + apiIdSelector: + matchLabels: + testing.upbound.io/example-name: test + httpConfig: + endpoint: http://example.com + region: us-west-1 + type: HTTP + +--- + +apiVersion: appsync.aws.upbound.io/v1beta2 +kind: GraphQLAPI +metadata: + annotations: + meta.upbound.io/example-id: appsync/v1beta2/resolver + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + authenticationType: API_KEY + name: tf-example + region: us-west-1 + schema: | + type Mutation { + putPost(id: ID!, title: String!): Post + } + + type Post { + id: ID! + title: String! + } + + type Query { + singlePost(id: ID!): Post + } + + schema { + query: Query + mutation: Mutation + } diff --git a/examples/athena/v1beta1/database.yaml b/examples/athena/v1beta1/database.yaml index fde16010c3..1d13b9f976 100644 --- a/examples/athena/v1beta1/database.yaml +++ b/examples/athena/v1beta1/database.yaml @@ -5,6 +5,8 @@ apiVersion: athena.aws.upbound.io/v1beta1 kind: Database metadata: + annotations: + meta.upbound.io/example-id: athena/v1beta1/database labels: testing.upbound.io/example-name: example name: example @@ -20,6 +22,8 @@ spec: apiVersion: s3.aws.upbound.io/v1beta1 kind: Bucket metadata: + annotations: + meta.upbound.io/example-id: athena/v1beta1/database labels: testing.upbound.io/example-name: upbound-example name: ${Rand.RFC1123Subdomain} diff --git a/examples/athena/v1beta1/workgroup.yaml b/examples/athena/v1beta1/workgroup.yaml index 0c83e8522b..f4960f3d79 100644 --- a/examples/athena/v1beta1/workgroup.yaml +++ b/examples/athena/v1beta1/workgroup.yaml @@ -5,6 +5,8 @@ apiVersion: athena.aws.upbound.io/v1beta1 kind: Workgroup metadata: + annotations: + meta.upbound.io/example-id: athena/v1beta1/workgroup labels: testing.upbound.io/example-name: test name: test @@ -25,6 +27,8 @@ spec: apiVersion: kms.aws.upbound.io/v1beta1 kind: Key metadata: + annotations: + meta.upbound.io/example-id: athena/v1beta1/workgroup labels: testing.upbound.io/example-name: test name: test diff --git a/examples/athena/v1beta2/database.yaml b/examples/athena/v1beta2/database.yaml new file mode 100644 index 0000000000..3aa3fa6899 --- /dev/null +++ b/examples/athena/v1beta2/database.yaml @@ -0,0 +1,33 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: athena.aws.upbound.io/v1beta2 +kind: Database +metadata: + annotations: + meta.upbound.io/example-id: athena/v1beta2/database + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: upbound-example + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: athena/v1beta2/database + labels: + testing.upbound.io/example-name: upbound-example + name: ${Rand.RFC1123Subdomain} +spec: + forProvider: + forceDestroy: true + region: us-west-1 diff --git a/examples/athena/v1beta2/workgroup.yaml b/examples/athena/v1beta2/workgroup.yaml new file mode 100644 index 0000000000..fbb343f97d --- /dev/null +++ b/examples/athena/v1beta2/workgroup.yaml @@ -0,0 +1,39 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: athena.aws.upbound.io/v1beta2 +kind: Workgroup +metadata: + annotations: + meta.upbound.io/example-id: athena/v1beta2/workgroup + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + configuration: + resultConfiguration: + encryptionConfiguration: + encryptionOption: SSE_KMS + kmsKeyArnSelector: + matchLabels: + testing.upbound.io/example-name: test + outputLocation: s3://upbound-example/output/ + region: us-west-1 + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: athena/v1beta2/workgroup + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + deletionWindowInDays: 7 + description: Athena KMS Key + region: us-west-1 diff --git a/examples/autoscaling/v1beta2/attachment.yaml b/examples/autoscaling/v1beta2/attachment.yaml index 66a0ad96eb..e08b146524 100644 --- a/examples/autoscaling/v1beta2/attachment.yaml +++ b/examples/autoscaling/v1beta2/attachment.yaml @@ -6,7 +6,7 @@ apiVersion: autoscaling.aws.upbound.io/v1beta2 kind: Attachment metadata: annotations: - meta.upbound.io/example-id: autoscaling/v1beta1/attachment + meta.upbound.io/example-id: autoscaling/v1beta2/attachment labels: testing.upbound.io/example-name: example name: asg-attachment-bar @@ -21,11 +21,12 @@ spec: region: us-west-1 --- -apiVersion: autoscaling.aws.upbound.io/v1beta2 + +apiVersion: autoscaling.aws.upbound.io/v1beta3 kind: AutoscalingGroup metadata: annotations: - meta.upbound.io/example-id: autoscaling/v1beta1/attachment + meta.upbound.io/example-id: autoscaling/v1beta2/attachment labels: testing.upbound.io/example-name: asg name: attachment-example @@ -45,11 +46,12 @@ spec: value: "true" --- -apiVersion: autoscaling.aws.upbound.io/v1beta1 + +apiVersion: autoscaling.aws.upbound.io/v1beta2 kind: LaunchConfiguration metadata: annotations: - meta.upbound.io/example-id: autoscaling/v1beta1/attachment + meta.upbound.io/example-id: autoscaling/v1beta2/attachment labels: testing.upbound.io/example-name: attachment-example name: attachment-example @@ -60,11 +62,12 @@ spec: region: us-west-1 --- -apiVersion: elb.aws.upbound.io/v1beta1 + +apiVersion: elb.aws.upbound.io/v1beta2 kind: ELB metadata: annotations: - meta.upbound.io/example-id: autoscaling/v1beta1/attachment + meta.upbound.io/example-id: autoscaling/v1beta2/attachment labels: testing.upbound.io/example-name: bar name: attachment-example diff --git a/examples/autoscaling/v1beta2/grouptag.yaml b/examples/autoscaling/v1beta2/grouptag.yaml new file mode 100644 index 0000000000..ef777ff032 --- /dev/null +++ b/examples/autoscaling/v1beta2/grouptag.yaml @@ -0,0 +1,66 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: autoscaling.aws.upbound.io/v1beta2 +kind: GroupTag +metadata: + annotations: + meta.upbound.io/example-id: autoscaling/v1beta2/grouptag + upjet.upbound.io/manual-intervention: This resource depends on AutoscalingGroup + with manual intervention. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + autoscalingGroupName: example + region: us-west-1 + tag: + key: k8s.io/cluster-autoscaler/node-template/label/eks.amazonaws.com/capacityType + propagateAtLaunch: false + value: SPOT + +--- + +apiVersion: autoscaling.aws.upbound.io/v1beta3 +kind: AutoscalingGroup +metadata: + annotations: + meta.upbound.io/example-id: autoscaling/v1beta2/grouptag + upjet.upbound.io/manual-intervention: This resource depends on LaunchConfiguration + with manual intervention. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + availabilityZones: + - us-west-1b + launchConfigurationSelector: + matchLabels: + testing.upbound.io/example-name: as_conf + maxSize: 1 + minSize: 1 + region: us-west-1 + tag: + - key: AmazonECSManaged + propagateAtLaunch: true + value: "true" + +--- + +apiVersion: autoscaling.aws.upbound.io/v1beta2 +kind: LaunchConfiguration +metadata: + annotations: + meta.upbound.io/example-id: autoscaling/v1beta2/grouptag + upjet.upbound.io/manual-intervention: This resource refers to an AMI ID. + labels: + testing.upbound.io/example-name: as_conf + name: as-conf +spec: + forProvider: + imageId: ami-0a1a70369f0fce06a + instanceType: t2.micro + region: us-west-1 diff --git a/examples/autoscaling/v1beta2/launchconfiguration.yaml b/examples/autoscaling/v1beta2/launchconfiguration.yaml new file mode 100644 index 0000000000..57e3bfee4c --- /dev/null +++ b/examples/autoscaling/v1beta2/launchconfiguration.yaml @@ -0,0 +1,17 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: autoscaling.aws.upbound.io/v1beta2 +kind: LaunchConfiguration +metadata: + annotations: + meta.upbound.io/example-id: autoscaling/v1beta2/launchconfiguration + labels: + testing.upbound.io/example-name: as_conf + name: as-conf +spec: + forProvider: + imageId: ami-0454207e5367abf01 + instanceType: t2.micro + region: us-west-1 diff --git a/examples/autoscaling/v1beta2/policy.yaml b/examples/autoscaling/v1beta2/policy.yaml new file mode 100644 index 0000000000..f214bd31cf --- /dev/null +++ b/examples/autoscaling/v1beta2/policy.yaml @@ -0,0 +1,71 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: autoscaling.aws.upbound.io/v1beta2 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: autoscaling/v1beta2/policy + upjet.upbound.io/manual-intervention: This resource depends on AutoscalingGroup + with manual intervention. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + adjustmentType: ChangeInCapacity + autoscalingGroupNameSelector: + matchLabels: + testing.upbound.io/example-name: example + cooldown: 300 + region: us-west-1 + scalingAdjustment: 4 + +--- + +apiVersion: autoscaling.aws.upbound.io/v1beta3 +kind: AutoscalingGroup +metadata: + annotations: + meta.upbound.io/example-id: autoscaling/v1beta2/policy + upjet.upbound.io/manual-intervention: This resource depends on LaunchConfiguration + with manual intervention. + labels: + testing.upbound.io/example-name: example + name: upbound-example-test +spec: + forProvider: + availabilityZones: + - us-west-1a + forceDelete: true + healthCheckGracePeriod: 300 + healthCheckType: ELB + launchConfigurationSelector: + matchLabels: + testing.upbound.io/example-name: as_conf + maxSize: 5 + minSize: 2 + region: us-west-1 + tag: + - key: AmazonECSManaged + propagateAtLaunch: true + value: "true" + waitForCapacityTimeout: "0" + +--- + +apiVersion: autoscaling.aws.upbound.io/v1beta2 +kind: LaunchConfiguration +metadata: + annotations: + meta.upbound.io/example-id: autoscaling/v1beta2/policy + upjet.upbound.io/manual-intervention: This resource refers to an AMI ID. + labels: + testing.upbound.io/example-name: as_conf + name: as-conf +spec: + forProvider: + imageId: ${data.aws_ami.ubuntu.id} + instanceType: t2.micro + region: us-west-1 diff --git a/examples/autoscaling/v1beta3/autoscalinggroup.yaml b/examples/autoscaling/v1beta3/autoscalinggroup.yaml new file mode 100644 index 0000000000..1384220886 --- /dev/null +++ b/examples/autoscaling/v1beta3/autoscalinggroup.yaml @@ -0,0 +1,42 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: autoscaling.aws.upbound.io/v1beta3 +kind: AutoscalingGroup +metadata: + annotations: + meta.upbound.io/example-id: autoscaling/v1beta3/autoscalinggroup + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + availabilityZones: + - us-west-1b + launchConfigurationSelector: + matchLabels: + testing.upbound.io/example-name: autoscalinggroup-example + maxSize: 1 + minSize: 1 + region: us-west-1 + tag: + - key: AmazonECSManaged + propagateAtLaunch: true + value: "true" + +--- + +apiVersion: autoscaling.aws.upbound.io/v1beta2 +kind: LaunchConfiguration +metadata: + annotations: + meta.upbound.io/example-id: autoscaling/v1beta3/autoscalinggroup + labels: + testing.upbound.io/example-name: autoscalinggroup-example + name: autoscalinggroup-example +spec: + forProvider: + imageId: ami-0454207e5367abf01 + instanceType: t2.micro + region: us-west-1 diff --git a/examples/autoscalingplans/v1beta2/scalingplan.yaml b/examples/autoscalingplans/v1beta2/scalingplan.yaml new file mode 100644 index 0000000000..9401e04716 --- /dev/null +++ b/examples/autoscalingplans/v1beta2/scalingplan.yaml @@ -0,0 +1,78 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: autoscalingplans.aws.upbound.io/v1beta2 +kind: ScalingPlan +metadata: + annotations: + meta.upbound.io/example-id: autoscalingplans/v1beta2/scalingplan + upjet.upbound.io/manual-intervention: This resource depends on AutoscalingGroup + with manual intervention. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + applicationSource: + tagFilter: + - key: application + values: + - example + name: example-dynamic-cost-optimization + region: us-west-1 + scalingInstruction: + - maxCapacity: 3 + minCapacity: 0 + resourceId: autoScalingGroup/example + scalableDimension: autoscaling:autoScalingGroup:DesiredCapacity + serviceNamespace: autoscaling + targetTrackingConfiguration: + - predefinedScalingMetricSpecification: + predefinedScalingMetricType: ASGAverageCPUUtilization + targetValue: 70 + +--- + +apiVersion: autoscaling.aws.upbound.io/v1beta3 +kind: AutoscalingGroup +metadata: + annotations: + meta.upbound.io/example-id: autoscalingplans/v1beta2/scalingplan + upjet.upbound.io/manual-intervention: This resource depends on LaunchConfiguration + with manual intervention. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + availabilityZones: + - us-west-1b + desiredCapacity: 1 + launchConfigurationSelector: + matchLabels: + testing.upbound.io/example-name: as_conf + maxSize: 1 + minSize: 1 + region: us-west-1 + tag: + - key: AmazonECSManaged + propagateAtLaunch: true + value: "true" + +--- + +apiVersion: autoscaling.aws.upbound.io/v1beta2 +kind: LaunchConfiguration +metadata: + annotations: + meta.upbound.io/example-id: autoscalingplans/v1beta2/scalingplan + upjet.upbound.io/manual-intervention: This resource refers to an AMI ID. + labels: + testing.upbound.io/example-name: as_conf + name: as-conf +spec: + forProvider: + imageId: ami-0430743863c514c80 + instanceType: t2.micro + region: us-west-1 diff --git a/examples/backup/v1beta1/framework.yaml b/examples/backup/v1beta1/framework.yaml index 155fb81767..6ec0d828a4 100644 --- a/examples/backup/v1beta1/framework.yaml +++ b/examples/backup/v1beta1/framework.yaml @@ -5,6 +5,8 @@ apiVersion: backup.aws.upbound.io/v1beta1 kind: Framework metadata: + annotations: + meta.upbound.io/example-id: backup/v1beta1/framework name: example spec: forProvider: diff --git a/examples/backup/v1beta1/reportplan.yaml b/examples/backup/v1beta1/reportplan.yaml index ec4c356de9..5de98f0c99 100644 --- a/examples/backup/v1beta1/reportplan.yaml +++ b/examples/backup/v1beta1/reportplan.yaml @@ -5,6 +5,8 @@ apiVersion: backup.aws.upbound.io/v1beta1 kind: ReportPlan metadata: + annotations: + meta.upbound.io/example-id: backup/v1beta1/reportplan name: example spec: forProvider: diff --git a/examples/backup/v1beta2/framework.yaml b/examples/backup/v1beta2/framework.yaml new file mode 100644 index 0000000000..8a619ba234 --- /dev/null +++ b/examples/backup/v1beta2/framework.yaml @@ -0,0 +1,36 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: backup.aws.upbound.io/v1beta2 +kind: Framework +metadata: + annotations: + meta.upbound.io/example-id: backup/v1beta2/framework + name: example +spec: + forProvider: + control: + - inputParameter: + - name: requiredRetentionDays + value: "35" + name: BACKUP_RECOVERY_POINT_MINIMUM_RETENTION_CHECK + - inputParameter: + - name: requiredFrequencyUnit + value: hours + - name: requiredRetentionDays + value: "35" + - name: requiredFrequencyValue + value: "1" + name: BACKUP_PLAN_MIN_FREQUENCY_AND_MIN_RETENTION_CHECK + - name: BACKUP_RECOVERY_POINT_ENCRYPTED + - name: BACKUP_RESOURCES_PROTECTED_BY_BACKUP_PLAN + scope: + complianceResourceTypes: + - EBS + - name: BACKUP_RECOVERY_POINT_MANUAL_DELETION_DISABLED + description: this is an example framework + name: exampleFramework + region: us-west-1 + tags: + Name: Example Framework diff --git a/examples/backup/v1beta2/plan.yaml b/examples/backup/v1beta2/plan.yaml new file mode 100644 index 0000000000..9123cef8da --- /dev/null +++ b/examples/backup/v1beta2/plan.yaml @@ -0,0 +1,55 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: CC0-1.0 + +apiVersion: backup.aws.upbound.io/v1beta2 +kind: Plan +metadata: + name: example + labels: + testing.upbound.io/example-name: vault +spec: + forProvider: + region: us-west-1 + advancedBackupSetting: + - backupOptions: + WindowsVSS: enabled + resourceType: EC2 + name: test-${Rand.RFC1123Subdomain} + rule: + - lifecycle: + deleteAfter: 14 + ruleName: up_example_backup_rule + schedule: cron(0 12 * * ? *) + targetVaultNameSelector: + matchLabels: + testing.upbound.io/example-name: vault + +--- + +apiVersion: backup.aws.upbound.io/v1beta1 +kind: Vault +metadata: + name: test-${Rand.RFC1123Subdomain} + labels: + testing.upbound.io/example-name: vault +spec: + forProvider: + region: us-west-1 + kmsKeyArnSelector: + matchLabels: + testing.upbound.io/example-name: vault + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + labels: + testing.upbound.io/example-name: vault + name: kmskey +spec: + forProvider: + deletionWindowInDays: 10 + description: KMS key 1 + region: us-west-1 \ No newline at end of file diff --git a/examples/backup/v1beta2/reportplan.yaml b/examples/backup/v1beta2/reportplan.yaml new file mode 100644 index 0000000000..6e94671fea --- /dev/null +++ b/examples/backup/v1beta2/reportplan.yaml @@ -0,0 +1,24 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: backup.aws.upbound.io/v1beta2 +kind: ReportPlan +metadata: + annotations: + meta.upbound.io/example-id: backup/v1beta2/reportplan + name: example +spec: + forProvider: + description: example description + name: example_name + region: us-west-1 + reportDeliveryChannel: + formats: + - CSV + - JSON + s3BucketName: example-bucket-name + reportSetting: + reportTemplate: RESTORE_JOB_REPORT + tags: + Name: Example Report Plan diff --git a/examples/batch/v1beta2/jobdefinition.yaml b/examples/batch/v1beta2/jobdefinition.yaml new file mode 100644 index 0000000000..3d63ead900 --- /dev/null +++ b/examples/batch/v1beta2/jobdefinition.yaml @@ -0,0 +1,63 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: batch.aws.upbound.io/v1beta2 +kind: JobDefinition +metadata: + annotations: + meta.upbound.io/example-id: batch/v1beta2/jobdefinition + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + containerProperties: |- + { + "command": [ + "ls", + "-la" + ], + "environment": [ + { + "name": "VARNAME", + "value": "VARVAL" + } + ], + "image": "busybox", + "mountPoints": [ + { + "containerPath": "/tmp", + "readOnly": false, + "sourceVolume": "tmp" + } + ], + "resourceRequirements": [ + { + "type": "VCPU", + "value": "1" + }, + { + "type": "MEMORY", + "value": "512" + } + ], + "ulimits": [ + { + "hardLimit": 1024, + "name": "nofile", + "softLimit": 1024 + } + ], + "volumes": [ + { + "host": { + "sourcePath": "/tmp" + }, + "name": "tmp" + } + ] + } + name: tf_test_batch_job_definition + region: us-west-1 + type: container diff --git a/examples/batch/v1beta2/schedulingpolicy.yaml b/examples/batch/v1beta2/schedulingpolicy.yaml new file mode 100644 index 0000000000..35decfe94a --- /dev/null +++ b/examples/batch/v1beta2/schedulingpolicy.yaml @@ -0,0 +1,25 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: batch.aws.upbound.io/v1beta2 +kind: SchedulingPolicy +metadata: + annotations: + meta.upbound.io/example-id: batch/v1beta2/schedulingpolicy + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + fairSharePolicy: + computeReservation: 1 + shareDecaySeconds: 3600 + shareDistribution: + - shareIdentifier: A1* + weightFactor: 0.1 + - shareIdentifier: A2 + weightFactor: 0.2 + region: us-west-1 + tags: + Name: Example Batch Scheduling Policy diff --git a/examples/budgets/v1beta2/budget.yaml b/examples/budgets/v1beta2/budget.yaml new file mode 100644 index 0000000000..3529e72174 --- /dev/null +++ b/examples/budgets/v1beta2/budget.yaml @@ -0,0 +1,20 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: budgets.aws.upbound.io/v1beta2 +kind: Budget +metadata: + annotations: + meta.upbound.io/example-id: budgets/v1beta2/budget + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + budgetType: USAGE + limitAmount: "10.0" + limitUnit: dollars + region: us-west-1 + timePeriodStart: 2006-01-02_15:04 + timeUnit: MONTHLY diff --git a/examples/budgets/v1beta2/budgetaction.yaml b/examples/budgets/v1beta2/budgetaction.yaml new file mode 100644 index 0000000000..65d47d9d3a --- /dev/null +++ b/examples/budgets/v1beta2/budgetaction.yaml @@ -0,0 +1,113 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: budgets.aws.upbound.io/v1beta2 +kind: BudgetAction +metadata: + annotations: + meta.upbound.io/example-id: budgets/v1beta2/budgetaction + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + actionThreshold: + actionThresholdType: ABSOLUTE_VALUE + actionThresholdValue: 100 + actionType: APPLY_IAM_POLICY + approvalModel: AUTOMATIC + budgetNameSelector: + matchLabels: + testing.upbound.io/example-name: example + definition: + iamActionDefinition: + policyArnSelector: + matchLabels: + testing.upbound.io/example-name: example + roles: + - ${aws_iam_role.example.name} + executionRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + notificationType: ACTUAL + region: us-west-1 + subscriber: + - address: example@example.example + subscriptionType: EMAIL + +--- + +apiVersion: budgets.aws.upbound.io/v1beta2 +kind: Budget +metadata: + annotations: + meta.upbound.io/example-id: budgets/v1beta2/budgetaction + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + budgetType: USAGE + limitAmount: "10.0" + limitUnit: dollars + region: us-west-1 + timePeriodStart: 2006-01-02_15:04 + timeUnit: MONTHLY + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: budgets/v1beta2/budgetaction + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: My example policy + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": [ + "ec2:Describe*" + ], + "Effect": "Allow", + "Resource": "*" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: budgets/v1beta2/budgetaction + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": [ + "budgets.amazonaws.com" + ] + }, + "Action": [ + "sts:AssumeRole" + ] + } + ] + } diff --git a/examples/chime/v1beta2/voiceconnectorstreaming.yaml b/examples/chime/v1beta2/voiceconnectorstreaming.yaml new file mode 100644 index 0000000000..db5b3b8b8a --- /dev/null +++ b/examples/chime/v1beta2/voiceconnectorstreaming.yaml @@ -0,0 +1,37 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: chime.aws.upbound.io/v1beta2 +kind: VoiceConnectorStreaming +metadata: + annotations: + meta.upbound.io/example-id: chime/v1beta2/voiceconnectorstreaming + labels: + testing.upbound.io/example-name: default + name: default +spec: + forProvider: + dataRetention: 7 + disabled: false + region: us-west-1 + streamingNotificationTargets: + - SQS + voiceConnectorIdSelector: + matchLabels: + testing.upbound.io/example-name: default + +--- + +apiVersion: chime.aws.upbound.io/v1beta1 +kind: VoiceConnector +metadata: + annotations: + meta.upbound.io/example-id: chime/v1beta2/voiceconnectorstreaming + labels: + testing.upbound.io/example-name: default + name: default +spec: + forProvider: + region: us-west-1 + requireEncryption: true diff --git a/examples/cloudformation/v1beta2/stackset.yaml b/examples/cloudformation/v1beta2/stackset.yaml new file mode 100644 index 0000000000..50fa89f287 --- /dev/null +++ b/examples/cloudformation/v1beta2/stackset.yaml @@ -0,0 +1,67 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudformation.aws.upbound.io/v1beta2 +kind: StackSet +metadata: + annotations: + meta.upbound.io/example-id: cloudformation/v1beta2/stackset + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + administrationRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: AWSCloudFormationStackSetAdministrationRole + parameters: + VPCCidr: 10.0.0.0/16 + region: us-west-1 + templateBody: | + { + "Parameters" : { + "VPCCidr" : { + "Type" : "String", + "Default" : "10.0.0.0/16", + "Description" : "Enter the CIDR block for the VPC. Default is 10.0.0.0/16." + } + }, + "Resources" : { + "myVpc": { + "Type" : "AWS::EC2::VPC", + "Properties" : { + "CidrBlock" : { "Ref" : "VPCCidr" }, + "Tags" : [ + {"Key": "Name", "Value": "Primary_CF_VPC"} + ] + } + } + } + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: cloudformation/v1beta2/stackset + labels: + testing.upbound.io/example-name: AWSCloudFormationStackSetAdministrationRole + name: awscloudformationstacksetadministrationrole +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "cloudformation.amazonaws.com" + }, + "Effect": "Allow" + } + ] + } diff --git a/examples/cloudformation/v1beta2/stacksetinstance.yaml b/examples/cloudformation/v1beta2/stacksetinstance.yaml new file mode 100644 index 0000000000..1aee9f15ba --- /dev/null +++ b/examples/cloudformation/v1beta2/stacksetinstance.yaml @@ -0,0 +1,85 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudformation.aws.upbound.io/v1beta2 +kind: StackSetInstance +metadata: + annotations: + meta.upbound.io/example-id: cloudformation/v1beta2/stacksetinstance + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + accountId: ${data.aws_account_id} + region: us-west-1 + stackSetNameSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: cloudformation.aws.upbound.io/v1beta2 +kind: StackSet +metadata: + annotations: + meta.upbound.io/example-id: cloudformation/v1beta2/stacksetinstance + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + administrationRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: AWSCloudFormationStackSetAdministrationRole + parameters: + VPCCidr: 10.0.0.0/16 + region: us-west-1 + templateBody: | + { + "Parameters" : { + "VPCCidr" : { + "Type" : "String", + "Default" : "10.0.0.0/16", + "Description" : "Enter the CIDR block for the VPC. Default is 10.0.0.0/16." + } + }, + "Resources" : { + "myVpc": { + "Type" : "AWS::EC2::VPC", + "Properties" : { + "CidrBlock" : { "Ref" : "VPCCidr" }, + "Tags" : [ + {"Key": "Name", "Value": "Primary_CF_VPC"} + ] + } + } + } + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: cloudformation/v1beta2/stacksetinstance + labels: + testing.upbound.io/example-name: AWSCloudFormationStackSetAdministrationRole + name: awscloudformationstacksetadministrationrole +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "cloudformation.amazonaws.com" + }, + "Effect": "Allow" + } + ] + } diff --git a/examples/cloudfront/v1beta1/cachepolicy.yaml b/examples/cloudfront/v1beta1/cachepolicy.yaml index d6aa018683..f2a40b404c 100644 --- a/examples/cloudfront/v1beta1/cachepolicy.yaml +++ b/examples/cloudfront/v1beta1/cachepolicy.yaml @@ -5,9 +5,11 @@ apiVersion: cloudfront.aws.upbound.io/v1beta1 kind: CachePolicy metadata: - name: example-policy + annotations: + meta.upbound.io/example-id: cloudfront/v1beta1/cachepolicy labels: testing.upbound.io/example-name: cachepolicy + name: example-policy spec: forProvider: region: us-west-1 diff --git a/examples/cloudfront/v1beta1/distribution.yaml b/examples/cloudfront/v1beta1/distribution.yaml index 2ee6b3b7df..7fcd57042a 100644 --- a/examples/cloudfront/v1beta1/distribution.yaml +++ b/examples/cloudfront/v1beta1/distribution.yaml @@ -5,9 +5,11 @@ apiVersion: cloudfront.aws.upbound.io/v1beta1 kind: Distribution metadata: - name: example-distribution + annotations: + meta.upbound.io/example-id: cloudfront/v1beta1/distribution labels: testing.upbound.io/example-name: distribution + name: example-distribution spec: forProvider: region: us-west-1 @@ -100,10 +102,14 @@ spec: Environment: production viewerCertificate: - cloudfrontDefaultCertificate: true + --- + apiVersion: cloudfront.aws.upbound.io/v1beta1 kind: MonitoringSubscription metadata: + annotations: + meta.upbound.io/example-id: cloudfront/v1beta1/distribution name: example-monitoring-subscription spec: forProvider: diff --git a/examples/cloudfront/v1beta1/originrequestpolicy.yaml b/examples/cloudfront/v1beta1/originrequestpolicy.yaml index 7f17cc6457..e60b5db33f 100644 --- a/examples/cloudfront/v1beta1/originrequestpolicy.yaml +++ b/examples/cloudfront/v1beta1/originrequestpolicy.yaml @@ -5,6 +5,8 @@ apiVersion: cloudfront.aws.upbound.io/v1beta1 kind: OriginRequestPolicy metadata: + annotations: + meta.upbound.io/example-id: cloudfront/v1beta1/originrequestpolicy name: example-origin-request-policy spec: forProvider: diff --git a/examples/cloudfront/v1beta2/cachepolicy.yaml b/examples/cloudfront/v1beta2/cachepolicy.yaml new file mode 100644 index 0000000000..a6014f66f3 --- /dev/null +++ b/examples/cloudfront/v1beta2/cachepolicy.yaml @@ -0,0 +1,36 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudfront.aws.upbound.io/v1beta2 +kind: CachePolicy +metadata: + annotations: + meta.upbound.io/example-id: cloudfront/v1beta2/cachepolicy + labels: + testing.upbound.io/example-name: cachepolicy + name: example-policy +spec: + forProvider: + comment: test comment + defaultTtl: 50 + maxTtl: 100 + minTtl: 1 + name: example-policy + parametersInCacheKeyAndForwardedToOrigin: + cookiesConfig: + cookieBehavior: whitelist + cookies: + items: + - example + headersConfig: + headerBehavior: whitelist + headers: + items: + - example + queryStringsConfig: + queryStringBehavior: whitelist + queryStrings: + items: + - example + region: us-west-1 diff --git a/examples/cloudfront/v1beta2/distribution.yaml b/examples/cloudfront/v1beta2/distribution.yaml new file mode 100644 index 0000000000..5365544177 --- /dev/null +++ b/examples/cloudfront/v1beta2/distribution.yaml @@ -0,0 +1,122 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudfront.aws.upbound.io/v1beta2 +kind: Distribution +metadata: + annotations: + meta.upbound.io/example-id: cloudfront/v1beta2/distribution + labels: + testing.upbound.io/example-name: distribution + name: example-distribution +spec: + forProvider: + comment: Some comment + defaultCacheBehavior: + allowedMethods: + - DELETE + - GET + - HEAD + - OPTIONS + - PATCH + - POST + - PUT + cachedMethods: + - GET + - HEAD + defaultTtl: 3600 + forwardedValues: + cookies: + forward: none + queryString: false + maxTtl: 86400 + minTtl: 0 + targetOriginId: customOrigin + viewerProtocolPolicy: allow-all + defaultRootObject: index.html + enabled: true + isIpv6Enabled: true + orderedCacheBehavior: + - allowedMethods: + - GET + - HEAD + - OPTIONS + cachedMethods: + - GET + - HEAD + - OPTIONS + compress: true + defaultTtl: 86400 + forwardedValues: + cookies: + forward: none + headers: + - Origin + queryString: false + maxTtl: 31536000 + minTtl: 0 + pathPattern: /content/immutable/* + targetOriginId: customOrigin + viewerProtocolPolicy: redirect-to-https + - allowedMethods: + - GET + - HEAD + - OPTIONS + cachedMethods: + - GET + - HEAD + compress: true + defaultTtl: 3600 + forwardedValues: + cookies: + forward: none + queryString: false + maxTtl: 86400 + minTtl: 0 + pathPattern: /content/* + targetOriginId: customOrigin + viewerProtocolPolicy: redirect-to-https + origin: + - customOriginConfig: + httpPort: 80 + httpsPort: 443 + originKeepaliveTimeout: 5 + originProtocolPolicy: https-only + originReadTimeout: 10 + originSslProtocols: + - TLSv1.2 + domainName: app.my.cloud + originId: customOrigin + priceClass: PriceClass_200 + region: us-west-1 + restrictions: + geoRestriction: + locations: + - US + - CA + - GB + - DE + restrictionType: whitelist + tags: + Environment: production + viewerCertificate: + cloudfrontDefaultCertificate: true + +--- + +apiVersion: cloudfront.aws.upbound.io/v1beta2 +kind: MonitoringSubscription +metadata: + annotations: + meta.upbound.io/example-id: cloudfront/v1beta2/distribution + name: example-monitoring-subscription +spec: + forProvider: + distributionIdSelector: + matchLabels: + testing.upbound.io/example-name: distribution + monitoringSubscription: + realtimeMetricsSubscriptionConfig: + realtimeMetricsSubscriptionStatus: Enabled + region: us-west-1 diff --git a/examples/cloudfront/v1beta2/fieldlevelencryptionconfig.yaml b/examples/cloudfront/v1beta2/fieldlevelencryptionconfig.yaml new file mode 100644 index 0000000000..a7cb8dd9a5 --- /dev/null +++ b/examples/cloudfront/v1beta2/fieldlevelencryptionconfig.yaml @@ -0,0 +1,90 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: CC0-1.0 + +apiVersion: cloudfront.aws.upbound.io/v1beta2 +kind: FieldLevelEncryptionConfig +metadata: + name: example-field-level-encryption-config + labels: + testing.upbound.io/example-name: publickey +spec: + forProvider: + region: us-west-1 + comment: test comment + contentTypeProfileConfig: + contentTypeProfiles: + items: + - contentType: application/x-www-form-urlencoded + format: URLEncoded + forwardWhenContentTypeIsUnknown: true + queryArgProfileConfig: + forwardWhenQueryArgProfileIsUnknown: true + queryArgProfiles: + items: + - profileIdSelector: + matchLabels: + testing.upbound.io/example-name: publickey + queryArg: Arg1 + +--- + +apiVersion: cloudfront.aws.upbound.io/v1beta2 +kind: FieldLevelEncryptionProfile +metadata: + name: example-field-level-encryption-profile + labels: + testing.upbound.io/example-name: publickey +spec: + forProvider: + region: us-west-1 + comment: test comment + encryptionEntities: + items: + - fieldPatterns: + - items: + - DateOfBirth + providerId: testprovider + publicKeyIdSelector: + matchLabels: + testing.upbound.io/example-name: publickey + name: ${Rand.RFC1123Subdomain} + +--- + +apiVersion: cloudfront.aws.upbound.io/v1beta1 +kind: PublicKey +metadata: + name: example-public-key + labels: + testing.upbound.io/example-name: publickey +spec: + forProvider: + region: us-west-1 + comment: test public key + encodedKeySecretRef: + name: publickeysecret + namespace: upbound-system + key: publickeyPEM + name: test_key + +--- + +apiVersion: v1 +kind: Secret +metadata: + name: publickeysecret + namespace: upbound-system +type: Opaque +stringData: + # Generated with `openssl genrsa -out key.pem && openssl rsa -pubout -in key.pem -out pubkey.pem && cat pubkey.pem` + publickeyPEM: | + -----BEGIN PUBLIC KEY----- + MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyYW973T/iOLjnf2bGnds + FvoAI4lS2kHC1zBnRKmYRMZv/nFpXrf60qI88rT7Uyh/00Md6E3kjvcSWw+lUmJv + yhMUKjypxemDPNILTtR4r92snr9IpN9pJZoaL2y3Muc1ShDzX/ELwNHmT7diqfzc + GaXExShrFAbqMFEEoOtk6htzLZz9UwkyTVrefxDRmDPGtTpO46pILb7tUnPvypqW + ofZix+YGqnT6hPxIqOG9D9qGASb+ziRJLBe8fssfAdc+fZM6zaMmiBj7bORFxr5Q + 3L4KCoce9D7Da5wLn788TWeL4mV8mj2o4uzuCuQXVnAFtmIEjznffp2Q8z1BnBmj + ywIDAQAB + -----END PUBLIC KEY----- diff --git a/examples/cloudfront/v1beta2/fieldlevelencryptionprofile.yaml b/examples/cloudfront/v1beta2/fieldlevelencryptionprofile.yaml new file mode 100644 index 0000000000..826fc082c0 --- /dev/null +++ b/examples/cloudfront/v1beta2/fieldlevelencryptionprofile.yaml @@ -0,0 +1,63 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: CC0-1.0 + +apiVersion: cloudfront.aws.upbound.io/v1beta2 +kind: FieldLevelEncryptionProfile +metadata: + name: example-field-level-encryption-profile + labels: + testing.upbound.io/example-name: publickey +spec: + forProvider: + region: us-west-1 + comment: test comment + encryptionEntities: + items: + - fieldPatterns: + - items: + - DateOfBirth + providerId: testprovider + publicKeyIdSelector: + matchLabels: + testing.upbound.io/example-name: publickey + name: ${Rand.RFC1123Subdomain} + +--- + +apiVersion: cloudfront.aws.upbound.io/v1beta1 +kind: PublicKey +metadata: + name: example-public-key + labels: + testing.upbound.io/example-name: publickey +spec: + forProvider: + region: us-west-1 + comment: test public key + encodedKeySecretRef: + name: publickeysecret + namespace: upbound-system + key: publickeyPEM + name: test_key + +--- + +apiVersion: v1 +kind: Secret +metadata: + name: publickeysecret + namespace: upbound-system +type: Opaque +stringData: + # Generated with `openssl genrsa -out key.pem && openssl rsa -pubout -in key.pem -out pubkey.pem && cat pubkey.pem` + publickeyPEM: | + -----BEGIN PUBLIC KEY----- + MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAyYW973T/iOLjnf2bGnds + FvoAI4lS2kHC1zBnRKmYRMZv/nFpXrf60qI88rT7Uyh/00Md6E3kjvcSWw+lUmJv + yhMUKjypxemDPNILTtR4r92snr9IpN9pJZoaL2y3Muc1ShDzX/ELwNHmT7diqfzc + GaXExShrFAbqMFEEoOtk6htzLZz9UwkyTVrefxDRmDPGtTpO46pILb7tUnPvypqW + ofZix+YGqnT6hPxIqOG9D9qGASb+ziRJLBe8fssfAdc+fZM6zaMmiBj7bORFxr5Q + 3L4KCoce9D7Da5wLn788TWeL4mV8mj2o4uzuCuQXVnAFtmIEjznffp2Q8z1BnBmj + ywIDAQAB + -----END PUBLIC KEY----- diff --git a/examples/cloudfront/v1beta2/originrequestpolicy.yaml b/examples/cloudfront/v1beta2/originrequestpolicy.yaml new file mode 100644 index 0000000000..11ef698c2d --- /dev/null +++ b/examples/cloudfront/v1beta2/originrequestpolicy.yaml @@ -0,0 +1,29 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudfront.aws.upbound.io/v1beta2 +kind: OriginRequestPolicy +metadata: + annotations: + meta.upbound.io/example-id: cloudfront/v1beta2/originrequestpolicy + name: example-origin-request-policy +spec: + forProvider: + comment: example comment + cookiesConfig: + cookieBehavior: whitelist + cookies: + items: + - example + headersConfig: + headerBehavior: whitelist + headers: + items: + - example + queryStringsConfig: + queryStringBehavior: whitelist + queryStrings: + items: + - example + region: us-west-1 diff --git a/examples/cloudfront/v1beta2/realtimelogconfig.yaml b/examples/cloudfront/v1beta2/realtimelogconfig.yaml new file mode 100644 index 0000000000..2d40682b52 --- /dev/null +++ b/examples/cloudfront/v1beta2/realtimelogconfig.yaml @@ -0,0 +1,78 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudfront.aws.upbound.io/v1beta2 +kind: RealtimeLogConfig +metadata: + annotations: + meta.upbound.io/example-id: cloudfront/v1beta2/realtimelogconfig + labels: + testing.upbound.io/example-name: realtimelogconfig + name: example +spec: + forProvider: + endpoint: + kinesisStreamConfig: + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: realtimelogconfig + streamArnSelector: + matchLabels: + testing.upbound.io/example-name: realtimelogconfig + streamType: Kinesis + fields: + - timestamp + - c-ip + name: example-${Rand.RFC1123Subdomain} + region: us-west-1 + samplingRate: 75 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: cloudfront/v1beta2/realtimelogconfig + labels: + testing.upbound.io/example-name: realtimelogconfig + name: test-${Rand.RFC1123Subdomain} +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "cloudfront.amazonaws.com" + }, + "Effect": "Allow" + } + ] + } + +--- + +apiVersion: kinesis.aws.upbound.io/v1beta2 +kind: Stream +metadata: + annotations: + meta.upbound.io/example-id: cloudfront/v1beta2/realtimelogconfig + labels: + testing.upbound.io/example-name: realtimelogconfig + name: example-${Rand.RFC1123Subdomain} +spec: + forProvider: + region: us-west-1 + retentionPeriod: 48 + shardCount: 1 + shardLevelMetrics: + - IncomingBytes + - OutgoingBytes + streamModeDetails: + streamMode: PROVISIONED + tags: + Environment: test diff --git a/examples/cloudfront/v1beta2/responseheaderspolicy.yaml b/examples/cloudfront/v1beta2/responseheaderspolicy.yaml new file mode 100644 index 0000000000..2ce618cda4 --- /dev/null +++ b/examples/cloudfront/v1beta2/responseheaderspolicy.yaml @@ -0,0 +1,27 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudfront.aws.upbound.io/v1beta2 +kind: ResponseHeadersPolicy +metadata: + annotations: + meta.upbound.io/example-id: cloudfront/v1beta2/responseheaderspolicy + name: example-response-headers-policy +spec: + forProvider: + comment: test comment + corsConfig: + accessControlAllowCredentials: true + accessControlAllowHeaders: + items: + - test + accessControlAllowMethods: + items: + - GET + accessControlAllowOrigins: + items: + - test.example.comtest + originOverride: true + name: example-policy + region: us-west-1 diff --git a/examples/cloudsearch/v1beta2/domain.yaml b/examples/cloudsearch/v1beta2/domain.yaml new file mode 100644 index 0000000000..1282b44e6a --- /dev/null +++ b/examples/cloudsearch/v1beta2/domain.yaml @@ -0,0 +1,64 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudsearch.aws.upbound.io/v1beta2 +kind: Domain +metadata: + annotations: + meta.upbound.io/example-id: cloudsearch/v1beta2/domain + uptest.upbound.io/timeout: "5400" + labels: + testing.upbound.io/example-name: domain + name: example-${Rand.RFC1123Subdomain} +spec: + forProvider: + indexField: + - analysisScheme: _en_default_ + highlight: false + name: headline + return: true + search: true + sort: true + type: text + - facet: true + name: price + return: true + search: true + sort: true + type: double + region: us-west-1 + scalingParameters: + desiredInstanceType: search.medium + +--- + +apiVersion: cloudsearch.aws.upbound.io/v1beta1 +kind: DomainServiceAccessPolicy +metadata: + annotations: + meta.upbound.io/example-id: cloudsearch/v1beta2/domain + uptest.upbound.io/timeout: "5400" + labels: + testing.upbound.io/example-name: domain + name: example-${Rand.RFC1123Subdomain} +spec: + forProvider: + accessPolicy: | + { + "Version":"2012-10-17", + "Statement":[{ + "Sid":"search_only", + "Effect":"Allow", + "Principal":"*", + "Action":[ + "cloudsearch:search", + "cloudsearch:document" + ], + "Condition":{"IpAddress":{"aws:SourceIp":"192.0.2.0/32"}} + }] + } + domainNameSelector: + matchLabels: + testing.upbound.io/example-name: domain + region: us-west-1 diff --git a/examples/cloudwatch/v1beta2/compositealarm.yaml b/examples/cloudwatch/v1beta2/compositealarm.yaml new file mode 100644 index 0000000000..1a60e3e005 --- /dev/null +++ b/examples/cloudwatch/v1beta2/compositealarm.yaml @@ -0,0 +1,26 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudwatch.aws.upbound.io/v1beta2 +kind: CompositeAlarm +metadata: + annotations: + meta.upbound.io/example-id: cloudwatch/v1beta2/compositealarm + upjet.upbound.io/manual-intervention: This resource requires manual intervention. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + alarmActionsSelector: + matchLabels: + testing.upbound.io/example-name: example + alarmDescription: This is a composite alarm! + alarmRule: | + ALARM(${aws_cloudwatch_metric_alarm.alpha.alarm_name}) OR + ALARM(${aws_cloudwatch_metric_alarm.bravo.alarm_name}) + okActionsSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 diff --git a/examples/cloudwatch/v1beta2/metricalarm.yaml b/examples/cloudwatch/v1beta2/metricalarm.yaml new file mode 100644 index 0000000000..8b30220c1b --- /dev/null +++ b/examples/cloudwatch/v1beta2/metricalarm.yaml @@ -0,0 +1,24 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudwatch.aws.upbound.io/v1beta2 +kind: MetricAlarm +metadata: + annotations: + meta.upbound.io/example-id: cloudwatch/v1beta2/metricalarm + labels: + testing.upbound.io/example-name: foobar + name: foobar +spec: + forProvider: + alarmDescription: This metric monitors ec2 cpu utilization + comparisonOperator: GreaterThanOrEqualToThreshold + evaluationPeriods: 2 + insufficientDataActions: [] + metricName: CPUUtilization + namespace: AWS/EC2 + period: 120 + region: us-west-1 + statistic: Average + threshold: 80 diff --git a/examples/cloudwatchevents/v1beta2/connection.yaml b/examples/cloudwatchevents/v1beta2/connection.yaml new file mode 100644 index 0000000000..926788d83b --- /dev/null +++ b/examples/cloudwatchevents/v1beta2/connection.yaml @@ -0,0 +1,33 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudwatchevents.aws.upbound.io/v1beta2 +kind: Connection +metadata: + annotations: + meta.upbound.io/example-id: cloudwatchevents/v1beta2/connection + name: test +spec: + forProvider: + authParameters: + apiKey: + key: x-signature + valueSecretRef: + key: example-key + name: example-secret + namespace: upbound-system + authorizationType: API_KEY + description: A connection description + region: us-west-1 + +--- + +apiVersion: v1 +kind: Secret +metadata: + name: example-secret + namespace: upbound-system +stringData: + example-key: dummysecretdata +type: Opaque diff --git a/examples/cloudwatchevents/v1beta2/permission.yaml b/examples/cloudwatchevents/v1beta2/permission.yaml new file mode 100644 index 0000000000..1964359212 --- /dev/null +++ b/examples/cloudwatchevents/v1beta2/permission.yaml @@ -0,0 +1,32 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudwatchevents.aws.upbound.io/v1beta2 +kind: Permission +metadata: + annotations: + meta.upbound.io/example-id: cloudwatchevents/v1beta2/permission + name: devaccountaccess +spec: + forProvider: + eventBusNameSelector: + matchLabels: + testing.upbound.io/example-name: access + principal: ${data.aws_account_id} + region: us-west-1 + statementId: DevAccountAccess + +--- + +apiVersion: cloudwatchevents.aws.upbound.io/v1beta1 +kind: Bus +metadata: + annotations: + meta.upbound.io/example-id: cloudwatchevents/v1beta2/permission + labels: + testing.upbound.io/example-name: access + name: access +spec: + forProvider: + region: us-west-1 diff --git a/examples/cloudwatchevents/v1beta2/target.yaml b/examples/cloudwatchevents/v1beta2/target.yaml new file mode 100644 index 0000000000..721c1d355b --- /dev/null +++ b/examples/cloudwatchevents/v1beta2/target.yaml @@ -0,0 +1,92 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudwatchevents.aws.upbound.io/v1beta2 +kind: Target +metadata: + annotations: + meta.upbound.io/example-id: cloudwatchevents/v1beta2/target + upjet.upbound.io/manual-intervention: This resource needs arn of Topic. + name: aws-login +spec: + forProvider: + arn: arn:aws:sns:${data.aws_region}:${data.aws_account_id}:topic + eventBusNameSelector: + matchLabels: + testing.upbound.io/example-name: target-bus + region: us-west-1 + ruleSelector: + matchLabels: + testing.upbound.io/example-name: login-rule + targetId: aws-login + +--- + +apiVersion: cloudwatchevents.aws.upbound.io/v1beta1 +kind: Rule +metadata: + annotations: + meta.upbound.io/example-id: cloudwatchevents/v1beta2/target + upjet.upbound.io/manual-intervention: This resource is necessary to create the + root resource. + labels: + testing.upbound.io/example-name: login-rule + name: login-rule +spec: + forProvider: + description: Capture all EC2 scaling events + eventBusNameSelector: + matchLabels: + testing.upbound.io/example-name: target-bus + eventPattern: | + { + "detail-type": [ + "AWS Console Sign In via CloudTrail" + ] + } + region: us-west-1 + +--- + +apiVersion: sns.aws.upbound.io/v1beta1 +kind: Topic +metadata: + annotations: + meta.upbound.io/example-id: cloudwatchevents/v1beta2/target + upjet.upbound.io/manual-intervention: This resource is necessary to create the + root resource. + labels: + testing.upbound.io/example-name: topic + name: topic +spec: + forProvider: + policy: | + { + "Version":"2012-10-17", + "Statement":[{ + "Effect": "Allow", + "Principal": { + "Service": "events.amazonaws.com" + }, + "Action": "SNS:Publish", + "Resource": "arn:aws:sns:*:*:topic" + }] + } + region: us-west-1 + +--- + +apiVersion: cloudwatchevents.aws.upbound.io/v1beta1 +kind: Bus +metadata: + annotations: + meta.upbound.io/example-id: cloudwatchevents/v1beta2/target + upjet.upbound.io/manual-intervention: This resource is necessary to create the + root resource. + labels: + testing.upbound.io/example-name: target-bus + name: target-bus +spec: + forProvider: + region: us-west-1 diff --git a/examples/cloudwatchlogs/v1beta2/metricfilter.yaml b/examples/cloudwatchlogs/v1beta2/metricfilter.yaml new file mode 100644 index 0000000000..4cc2754e04 --- /dev/null +++ b/examples/cloudwatchlogs/v1beta2/metricfilter.yaml @@ -0,0 +1,37 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cloudwatchlogs.aws.upbound.io/v1beta2 +kind: MetricFilter +metadata: + annotations: + meta.upbound.io/example-id: cloudwatchlogs/v1beta2/metricfilter + labels: + testing.upbound.io/example-name: yada + name: test +spec: + forProvider: + logGroupNameSelector: + matchLabels: + testing.upbound.io/example-name: dada + metricTransformation: + name: EventCount + namespace: YourNamespace + value: "1" + pattern: "" + region: us-west-1 + +--- + +apiVersion: cloudwatchlogs.aws.upbound.io/v1beta1 +kind: Group +metadata: + annotations: + meta.upbound.io/example-id: cloudwatchlogs/v1beta2/metricfilter + labels: + testing.upbound.io/example-name: dada + name: test +spec: + forProvider: + region: us-west-1 diff --git a/examples/codepipeline/v1beta2/customactiontype.yaml b/examples/codepipeline/v1beta2/customactiontype.yaml new file mode 100644 index 0000000000..7fbc97766a --- /dev/null +++ b/examples/codepipeline/v1beta2/customactiontype.yaml @@ -0,0 +1,24 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: codepipeline.aws.upbound.io/v1beta2 +kind: CustomActionType +metadata: + annotations: + meta.upbound.io/example-id: codepipeline/v1beta2/customactiontype + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + category: Test + inputArtifactDetails: + maximumCount: 1 + minimumCount: 0 + outputArtifactDetails: + maximumCount: 1 + minimumCount: 0 + providerName: example + region: us-west-1 + version: "1" diff --git a/examples/codepipeline/v1beta2/webhook.yaml b/examples/codepipeline/v1beta2/webhook.yaml new file mode 100644 index 0000000000..30b4150bc7 --- /dev/null +++ b/examples/codepipeline/v1beta2/webhook.yaml @@ -0,0 +1,145 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: codepipeline.aws.upbound.io/v1beta2 +kind: Webhook +metadata: + annotations: + meta.upbound.io/example-id: codepipeline/v1beta2/webhook + labels: + testing.upbound.io/example-name: codepipeline + name: codepipeline-webhook +spec: + forProvider: + authentication: GITHUB_HMAC + authenticationConfiguration: + secretTokenSecretRef: + key: example-key + name: example-secret-webhook + namespace: upbound-system + filter: + - jsonPath: $.ref + matchEquals: refs/heads/{Branch} + region: us-west-1 + targetAction: Source + targetPipelineSelector: + matchLabels: + testing.upbound.io/example-name: codepipeline + +--- + +apiVersion: v1 +kind: Secret +metadata: + name: example-secret-webhook + namespace: upbound-system +stringData: + example-key: super-secret +type: Opaque + +--- + +apiVersion: codepipeline.aws.upbound.io/v1beta2 +kind: Codepipeline +metadata: + annotations: + meta.upbound.io/example-id: codepipeline/v1beta2/webhook + labels: + testing.upbound.io/example-name: codepipeline + name: codepipeline +spec: + forProvider: + artifactStore: + - locationSelector: + matchLabels: + testing.upbound.io/example-name: codepipeline_bucket + type: S3 + region: us-west-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: codepipeline_role + stage: + - action: + - category: Source + configuration: + Branch: master + OAuthToken: your-token-here + Owner: my-organization + Repo: test + name: Source + outputArtifacts: + - test + owner: ThirdParty + provider: GitHub + version: "1" + name: Source + - action: + - category: Build + configuration: + ProjectName: test + inputArtifacts: + - test + name: Build + outputArtifacts: + - build_output + owner: AWS + provider: CodeBuild + version: "1" + name: Build + - action: + - category: Deploy + configuration: + ActionMode: REPLACE_ON_FAILURE + Capabilities: CAPABILITY_AUTO_EXPAND,CAPABILITY_IAM + OutputFileName: CreateStackOutput.json + StackName: MyStack + TemplatePath: build_output::sam-templated.yaml + inputArtifacts: + - build_output + name: Deploy + owner: AWS + provider: CloudFormation + version: "1" + name: Deploy + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: codepipeline/v1beta2/webhook + labels: + testing.upbound.io/example-name: codepipeline_role + name: codepipeline-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "codepipeline.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: codepipeline/v1beta2/webhook + labels: + testing.upbound.io/example-name: codepipeline_bucket + name: codepipeline-bucket +spec: + forProvider: + region: us-west-1 diff --git a/examples/codestarconnections/v1beta2/host.yaml b/examples/codestarconnections/v1beta2/host.yaml new file mode 100644 index 0000000000..466622371c --- /dev/null +++ b/examples/codestarconnections/v1beta2/host.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: codestarconnections.aws.upbound.io/v1beta2 +kind: Host +metadata: + annotations: + meta.upbound.io/example-id: codestarconnections/v1beta2/host + labels: + testing.upbound.io/example-name: host-example + name: host-example +spec: + forProvider: + name: example-host + providerEndpoint: https://example.com + providerType: GitHubEnterpriseServer + region: us-west-1 diff --git a/examples/cognitoidp/v1beta2/riskconfiguration.yaml b/examples/cognitoidp/v1beta2/riskconfiguration.yaml new file mode 100644 index 0000000000..ff8a6ded51 --- /dev/null +++ b/examples/cognitoidp/v1beta2/riskconfiguration.yaml @@ -0,0 +1,42 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cognitoidp.aws.upbound.io/v1beta2 +kind: RiskConfiguration +metadata: + annotations: + meta.upbound.io/example-id: cognitoidp/v1beta2/riskconfiguration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 + riskExceptionConfiguration: + blockedIpRangeList: + - 10.10.10.10/32 + userPoolIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: cognitoidp.aws.upbound.io/v1beta2 +kind: UserPool +metadata: + annotations: + meta.upbound.io/example-id: cognitoidp/v1beta2/riskconfiguration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + name: example + passwordPolicy: + minimumLength: 6 + requireNumbers: false + requireSymbols: false + requireUppercase: false + temporaryPasswordValidityDays: 7 + region: us-west-1 diff --git a/examples/cognitoidp/v1beta2/userpool.yaml b/examples/cognitoidp/v1beta2/userpool.yaml new file mode 100644 index 0000000000..fb4b0bca2e --- /dev/null +++ b/examples/cognitoidp/v1beta2/userpool.yaml @@ -0,0 +1,179 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cognitoidp.aws.upbound.io/v1beta2 +kind: UserPool +metadata: + annotations: + meta.upbound.io/example-id: cognitoidp/v1beta2/userpool + labels: + testing.upbound.io/example-name: lambda-example + name: lambda-example +spec: + forProvider: + lambdaConfig: + createAuthChallengeSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + customEmailSender: + lambdaArnSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + lambdaVersion: V1_0 + customMessageSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + customSmsSender: + lambdaArnSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + lambdaVersion: V1_0 + defineAuthChallengeSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + kmsKeyIdSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + postAuthenticationSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + postConfirmationSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + preAuthenticationSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + preSignUpSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + preTokenGenerationSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + userMigrationSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + verifyAuthChallengeResponseSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + name: lambda-example + region: eu-west-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: cognitoidp/v1beta2/userpool + labels: + testing.upbound.io/example-name: lambda-example + name: lambda-example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Effect": "Allow", + "Principal": { + "Service": [ + "cognito-idp.amazonaws.com", + "lambda.amazonaws.com" + ] + } + } + ] + } + inlinePolicy: + - name: sns-publish + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Action": [ + "sns:publish" + ], + "Resource": [ + "*" + ] + } + ] + } + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: cognitoidp/v1beta2/userpool + labels: + testing.upbound.io/example-name: lambda-example + name: lambda-example +spec: + forProvider: + region: eu-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta1 +kind: BucketObject +metadata: + annotations: + meta.upbound.io/example-id: cognitoidp/v1beta2/userpool + labels: + testing.upbound.io/example-name: lambda-example + name: lambda-example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + contentBase64: UEsDBBQAAAAIAFd7c1eDOfFtMAAAADEAAAAIABwAaW5kZXguanNVVAkAA7WZWmWrmVpldXgLAAEE6AMAAAToAwAAS60oyC8qKdbLSMxLyUktUrBV0NBUsLVTSM7PK87PSdXLyU/XUPfLB/FLUvNK1DUBUEsBAh4DFAAAAAgAV3tzV4M58W0wAAAAMQAAAAgAGAAAAAAAAQAAALSBAAAAAGluZGV4LmpzVVQFAAO1mVpldXgLAAEE6AMAAAToAwAAUEsFBgAAAAABAAEATgAAAHIAAAAAAA== + contentType: application/zip + key: lambda.zip + region: eu-west-1 + +--- + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: Function +metadata: + annotations: + meta.upbound.io/example-id: cognitoidp/v1beta2/userpool + labels: + testing.upbound.io/example-name: lambda-example + name: lambda-example +spec: + forProvider: + handler: handler + region: eu-west-1 + roleSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + runtime: nodejs18.x + s3BucketSelector: + matchLabels: + testing.upbound.io/example-name: lambda-example + s3Key: lambda.zip + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: cognitoidp/v1beta2/userpool + labels: + testing.upbound.io/example-name: lambda-example + name: lambda-example +spec: + forProvider: + deletionWindowInDays: 7 + region: eu-west-1 diff --git a/examples/cognitoidp/v1beta2/userpoolclient.yaml b/examples/cognitoidp/v1beta2/userpoolclient.yaml new file mode 100644 index 0000000000..8e3c818832 --- /dev/null +++ b/examples/cognitoidp/v1beta2/userpoolclient.yaml @@ -0,0 +1,52 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: cognitoidp.aws.upbound.io/v1beta2 +kind: UserPool +metadata: + annotations: + meta.upbound.io/example-id: cognitoidp/v1beta2/userpool + labels: + testing.upbound.io/example-name: userpoolclient + name: userpoolclient +spec: + forProvider: + name: userpoolclient + region: us-west-1 + +--- + +apiVersion: cognitoidp.aws.upbound.io/v1beta1 +kind: UserPoolClient +metadata: + annotations: + meta.upbound.io/example-id: cognitoidp/v1beta2/userpool + labels: + testing.upbound.io/example-name: userpoolclient + name: userpoolclient +spec: + forProvider: + name: userpoolclient + region: us-west-1 + userPoolIdSelector: + matchLabels: + testing.upbound.io/example-name: userpoolclient + +--- + +apiVersion: cognitoidp.aws.upbound.io/v1beta1 +kind: UserPoolClient +metadata: + annotations: + meta.upbound.io/example-id: cognitoidp/v1beta2/userpool + labels: + testing.upbound.io/example-name: userpoolclient + name: userpoolclient-with-dashes +spec: + forProvider: + name: name-that-doesnt-match-id-regex + region: us-west-1 + userPoolIdSelector: + matchLabels: + testing.upbound.io/example-name: userpoolclient diff --git a/examples/configservice/v1beta2/configrule.yaml b/examples/configservice/v1beta2/configrule.yaml new file mode 100644 index 0000000000..4a6435194f --- /dev/null +++ b/examples/configservice/v1beta2/configrule.yaml @@ -0,0 +1,62 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: configservice.aws.upbound.io/v1beta2 +kind: ConfigRule +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/configrule + labels: + testing.upbound.io/example-name: r + name: this +spec: + forProvider: + region: us-west-1 + source: + owner: AWS + sourceIdentifier: S3_BUCKET_VERSIONING_ENABLED + +--- + +apiVersion: configservice.aws.upbound.io/v1beta2 +kind: ConfigurationRecorder +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/configrule + labels: + testing.upbound.io/example-name: foo + name: example-recorder +spec: + forProvider: + region: us-west-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: r + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/configrule + labels: + testing.upbound.io/example-name: r + name: test-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "config.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } diff --git a/examples/configservice/v1beta2/configurationaggregator.yaml b/examples/configservice/v1beta2/configurationaggregator.yaml new file mode 100644 index 0000000000..cfdf278626 --- /dev/null +++ b/examples/configservice/v1beta2/configurationaggregator.yaml @@ -0,0 +1,20 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: configservice.aws.upbound.io/v1beta2 +kind: ConfigurationAggregator +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/configurationaggregator + labels: + testing.upbound.io/example-name: account + name: account +spec: + forProvider: + accountAggregationSource: + accountIds: + - ${data.aws_account_id} + regions: + - us-west-2 + region: us-west-1 diff --git a/examples/configservice/v1beta2/configurationrecorder.yaml b/examples/configservice/v1beta2/configurationrecorder.yaml new file mode 100644 index 0000000000..a62b1dc592 --- /dev/null +++ b/examples/configservice/v1beta2/configurationrecorder.yaml @@ -0,0 +1,45 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: configservice.aws.upbound.io/v1beta2 +kind: ConfigurationRecorder +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/configurationrecorder + labels: + testing.upbound.io/example-name: foo + name: foo +spec: + forProvider: + region: us-west-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: r + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/configurationrecorder + labels: + testing.upbound.io/example-name: r + name: r +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "config.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } diff --git a/examples/configservice/v1beta2/deliverychannel.yaml b/examples/configservice/v1beta2/deliverychannel.yaml new file mode 100644 index 0000000000..04057ad64f --- /dev/null +++ b/examples/configservice/v1beta2/deliverychannel.yaml @@ -0,0 +1,125 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: configservice.aws.upbound.io/v1beta2 +kind: DeliveryChannel +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/deliverychannel + labels: + testing.upbound.io/example-name: foo + name: test-channel +spec: + forProvider: + region: us-west-1 + s3BucketName: test-channel-bucket + s3BucketNameSelector: + matchLabels: + testing.upbound.io/example-name: b + +--- + +apiVersion: configservice.aws.upbound.io/v1beta2 +kind: ConfigurationRecorder +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/deliverychannel + labels: + testing.upbound.io/example-name: foo + name: test-recorder +spec: + forProvider: + region: us-west-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: r + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/deliverychannel + labels: + testing.upbound.io/example-name: r + name: test-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "config.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: test-channel-bucket + meta.upbound.io/example-id: configservice/v1beta2/deliverychannel + labels: + testing.upbound.io/example-name: b + name: test-channel-bucket +spec: + forProvider: + forceDestroy: true + region: us-west-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/deliverychannel + labels: + testing.upbound.io/example-name: p + name: test-recorder-policy +spec: + forProvider: + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": [ + "s3:*" + ], + "Effect": "Allow", + "Resource": [ + "arn:aws:s3:::test-channel-bucket", + "arn:aws:s3:::test-channel-bucket/*" + ] + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/deliverychannel + labels: + testing.upbound.io/example-name: p + name: test-attach +spec: + forProvider: + policyArnRef: + name: test-recorder-policy + roleRef: + name: test-role diff --git a/examples/configservice/v1beta2/remediationconfiguration.yaml b/examples/configservice/v1beta2/remediationconfiguration.yaml new file mode 100644 index 0000000000..aa6fb68108 --- /dev/null +++ b/examples/configservice/v1beta2/remediationconfiguration.yaml @@ -0,0 +1,94 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: configservice.aws.upbound.io/v1beta2 +kind: RemediationConfiguration +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/remediationconfiguration + labels: + testing.upbound.io/example-name: r + name: this +spec: + forProvider: + automatic: true + executionControls: + ssmControls: + concurrentExecutionRatePercentage: 25 + errorPercentage: 20 + maximumAutomaticAttempts: 10 + parameter: + - name: AutomationAssumeRole + staticValue: arn:aws:iam::${data.aws_account_id}:role/security_config + - name: BucketName + resourceValue: RESOURCE_ID + - name: SSEAlgorithm + staticValue: AES256 + region: us-west-1 + resourceType: AWS::S3::Bucket + retryAttemptSeconds: 600 + targetId: AWS-EnableS3BucketEncryption + targetType: SSM_DOCUMENT + targetVersion: "1" + +--- + +apiVersion: configservice.aws.upbound.io/v1beta2 +kind: ConfigRule +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/remediationconfiguration + labels: + testing.upbound.io/example-name: r + name: this +spec: + forProvider: + region: us-west-1 + source: + owner: AWS + sourceIdentifier: S3_BUCKET_VERSIONING_ENABLED + +--- + +apiVersion: configservice.aws.upbound.io/v1beta2 +kind: ConfigurationRecorder +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/remediationconfiguration + labels: + testing.upbound.io/example-name: foo + name: example-recorder +spec: + forProvider: + region: us-west-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: r + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: configservice/v1beta2/remediationconfiguration + labels: + testing.upbound.io/example-name: r + name: test-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "config.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } diff --git a/examples/connect/v1beta2/botassociation.yaml b/examples/connect/v1beta2/botassociation.yaml new file mode 100644 index 0000000000..0a71ed3c75 --- /dev/null +++ b/examples/connect/v1beta2/botassociation.yaml @@ -0,0 +1,105 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: connect.aws.upbound.io/v1beta2 +kind: BotAssociation +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/botassociation + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: example + lexBot: + lexRegion: us-east-1 + nameSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-east-1 + +--- + +apiVersion: connect.aws.upbound.io/v1beta1 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/botassociation + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + identityManagementType: CONNECT_MANAGED + inboundCallsEnabled: true + instanceAlias: friendly-name-connect-${Rand.RFC1123Subdomain} + outboundCallsEnabled: true + region: us-east-1 + +--- + +apiVersion: lexmodels.aws.upbound.io/v1beta2 +kind: Bot +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/botassociation + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + abortStatement: + message: + - content: Sorry, I am not able to assist at this time + contentType: PlainText + childDirected: false + clarificationPrompt: + maxAttempts: 2 + message: + - content: I didn't understand you, what would you like to do? + contentType: PlainText + createVersion: false + description: Bot to order flowers on the behalf of a user + idleSessionTtlInSeconds: 600 + intent: + - intentName: example + intentVersion: $LATEST + locale: en-US + processBehavior: BUILD + region: us-east-1 + voiceId: Salli + +--- + +apiVersion: lexmodels.aws.upbound.io/v1beta2 +kind: Intent +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/botassociation + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + confirmationPrompt: + maxAttempts: 2 + message: + - content: Okay, your {FlowerType} will be ready for pickup by {PickupTime} + on {PickupDate}. Does this sound okay? + contentType: PlainText + createVersion: false + description: Intent to order a bouquet of flowers for pick up + fulfillmentActivity: + type: ReturnIntent + region: us-east-1 + rejectionStatement: + message: + - content: Okay, I will not place your order. + contentType: PlainText + sampleUtterances: + - I would like to order some flowers + - I would like to pick up flowers diff --git a/examples/connect/v1beta2/instancestorageconfig.yaml b/examples/connect/v1beta2/instancestorageconfig.yaml new file mode 100644 index 0000000000..0e719e9fd9 --- /dev/null +++ b/examples/connect/v1beta2/instancestorageconfig.yaml @@ -0,0 +1,107 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: connect.aws.upbound.io/v1beta2 +kind: InstanceStorageConfig +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/instancestorageconfig + labels: + testing.upbound.io/example-name: instancestorageconfig + name: example +spec: + forProvider: + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: instancestorageconfig + region: us-east-1 + resourceType: CONTACT_TRACE_RECORDS + storageConfig: + kinesisFirehoseConfig: + firehoseArnSelector: + matchLabels: + testing.upbound.io/example-name: instancestorageconfig + storageType: KINESIS_FIREHOSE + +--- + +apiVersion: firehose.aws.upbound.io/v1beta2 +kind: DeliveryStream +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/instancestorageconfig + labels: + testing.upbound.io/example-name: instancestorageconfig + name: example +spec: + forProvider: + destination: extended_s3 + extendedS3Configuration: + bucketArnSelector: + matchLabels: + testing.upbound.io/example-name: instancestorageconfig + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: instancestorageconfig + name: instancestorageconfig + region: us-east-1 + +--- + +apiVersion: connect.aws.upbound.io/v1beta1 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/instancestorageconfig + labels: + testing.upbound.io/example-name: instancestorageconfig + name: test +spec: + forProvider: + identityManagementType: CONNECT_MANAGED + inboundCallsEnabled: true + instanceAlias: friendly-name-connect-${Rand.RFC1123Subdomain} + outboundCallsEnabled: true + region: us-east-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: einstancestorageconfig + meta.upbound.io/example-id: connect/v1beta2/instancestorageconfig + labels: + testing.upbound.io/example-name: instancestorageconfig + name: instancestorageconfig +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/instancestorageconfig + labels: + testing.upbound.io/example-name: instancestorageconfig + name: sample-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "firehose.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } diff --git a/examples/connect/v1beta2/quickconnect.yaml b/examples/connect/v1beta2/quickconnect.yaml new file mode 100644 index 0000000000..caf10f7630 --- /dev/null +++ b/examples/connect/v1beta2/quickconnect.yaml @@ -0,0 +1,44 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: connect.aws.upbound.io/v1beta2 +kind: QuickConnect +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/quickconnect + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + description: quick connect phone number + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: example + name: Example Name + quickConnectConfig: + phoneConfig: + - phoneNumber: "+12345678912" + quickConnectType: PHONE_NUMBER + region: us-east-1 + tags: + Name: Example Quick Connect + +--- + +apiVersion: connect.aws.upbound.io/v1beta1 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/quickconnect + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + identityManagementType: CONNECT_MANAGED + inboundCallsEnabled: true + instanceAlias: friendly-name-connect-${Rand.RFC1123Subdomain} + outboundCallsEnabled: true + region: us-east-1 diff --git a/examples/connect/v1beta2/routingprofile.yaml b/examples/connect/v1beta2/routingprofile.yaml index 81c1e8100f..7ba4d42afc 100644 --- a/examples/connect/v1beta2/routingprofile.yaml +++ b/examples/connect/v1beta2/routingprofile.yaml @@ -6,7 +6,7 @@ apiVersion: connect.aws.upbound.io/v1beta2 kind: RoutingProfile metadata: annotations: - meta.upbound.io/example-id: connect/v1beta1/routingprofile + meta.upbound.io/example-id: connect/v1beta2/routingprofile labels: testing.upbound.io/example-name: example name: example @@ -26,12 +26,14 @@ spec: region: us-east-1 tags: Name: Example Routing Profile + --- -apiVersion: connect.aws.upbound.io/v1beta2 + +apiVersion: connect.aws.upbound.io/v1beta3 kind: Queue metadata: annotations: - meta.upbound.io/example-id: connect/v1beta1/routingprofile + meta.upbound.io/example-id: connect/v1beta2/routingprofile labels: testing.upbound.io/example-name: test name: test @@ -48,12 +50,14 @@ spec: region: us-east-1 tags: Name: Example Queue + --- -apiVersion: connect.aws.upbound.io/v1beta2 + +apiVersion: connect.aws.upbound.io/v1beta3 kind: HoursOfOperation metadata: annotations: - meta.upbound.io/example-id: connect/v1beta1/routingprofile + meta.upbound.io/example-id: connect/v1beta2/routingprofile labels: testing.upbound.io/example-name: test name: test @@ -62,17 +66,17 @@ spec: config: - day: MONDAY endTime: - - hours: 23 + hours: 23 minutes: 8 startTime: - - hours: 8 + hours: 8 minutes: 0 - day: TUESDAY endTime: - - hours: 21 + hours: 21 minutes: 0 startTime: - - hours: 9 + hours: 9 minutes: 0 description: Monday office hours instanceIdSelector: @@ -83,12 +87,14 @@ spec: tags: Name: Example Hours of Operation timeZone: EST + --- + apiVersion: connect.aws.upbound.io/v1beta1 kind: Instance metadata: annotations: - meta.upbound.io/example-id: connect/v1beta1/routingprofile + meta.upbound.io/example-id: connect/v1beta2/routingprofile labels: testing.upbound.io/example-name: example name: example diff --git a/examples/connect/v1beta2/user.yaml b/examples/connect/v1beta2/user.yaml new file mode 100644 index 0000000000..0631e05d82 --- /dev/null +++ b/examples/connect/v1beta2/user.yaml @@ -0,0 +1,181 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: connect.aws.upbound.io/v1beta2 +kind: User +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/user + upjet.upbound.io/manual-intervention: Requires at least one SecurityProfile security_profile_id + and the resource should be deleted before passwordSecretRef. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + identityInfo: + firstName: example + lastName: example2 + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: user + name: example + passwordSecretRef: + key: example-key + name: connect-user + namespace: upbound-system + phoneConfig: + afterContactWorkTimeLimit: 0 + phoneType: SOFT_PHONE + region: us-east-1 + routingProfileIdSelector: + matchLabels: + testing.upbound.io/example-name: user + securityProfileIds: + - ${aws_connect_security_profile.user.security_profile_id} + +--- + +apiVersion: connect.aws.upbound.io/v1beta1 +kind: SecurityProfile +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/user + labels: + testing.upbound.io/example-name: user + name: user +spec: + forProvider: + description: example description + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: user + name: example + permissions: + - BasicAgentAccess + - OutboundCallAccess + region: us-east-1 + tags: + Name: Example Security Profile + +--- + +apiVersion: connect.aws.upbound.io/v1beta1 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/user + labels: + testing.upbound.io/example-name: user + name: user +spec: + forProvider: + identityManagementType: CONNECT_MANAGED + inboundCallsEnabled: true + instanceAlias: friendly-name-connect-${Rand.RFC1123Subdomain} + outboundCallsEnabled: true + region: us-east-1 + +--- + +apiVersion: connect.aws.upbound.io/v1beta2 +kind: RoutingProfile +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/user + labels: + testing.upbound.io/example-name: user + name: user +spec: + forProvider: + defaultOutboundQueueIdSelector: + matchLabels: + testing.upbound.io/example-name: user + description: example description + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: user + mediaConcurrencies: + - channel: VOICE + concurrency: 1 + name: example + region: us-east-1 + tags: + Name: Example Routing Profile + +--- + +apiVersion: connect.aws.upbound.io/v1beta3 +kind: Queue +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/user + labels: + testing.upbound.io/example-name: user + name: user +spec: + forProvider: + description: Example Description + hoursOfOperationIdSelector: + matchLabels: + testing.upbound.io/example-name: user + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: user + name: Example Name + region: us-east-1 + tags: + Name: Example Queue + +--- + +apiVersion: connect.aws.upbound.io/v1beta3 +kind: HoursOfOperation +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/user + labels: + testing.upbound.io/example-name: user + name: user +spec: + forProvider: + config: + - day: MONDAY + endTime: + hours: 23 + minutes: 8 + startTime: + hours: 8 + minutes: 0 + - day: TUESDAY + endTime: + hours: 21 + minutes: 0 + startTime: + hours: 9 + minutes: 0 + description: Monday office hours + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: user + name: Office Hours + region: us-east-1 + tags: + Name: Example Hours of Operation + timeZone: EST + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta1/user + labels: + testing.upbound.io/example-name: user + name: connect-user + namespace: upbound-system +stringData: + example-key: Upboundtest1! +type: Opaque diff --git a/examples/connect/v1beta2/userhierarchystructure.yaml b/examples/connect/v1beta2/userhierarchystructure.yaml new file mode 100644 index 0000000000..94142a7aa7 --- /dev/null +++ b/examples/connect/v1beta2/userhierarchystructure.yaml @@ -0,0 +1,39 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: connect.aws.upbound.io/v1beta2 +kind: UserHierarchyStructure +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/userhierarchystructure + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + hierarchyStructure: + levelOne: + name: levelone + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-east-1 + +--- + +apiVersion: connect.aws.upbound.io/v1beta1 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta2/userhierarchystructure + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + identityManagementType: CONNECT_MANAGED + inboundCallsEnabled: true + instanceAlias: friendly-name-connect-${Rand.RFC1123Subdomain} + outboundCallsEnabled: true + region: us-east-1 diff --git a/examples/connect/v1beta3/hoursofoperation.yaml b/examples/connect/v1beta3/hoursofoperation.yaml new file mode 100644 index 0000000000..a1be6e2a52 --- /dev/null +++ b/examples/connect/v1beta3/hoursofoperation.yaml @@ -0,0 +1,56 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: connect.aws.upbound.io/v1beta3 +kind: HoursOfOperation +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta3/hoursofoperation + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + config: + - day: MONDAY + endTime: + hours: 23 + minutes: 8 + startTime: + hours: 8 + minutes: 0 + - day: TUESDAY + endTime: + hours: 21 + minutes: 0 + startTime: + hours: 9 + minutes: 0 + description: Monday office hours + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: example + name: Office Hours + region: us-east-1 + tags: + Name: Example Hours of Operation + timeZone: EST + +--- + +apiVersion: connect.aws.upbound.io/v1beta1 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta3/hoursofoperation + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + identityManagementType: CONNECT_MANAGED + inboundCallsEnabled: true + instanceAlias: friendly-name-connect-${Rand.RFC1123Subdomain} + outboundCallsEnabled: true + region: us-east-1 diff --git a/examples/connect/v1beta3/queue.yaml b/examples/connect/v1beta3/queue.yaml new file mode 100644 index 0000000000..7375f2418a --- /dev/null +++ b/examples/connect/v1beta3/queue.yaml @@ -0,0 +1,80 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: connect.aws.upbound.io/v1beta3 +kind: Queue +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta3/queue + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + description: Example Description + hoursOfOperationIdSelector: + matchLabels: + testing.upbound.io/example-name: test + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: example + name: Example Name + region: us-east-1 + tags: + Name: Example Queue + +--- + +apiVersion: connect.aws.upbound.io/v1beta3 +kind: HoursOfOperation +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta3/queue + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + config: + - day: MONDAY + endTime: + hours: 23 + minutes: 8 + startTime: + hours: 8 + minutes: 0 + - day: TUESDAY + endTime: + hours: 21 + minutes: 0 + startTime: + hours: 9 + minutes: 0 + description: Monday office hours + instanceIdSelector: + matchLabels: + testing.upbound.io/example-name: example + name: Office Hours + region: us-east-1 + tags: + Name: Example Hours of Operation + timeZone: EST + +--- + +apiVersion: connect.aws.upbound.io/v1beta1 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: connect/v1beta3/queue + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + identityManagementType: CONNECT_MANAGED + inboundCallsEnabled: true + instanceAlias: friendly-name-connect-${Rand.RFC1123Subdomain} + outboundCallsEnabled: true + region: us-east-1 diff --git a/examples/datasync/v1beta2/task.yaml b/examples/datasync/v1beta2/task.yaml new file mode 100644 index 0000000000..d35cc22ee7 --- /dev/null +++ b/examples/datasync/v1beta2/task.yaml @@ -0,0 +1,207 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: datasync.aws.upbound.io/v1beta2 +kind: LocationS3 +metadata: + annotations: + meta.upbound.io/example-id: datasync/v1beta2/locations3 + labels: + testing.upbound.io/example-name: datasync-location-source + name: datasync-location-source +spec: + forProvider: + region: us-west-1 + s3BucketArnSelector: + matchLabels: + testing.upbound.io/example-name: datasync-s3-source + s3Config: + bucketAccessRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: datasync-role + subdirectory: / + +--- + +apiVersion: datasync.aws.upbound.io/v1beta2 +kind: LocationS3 +metadata: + annotations: + meta.upbound.io/example-id: datasync/v1beta2/locations3 + labels: + testing.upbound.io/example-name: datasync-location-destination + name: datasync-location-destination +spec: + forProvider: + region: us-west-1 + s3BucketArnSelector: + matchLabels: + testing.upbound.io/example-name: datasync-s3-destination + s3Config: + bucketAccessRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: datasync-role + subdirectory: / + +--- + +apiVersion: datasync.aws.upbound.io/v1beta2 +kind: Task +metadata: + annotations: + meta.upbound.io/example-id: datasync/v1beta2/locations3 + labels: + testing.upbound.io/example-name: datasync-task-example + name: datasync-task-example +spec: + forProvider: + cloudwatchLogGroupArnSelector: + matchLabels: + testing.upbound.io/example-name: datasync-cloudwatchloggroup + destinationLocationArnSelector: + matchLabels: + testing.upbound.io/example-name: datasync-location-destination + name: datasync-task-example + options: + bytesPerSecond: -1 + gid: NONE + posixPermissions: NONE + preserveDeletedFiles: REMOVE + uid: NONE + verifyMode: ONLY_FILES_TRANSFERRED + region: us-west-1 + sourceLocationArnSelector: + matchLabels: + testing.upbound.io/example-name: datasync-location-source + +--- + +apiVersion: cloudwatchlogs.aws.upbound.io/v1beta1 +kind: Group +metadata: + annotations: + meta.upbound.io/example-id: datasync/v1beta2/locations3 + labels: + testing.upbound.io/example-name: datasync-cloudwatchloggroup + name: datasync-cloudwatchloggroup +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: datasync/v1beta2/locations3 + labels: + testing.upbound.io/example-name: datasync-s3-source + name: upbound-datasync-s3-source +spec: + forProvider: + forceDestroy: true + objectLockEnabled: true + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: datasync/v1beta2/locations3 + labels: + testing.upbound.io/example-name: datasync-s3-destination + name: upbound-datasync-s3-destination +spec: + forProvider: + forceDestroy: true + objectLockEnabled: true + region: us-west-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: datasync/v1beta2/locations3 + labels: + testing.upbound.io/example-name: datasync-role + name: datasync-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "datasync.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: datasync/v1beta2/locations3 + labels: + testing.upbound.io/example-name: datasync-policy + name: datasync-policy +spec: + forProvider: + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": [ + "s3:GetBucketLocation", + "s3:ListBucket", + "s3:ListBucketMultipartUploads", + "s3:AbortMultipartUpload", + "s3:DeleteObject", + "s3:GetObject", + "s3:ListMultipartUploadParts", + "s3:PutObjectTagging", + "s3:GetObjectTagging", + "s3:PutObject" + ], + "Effect": "Allow", + "Resource": [ + "arn:aws:s3:::upbound-datasync-s3-source", + "arn:aws:s3:::upbound-datasync-s3-source/*", + "arn:aws:s3:::upbound-datasync-s3-destination", + "arn:aws:s3:::upbound-datasync-s3-destination/*" + ] + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: datasync/v1beta2/locations3 + labels: + testing.upbound.io/example-name: datasync-rpa + name: datasync-rpa +spec: + forProvider: + policyArnSelector: + matchLabels: + testing.upbound.io/example-name: datasync-policy + roleSelector: + matchLabels: + testing.upbound.io/example-name: datasync-role diff --git a/examples/dax/v1beta2/cluster.yaml b/examples/dax/v1beta2/cluster.yaml new file mode 100644 index 0000000000..a70f42d387 --- /dev/null +++ b/examples/dax/v1beta2/cluster.yaml @@ -0,0 +1,41 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: dax.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: dax/v1beta2/cluster + name: example +spec: + forProvider: + iamRoleArnRef: + name: dax-cluster-example + nodeType: dax.r4.large + region: us-west-1 + replicationFactor: 1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: dax/v1beta2/cluster + name: dax-cluster-example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "dax.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } diff --git a/examples/deploy/v1beta2/deploymentconfig.yaml b/examples/deploy/v1beta2/deploymentconfig.yaml new file mode 100644 index 0000000000..a6e062ddc9 --- /dev/null +++ b/examples/deploy/v1beta2/deploymentconfig.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: deploy.aws.upbound.io/v1beta2 +kind: DeploymentConfig +metadata: + annotations: + meta.upbound.io/example-id: deploy/v1beta2/deploymentconfig + labels: + testing.upbound.io/example-name: foo + name: foo +spec: + forProvider: + minimumHealthyHosts: + type: HOST_COUNT + value: 2 + region: us-west-1 diff --git a/examples/deploy/v1beta2/deploymentgroup.yaml b/examples/deploy/v1beta2/deploymentgroup.yaml new file mode 100644 index 0000000000..141bda3be0 --- /dev/null +++ b/examples/deploy/v1beta2/deploymentgroup.yaml @@ -0,0 +1,116 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: deploy.aws.upbound.io/v1beta2 +kind: DeploymentGroup +metadata: + annotations: + meta.upbound.io/example-id: deploy/v1beta2/deploymentgroup + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + alarmConfiguration: + alarms: + - my-alarm-name + enabled: true + appNameSelector: + matchLabels: + testing.upbound.io/example-name: example + autoRollbackConfiguration: + enabled: true + events: + - DEPLOYMENT_FAILURE + ec2TagSet: + - ec2TagFilter: + - key: filterkey1 + type: KEY_AND_VALUE + value: filtervalue + - key: filterkey2 + type: KEY_AND_VALUE + value: filtervalue + region: us-west-1 + serviceRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + triggerConfiguration: + - triggerEvents: + - DeploymentFailure + triggerName: example-trigger + triggerTargetArnSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: deploy.aws.upbound.io/v1beta1 +kind: App +metadata: + annotations: + meta.upbound.io/example-id: deploy/v1beta2/deploymentgroup + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: deploy/v1beta2/deploymentgroup + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "", + "Effect": "Allow", + "Principal": { + "Service": "codedeploy.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: deploy/v1beta2/deploymentgroup + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/service-role/AWSCodeDeployRole + roleSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: sns.aws.upbound.io/v1beta1 +kind: Topic +metadata: + annotations: + meta.upbound.io/example-id: deploy/v1beta2/deploymentgroup + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 diff --git a/examples/devicefarm/v1beta2/testgridproject.yaml b/examples/devicefarm/v1beta2/testgridproject.yaml new file mode 100644 index 0000000000..e852866fef --- /dev/null +++ b/examples/devicefarm/v1beta2/testgridproject.yaml @@ -0,0 +1,76 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: devicefarm.aws.upbound.io/v1beta2 +kind: TestGridProject +metadata: + annotations: + meta.upbound.io/example-id: devicefarm/v1beta2/testgridproject + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + name: example + region: us-west-2 + vpcConfig: + securityGroupIdRefs: + - name: example + subnetIdRefs: + - name: sample-subnet1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: devicefarm/v1beta2/testgridproject + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: devicefarm/v1beta2/testgridproject + labels: + testing.upbound.io/example-name: example + name: sample-subnet1 +spec: + forProvider: + availabilityZone: us-west-2b + cidrBlock: 172.16.10.0/24 + region: us-west-2 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: devicefarm/v1beta2/testgridproject + labels: + testing.upbound.io/example-name: example + name: sample-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-2 + tags: + Name: DemoVpc diff --git a/examples/dlm/v1beta2/lifecyclepolicy.yaml b/examples/dlm/v1beta2/lifecyclepolicy.yaml new file mode 100644 index 0000000000..56534152e8 --- /dev/null +++ b/examples/dlm/v1beta2/lifecyclepolicy.yaml @@ -0,0 +1,64 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: dlm.aws.upbound.io/v1beta2 +kind: LifecyclePolicy +metadata: + annotations: + meta.upbound.io/example-id: dlm/v1beta2/lifecyclepolicy + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: example DLM lifecycle policy + executionRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: dlm_lifecycle_role + policyDetails: + resourceTypes: + - VOLUME + schedule: + - copyTags: false + createRule: + interval: 24 + intervalUnit: HOURS + times: + - "23:45" + name: 2 weeks of daily snapshots + retainRule: + count: 14 + tagsToAdd: + SnapshotCreator: DLM + targetTags: + Snapshot: "true" + region: us-west-1 + state: ENABLED + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: dlm/v1beta2/lifecyclepolicy + labels: + testing.upbound.io/example-name: dlm_lifecycle_role + name: dlm-lifecycle-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "dlm.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } diff --git a/examples/dms/v1beta2/endpoint-with-role-selector.yaml b/examples/dms/v1beta2/endpoint-with-role-selector.yaml new file mode 100644 index 0000000000..e23961cd68 --- /dev/null +++ b/examples/dms/v1beta2/endpoint-with-role-selector.yaml @@ -0,0 +1,91 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: dms.aws.upbound.io/v1beta2 +kind: Endpoint +metadata: + annotations: + meta.upbound.io/example-id: dms/v1beta2/endpoint + labels: + testing.upbound.io/example-name: dms-endpoint-test + name: dms-endpoint-test +spec: + deletionPolicy: Delete + forProvider: + databaseName: test + endpointType: target + engineName: postgres + extraConnectionAttributes: "" + kmsKeyArnSelector: + matchLabels: + testing.upbound.io/example-name: dms-example-key + passwordSecretRef: + key: example-key + name: dms-example-secret + namespace: upbound-system + port: 5432 + region: us-west-1 + serverName: test + serviceAccessRoleSelector: + matchLabels: + testing.upbound.io/example-name: dms-endpoint-role-test + sslMode: none + username: test + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: dms/v1beta2/endpoint + labels: + testing.upbound.io/example-name: dms-endpoint-role-test + name: dms-endpoint-role-test +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "dms.amazonaws.com" + }, + "Effect": "Allow" + } + ] + } + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: dms/v1beta1/endpoint + labels: + testing.upbound.io/example-name: dms-example-secret + name: dms-example-secret + namespace: upbound-system +stringData: + example-key: pa$$w0rd +type: Opaque + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: dms/v1beta2/endpoint + labels: + testing.upbound.io/example-name: dms-example-key + name: dms-example-key +spec: + forProvider: + deletionWindowInDays: 7 + description: dms-example-key + region: us-west-1 diff --git a/examples/dms/v1beta2/endpoint.yaml b/examples/dms/v1beta2/endpoint.yaml new file mode 100644 index 0000000000..463e83f581 --- /dev/null +++ b/examples/dms/v1beta2/endpoint.yaml @@ -0,0 +1,63 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: dms.aws.upbound.io/v1beta2 +kind: Endpoint +metadata: + annotations: + meta.upbound.io/example-id: dms/v1beta2/endpoint + labels: + testing.upbound.io/example-name: test + name: test-endpoint +spec: + forProvider: + databaseName: test + endpointType: source + engineName: aurora + extraConnectionAttributes: "" + kmsKeyArnSelector: + matchLabels: + testing.upbound.io/example-name: example-endpoint + passwordSecretRef: + key: example-key + name: endpoint-secret + namespace: upbound-system + port: 3306 + region: us-west-1 + serverName: test + sslMode: none + tags: + Name: test + username: test + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: dms/v1beta2/endpoint + labels: + testing.upbound.io/example-name: example-endpoint + name: example-endpoint +spec: + forProvider: + deletionWindowInDays: 7 + description: KMS Key + region: us-west-1 + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: dms/v1beta1/endpoint + labels: + testing.upbound.io/example-name: endpoint-secret + name: endpoint-secret + namespace: upbound-system +stringData: + example-key: Upbound! +type: Opaque diff --git a/examples/ds/v1beta2/directory.yaml b/examples/ds/v1beta2/directory.yaml new file mode 100644 index 0000000000..d1714a8541 --- /dev/null +++ b/examples/ds/v1beta2/directory.yaml @@ -0,0 +1,99 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ds.aws.upbound.io/v1beta2 +kind: Directory +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta2/directory + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: bar + name: bar +spec: + forProvider: + name: corp.notexample.com + passwordSecretRef: + key: example-key + name: example-secret + namespace: upbound-system + region: us-east-1 + size: Small + tags: + Project: foo + vpcSettings: + subnetIdsRefs: + - name: foo + - name: bar + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta2/directory + labels: + testing.upbound.io/example-name: bar + name: bar +spec: + forProvider: + availabilityZone: us-east-1b + cidrBlock: 10.0.2.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta2/directory + labels: + testing.upbound.io/example-name: foo + name: foo +spec: + forProvider: + availabilityZone: us-east-1a + cidrBlock: 10.0.1.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta2/directory + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: us-east-1 + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta1/directory + labels: + testing.upbound.io/example-name: secret-version + name: example-secret + namespace: upbound-system +stringData: + example-key: P@ssw0rd +type: Opaque diff --git a/examples/ds/v1beta2/shareddirectory.yaml b/examples/ds/v1beta2/shareddirectory.yaml new file mode 100644 index 0000000000..0d99fade6a --- /dev/null +++ b/examples/ds/v1beta2/shareddirectory.yaml @@ -0,0 +1,113 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ds.aws.upbound.io/v1beta2 +kind: SharedDirectory +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta2/shareddirectory + labels: + testing.upbound.io/example-name: example + name: sdirectory +spec: + forProvider: + directoryIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + target: + id: "243569053065" + +--- + +apiVersion: ds.aws.upbound.io/v1beta2 +kind: Directory +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta2/shareddirectory + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: directoryname +spec: + forProvider: + edition: Standard + name: corp.example.com + passwordSecretRef: + key: example-key + name: example-secret + namespace: upbound-system + region: us-west-1 + type: MicrosoftAD + vpcSettings: + subnetIdsRefs: + - name: subnetone + - name: subnettwo + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta2/shareddirectory + name: subnetone +spec: + forProvider: + availabilityZone: us-west-1a + cidrBlock: 10.0.1.0/24 + region: us-west-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta2/shareddirectory + name: subnettwo +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 10.0.2.0/24 + region: us-west-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta2/shareddirectory + labels: + testing.upbound.io/example-name: example + name: vpc +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: us-west-1 + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: ds/v1beta1/shareddirectory + labels: + testing.upbound.io/example-name: example + name: example-secret + namespace: upbound-system +stringData: + example-key: P@ssw0rd +type: Opaque diff --git a/examples/dynamodb/v1beta2/table.yaml b/examples/dynamodb/v1beta2/table.yaml new file mode 100644 index 0000000000..b4bfa2381a --- /dev/null +++ b/examples/dynamodb/v1beta2/table.yaml @@ -0,0 +1,37 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: dynamodb.aws.upbound.io/v1beta2 +kind: Table +metadata: + annotations: + meta.upbound.io/example-id: dynamodb/v1beta2/table + name: example +spec: + forProvider: + attribute: + - name: UserId + type: S + - name: GameTitle + type: S + - name: TopScore + type: "N" + billingMode: PROVISIONED + globalSecondaryIndex: + - hashKey: GameTitle + name: GameTitleIndex + nonKeyAttributes: + - UserId + projectionType: INCLUDE + rangeKey: TopScore + readCapacity: 10 + writeCapacity: 10 + hashKey: UserId + rangeKey: GameTitle + readCapacity: 20 + region: us-west-1 + tags: + Environment: production + Name: dynamodb-table-1 + writeCapacity: 20 diff --git a/examples/ec2/v1beta2/ebssnapshotimport.yaml b/examples/ec2/v1beta2/ebssnapshotimport.yaml new file mode 100644 index 0000000000..3769c730c4 --- /dev/null +++ b/examples/ec2/v1beta2/ebssnapshotimport.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: EBSSnapshotImport +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/ebssnapshotimport + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + diskContainer: + format: VMDK + userBucket: + s3Bucket: upbound-provider-test-data + s3Key: centos.vmdk + region: us-east-1 + tags: + Name: HelloWorld diff --git a/examples/ec2/v1beta2/flowlog.yaml b/examples/ec2/v1beta2/flowlog.yaml new file mode 100644 index 0000000000..724a1d8b59 --- /dev/null +++ b/examples/ec2/v1beta2/flowlog.yaml @@ -0,0 +1,83 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: FlowLog +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/flowlog + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + iamRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + logDestinationSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + trafficType: ALL + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: cloudwatchlogs.aws.upbound.io/v1beta1 +kind: Group +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/flowlog + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/flowlog + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "", + "Effect": "Allow", + "Principal": { + "Service": "vpc-flow-logs.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/flowlog + labels: + testing.upbound.io/example-name: example + name: sample-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: DemoVpc diff --git a/examples/ec2/v1beta2/instance.yaml b/examples/ec2/v1beta2/instance.yaml new file mode 100644 index 0000000000..e93628cb06 --- /dev/null +++ b/examples/ec2/v1beta2/instance.yaml @@ -0,0 +1,80 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/instance + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: sample-instance + name: sample-instance +spec: + forProvider: + ami: ami-07b068f843ec78e72 + creditSpecification: + cpuCredits: unlimited + instanceType: t2.micro + networkInterface: + - deviceIndex: 0 + networkInterfaceIdSelector: + matchLabels: + testing.upbound.io/example-name: sample-instance + region: us-west-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: NetworkInterface +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/instance + labels: + testing.upbound.io/example-name: sample-instance + name: sample-instance +spec: + forProvider: + privateIps: + - 172.16.10.100 + region: us-west-1 + subnetIdSelector: + matchLabels: + testing.upbound.io/example-name: sample-instance + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/instance + labels: + testing.upbound.io/example-name: sample-instance + name: sample-instance +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.10.0/24 + region: us-west-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: sample-instance + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/instance + labels: + testing.upbound.io/example-name: sample-instance + name: sample-instance +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: DemoVpc diff --git a/examples/ec2/v1beta2/launchtemplate.yaml b/examples/ec2/v1beta2/launchtemplate.yaml new file mode 100644 index 0000000000..6469e156ac --- /dev/null +++ b/examples/ec2/v1beta2/launchtemplate.yaml @@ -0,0 +1,51 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: LaunchTemplate +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/launchtemplate + name: example +spec: + forProvider: + blockDeviceMappings: + - deviceName: /dev/sda1 + ebs: + volumeSize: 20 + capacityReservationSpecification: + capacityReservationPreference: open + cpuOptions: + coreCount: 4 + threadsPerCore: 2 + creditSpecification: + cpuCredits: standard + disableApiTermination: true + ebsOptimized: "true" + elasticGpuSpecifications: + - type: test + elasticInferenceAccelerator: + type: eia1.medium + instanceInitiatedShutdownBehavior: terminate + instanceMarketOptions: + marketType: spot + instanceType: t2.micro + keyName: test + metadataOptions: + httpEndpoint: enabled + httpPutResponseHopLimit: 1 + httpTokens: required + instanceMetadataTags: enabled + monitoring: + enabled: true + name: foo + networkInterfaces: + - associatePublicIpAddress: "true" + placement: + availabilityZone: us-west-2a + region: us-west-1 + tagSpecifications: + - resourceType: instance + tags: + Name: test diff --git a/examples/ec2/v1beta2/launchtemplate_encrypted.yaml b/examples/ec2/v1beta2/launchtemplate_encrypted.yaml new file mode 100644 index 0000000000..98e9340bca --- /dev/null +++ b/examples/ec2/v1beta2/launchtemplate_encrypted.yaml @@ -0,0 +1,71 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: LaunchTemplate +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/launchtemplate + name: example-encrypted +spec: + forProvider: + blockDeviceMappings: + - deviceName: /dev/sda1 + ebs: + encrypted: "true" + kmsKeyIdSelector: + matchLabels: + testing.upbound.io/example-name: launchtemplate-key + volumeSize: 20 + capacityReservationSpecification: + capacityReservationPreference: open + cpuOptions: + coreCount: 4 + threadsPerCore: 2 + creditSpecification: + cpuCredits: standard + disableApiTermination: true + ebsOptimized: "true" + elasticGpuSpecifications: + - type: test + elasticInferenceAccelerator: + type: eia1.medium + instanceInitiatedShutdownBehavior: terminate + instanceMarketOptions: + marketType: spot + instanceType: t2.micro + keyName: test + metadataOptions: + httpEndpoint: enabled + httpPutResponseHopLimit: 1 + httpTokens: required + instanceMetadataTags: enabled + monitoring: + enabled: true + name: foo + networkInterfaces: + - associatePublicIpAddress: "true" + placement: + availabilityZone: us-west-2a + region: us-west-1 + tagSpecifications: + - resourceType: instance + tags: + Name: test + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/launchtemplate + labels: + testing.upbound.io/example-name: launchtemplate-key + name: launchtemplate-key +spec: + forProvider: + deletionWindowInDays: 7 + description: Created with Crossplane + region: us-east-1 diff --git a/examples/ec2/v1beta2/route.yaml b/examples/ec2/v1beta2/route.yaml index 00650037b6..02ebc406a5 100644 --- a/examples/ec2/v1beta2/route.yaml +++ b/examples/ec2/v1beta2/route.yaml @@ -6,6 +6,7 @@ apiVersion: ec2.aws.upbound.io/v1beta2 kind: Route metadata: annotations: + meta.upbound.io/example-id: ec2/v1beta2/route uptest.upbound.io/disable-import: "true" name: route spec: @@ -22,9 +23,11 @@ spec: apiVersion: ec2.aws.upbound.io/v1beta1 kind: RouteTable metadata: - name: table + annotations: + meta.upbound.io/example-id: ec2/v1beta2/route labels: testing.upbound.io/example-name: table + name: table spec: forProvider: region: us-west-1 @@ -38,6 +41,8 @@ spec: apiVersion: ec2.aws.upbound.io/v1beta1 kind: InternetGateway metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/route name: routegw spec: forProvider: @@ -52,9 +57,11 @@ spec: apiVersion: ec2.aws.upbound.io/v1beta1 kind: VPC metadata: - name: route-vpc + annotations: + meta.upbound.io/example-id: ec2/v1beta2/route labels: testing.upbound.io/example-name: route-vpc + name: route-vpc spec: forProvider: region: us-west-1 diff --git a/examples/ec2/v1beta2/spotfleetrequest.yaml b/examples/ec2/v1beta2/spotfleetrequest.yaml new file mode 100644 index 0000000000..fbc468ae17 --- /dev/null +++ b/examples/ec2/v1beta2/spotfleetrequest.yaml @@ -0,0 +1,71 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: SpotFleetRequest +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/spotfleetrequest + labels: + testing.upbound.io/example-name: cheap_compute + name: cheap-compute +spec: + forProvider: + allocationStrategy: capacityOptimized + iamFleetRole: arn:aws:iam::${data.aws_account_id}:role/aws-service-role/spotfleet.amazonaws.com/AWSServiceRoleForEC2SpotFleet + launchSpecification: + - ami: ami-0bdb828fd58c52235 + iamInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + instanceType: t3.micro + placementTenancy: dedicated + spotPrice: "2.793" + region: us-west-1 + spotPrice: "0.03" + targetCapacity: 6 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/spotfleetrequest + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/spotfleetrequest + labels: + testing.upbound.io/example-name: role + name: role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "ec2.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + path: / diff --git a/examples/ec2/v1beta2/spotinstancerequest.yaml b/examples/ec2/v1beta2/spotinstancerequest.yaml new file mode 100644 index 0000000000..a6ecc4965a --- /dev/null +++ b/examples/ec2/v1beta2/spotinstancerequest.yaml @@ -0,0 +1,15 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: SpotInstanceRequest +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/spotinstancerequest + name: example +spec: + forProvider: + ami: ami-0d9858aa3c6322f73 + instanceType: c4.xlarge + region: us-west-1 diff --git a/examples/ec2/v1beta2/trafficmirrorfilterrule.yaml b/examples/ec2/v1beta2/trafficmirrorfilterrule.yaml new file mode 100644 index 0000000000..38d4c0f7b0 --- /dev/null +++ b/examples/ec2/v1beta2/trafficmirrorfilterrule.yaml @@ -0,0 +1,41 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: TrafficMirrorFilterRule +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/trafficmirrorfilterrule + labels: + testing.upbound.io/example-name: ruleout + name: ruleout +spec: + forProvider: + description: test rule + destinationCidrBlock: 10.0.0.0/8 + region: us-west-1 + ruleAction: accept + ruleNumber: 1 + sourceCidrBlock: 10.0.0.0/8 + trafficDirection: egress + trafficMirrorFilterIdSelector: + matchLabels: + testing.upbound.io/example-name: filter + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: TrafficMirrorFilter +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/trafficmirrorfilterrule + labels: + testing.upbound.io/example-name: filter + name: filter +spec: + forProvider: + description: traffic mirror filter - terraform example + networkServices: + - amazon-dns + region: us-west-1 diff --git a/examples/ec2/v1beta2/vpcendpoint.yaml b/examples/ec2/v1beta2/vpcendpoint.yaml new file mode 100644 index 0000000000..95b76f0e6c --- /dev/null +++ b/examples/ec2/v1beta2/vpcendpoint.yaml @@ -0,0 +1,33 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: CC0-1.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: VPCEndpoint +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcendpoint + labels: + testing.upbound.io/example-name: ec2 + name: ec2 +spec: + forProvider: + region: us-west-1 + serviceName: com.amazonaws.us-west-1.ec2 + vpcEndpointType: Interface + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpc1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + labels: + testing.upbound.io/example-name: vpc1 + name: vpc1 +spec: + forProvider: + region: us-west-1 + cidrBlock: 10.0.0.0/16 diff --git a/examples/ec2/v1beta2/vpcipampoolcidr.yaml b/examples/ec2/v1beta2/vpcipampoolcidr.yaml new file mode 100644 index 0000000000..bea16f683a --- /dev/null +++ b/examples/ec2/v1beta2/vpcipampoolcidr.yaml @@ -0,0 +1,72 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: VPCIpamPoolCidr +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcipampoolcidr + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + cidr: 172.2.0.0/16 + ipamPoolIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPCIpam +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcipampoolcidr + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + operatingRegions: + - regionName: us-west-1 + region: us-west-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPCIpamPool +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcipampoolcidr + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + addressFamily: ipv4 + ipamScopeIdSelector: + matchLabels: + testing.upbound.io/example-name: example + locale: us-west-1 + region: us-west-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPCIpamScope +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcipampoolcidr + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: Another Scope + ipamIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 diff --git a/examples/ec2/v1beta2/vpcpeeringconnection.yaml b/examples/ec2/v1beta2/vpcpeeringconnection.yaml new file mode 100644 index 0000000000..561257b6dd --- /dev/null +++ b/examples/ec2/v1beta2/vpcpeeringconnection.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: VPCPeeringConnection +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcpeeringconnection + upjet.upbound.io/manual-intervention: Requires references to replaced manually. + labels: + testing.upbound.io/example-name: foo + name: foo +spec: + forProvider: + peerOwnerId: + peerVpcIdSelector: + matchLabels: + testing.upbound.io/example-name: bar + region: us-west-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: foo diff --git a/examples/ec2/v1beta2/vpcpeeringconnectionaccepter.yaml b/examples/ec2/v1beta2/vpcpeeringconnectionaccepter.yaml new file mode 100644 index 0000000000..be8ff0bd06 --- /dev/null +++ b/examples/ec2/v1beta2/vpcpeeringconnectionaccepter.yaml @@ -0,0 +1,76 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: VPCPeeringConnectionAccepter +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcpeeringconnectionaccepter + labels: + testing.upbound.io/example-name: peeraccepterlabel + name: peeracceptername +spec: + forProvider: + autoAccept: true + region: eu-west-1 + tags: + Side: Accepter + vpcPeeringConnectionIdSelector: + matchLabels: + testing.upbound.io/example-name: vpcpeerconnectionlabel + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcpeeringconnectionaccepter + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: eu-west-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcpeeringconnectionaccepter + labels: + testing.upbound.io/example-name: vpcpeerlabel + name: vpcpeername +spec: + forProvider: + cidrBlock: 10.1.0.0/16 + region: eu-west-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: VPCPeeringConnection +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcpeeringconnectionaccepter + labels: + testing.upbound.io/example-name: vpcpeerconnectionlabel + name: peerconnectionname +spec: + forProvider: + autoAccept: false + peerOwnerId: ${data.aws_account_id} + peerRegion: eu-west-1 + peerVpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpcpeerlabel + region: eu-west-1 + tags: + Side: Requester + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main diff --git a/examples/ec2/v1beta2/vpcpeeringconnectionoptions.yaml b/examples/ec2/v1beta2/vpcpeeringconnectionoptions.yaml new file mode 100644 index 0000000000..2ef4125e33 --- /dev/null +++ b/examples/ec2/v1beta2/vpcpeeringconnectionoptions.yaml @@ -0,0 +1,78 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: VPCPeeringConnectionOptions +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcpeeringconnectionoptions + labels: + testing.upbound.io/example-name: peeroptionslabel + name: peeroptionsname +spec: + forProvider: + accepter: + allowRemoteVpcDnsResolution: true + region: eu-west-1 + requester: + allowClassicLinkToRemoteVpc: true + allowVpcToRemoteClassicLink: true + vpcPeeringConnectionIdSelector: + matchLabels: + testing.upbound.io/example-name: vpcpeerconnectionlabel + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcpeeringconnectionoptions + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: eu-west-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcpeeringconnectionoptions + labels: + testing.upbound.io/example-name: vpcpeerlabel + name: vpcpeername +spec: + forProvider: + cidrBlock: 10.1.0.0/16 + enableDnsHostnames: true + region: eu-west-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: VPCPeeringConnection +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpcpeeringconnectionoptions + labels: + testing.upbound.io/example-name: vpcpeerconnectionlabel + name: peerconnectionname +spec: + forProvider: + autoAccept: true + peerOwnerId: ${data.aws_account_id} + peerVpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpcpeerlabel + region: eu-west-1 + tags: + Side: Requester + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main diff --git a/examples/ec2/v1beta2/vpnconnection.yaml b/examples/ec2/v1beta2/vpnconnection.yaml new file mode 100644 index 0000000000..c39be82c72 --- /dev/null +++ b/examples/ec2/v1beta2/vpnconnection.yaml @@ -0,0 +1,55 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: VPNConnection +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpnconnection + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + customerGatewayIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + transitGatewayIdSelector: + matchLabels: + testing.upbound.io/example-name: example + typeSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: CustomerGateway +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpnconnection + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + bgpAsn: "65000" + ipAddress: 172.0.0.1 + region: us-west-1 + type: ipsec.1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: TransitGateway +metadata: + annotations: + meta.upbound.io/example-id: ec2/v1beta2/vpnconnection + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 diff --git a/examples/ecr/v1beta2/replicationconfiguration.yaml b/examples/ecr/v1beta2/replicationconfiguration.yaml new file mode 100644 index 0000000000..d0b46a1a85 --- /dev/null +++ b/examples/ecr/v1beta2/replicationconfiguration.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ecr.aws.upbound.io/v1beta2 +kind: ReplicationConfiguration +metadata: + annotations: + meta.upbound.io/example-id: ecr/v1beta2/replicationconfiguration + upjet.upbound.io/manual-intervention: This resource requires an additional AWS + account + name: example +spec: + forProvider: + region: us-east-1 + replicationConfiguration: + rule: + - destination: + - region: us-east-1 + registryId: ${aws_account_id} + providerConfigRef: + name: default diff --git a/examples/ecr/v1beta2/repository.yaml b/examples/ecr/v1beta2/repository.yaml new file mode 100644 index 0000000000..ea1ca44a7c --- /dev/null +++ b/examples/ecr/v1beta2/repository.yaml @@ -0,0 +1,14 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ecr.aws.upbound.io/v1beta2 +kind: Repository +metadata: + annotations: + meta.upbound.io/example-id: ecr/v1beta2/repository + name: alper-test-repo +spec: + forProvider: + imageTagMutability: IMMUTABLE + region: us-east-1 diff --git a/examples/ecrpublic/v1beta2/repository.yaml b/examples/ecrpublic/v1beta2/repository.yaml new file mode 100644 index 0000000000..a0ebc12fb2 --- /dev/null +++ b/examples/ecrpublic/v1beta2/repository.yaml @@ -0,0 +1,37 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ecrpublic.aws.upbound.io/v1beta2 +kind: Repository +metadata: + annotations: + meta.upbound.io/example-id: ecrpublic/v1beta2/repository + uptest.upbound.io/update-parameter: '{"tags":{"update-test-tag":"val"}}' + name: uptest-test-repo +spec: + forProvider: + catalogData: + aboutText: About Text + architectures: + - ARM + description: Description + operatingSystems: + - Linux + usageText: Usage Text + region: us-east-1 + providerConfigRef: + name: default + +--- + +apiVersion: ecr.aws.upbound.io/v1beta2 +kind: Repository +metadata: + annotations: + meta.upbound.io/example-id: ecrpublic/v1beta2/repository + name: uptest-test-repo +spec: + forProvider: + imageTagMutability: IMMUTABLE + region: us-east-1 diff --git a/examples/ecs/v1beta2/capacityprovider.yaml b/examples/ecs/v1beta2/capacityprovider.yaml new file mode 100644 index 0000000000..e176ba5f5c --- /dev/null +++ b/examples/ecs/v1beta2/capacityprovider.yaml @@ -0,0 +1,71 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ecs.aws.upbound.io/v1beta2 +kind: CapacityProvider +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/capacityprovider + upjet.upbound.io/manual-intervention: This resource indirectly needs a valid AMI + ID. + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + autoScalingGroupProvider: + autoScalingGroupArnSelector: + matchLabels: + testing.upbound.io/example-name: test + managedScaling: + maximumScalingStepSize: 1000 + minimumScalingStepSize: 1 + status: ENABLED + targetCapacity: 10 + managedTerminationProtection: DISABLED + region: us-west-1 + +--- + +apiVersion: autoscaling.aws.upbound.io/v1beta3 +kind: AutoscalingGroup +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/capacityprovider + upjet.upbound.io/manual-intervention: This resource indirectly needs a valid AMI + ID. + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + availabilityZones: + - us-west-1b + launchConfigurationSelector: + matchLabels: + testing.upbound.io/example-name: as_conf + maxSize: 1 + minSize: 1 + region: us-west-1 + tag: + - key: AmazonECSManaged + propagateAtLaunch: true + value: "true" + +--- + +apiVersion: autoscaling.aws.upbound.io/v1beta2 +kind: LaunchConfiguration +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/capacityprovider + upjet.upbound.io/manual-intervention: This resource refers to an AMI ID. + labels: + testing.upbound.io/example-name: as_conf + name: as-conf +spec: + forProvider: + imageId: ${data.aws_ami.ubuntu.id} + instanceType: t2.micro + region: us-west-1 diff --git a/examples/ecs/v1beta2/cluster.yaml b/examples/ecs/v1beta2/cluster.yaml new file mode 100644 index 0000000000..9059772880 --- /dev/null +++ b/examples/ecs/v1beta2/cluster.yaml @@ -0,0 +1,15 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ecs.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/cluster + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 diff --git a/examples/ecs/v1beta2/service-static-cluster.yaml b/examples/ecs/v1beta2/service-static-cluster.yaml new file mode 100644 index 0000000000..ab348d1458 --- /dev/null +++ b/examples/ecs/v1beta2/service-static-cluster.yaml @@ -0,0 +1,61 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ecs.aws.upbound.io/v1beta2 +kind: Service +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/service + upjet.upbound.io/manual-intervention: Resource stuck in update loop, see https://github.com/upbound/provider-aws/issues/585 + labels: + testing.upbound.io/example-name: example-service + name: example-service +spec: + forProvider: + cluster: example-cluster-service + launchType: EC2 + propagateTags: TASK_DEFINITION + region: us-west-1 + taskDefinitionSelector: + matchLabels: + testing.upbound.io/example-name: example-service-definition + +--- + +apiVersion: ecs.aws.upbound.io/v1beta2 +kind: TaskDefinition +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/service + labels: + testing.upbound.io/example-name: example-service-definition + name: example-service-definition +spec: + forProvider: + containerDefinitions: |- + [ + { + "name": "first", + "image": "service-first", + "cpu": 10, + "memory": 512, + "essential":true + } + ] + family: sampleservice + region: us-west-1 + +--- + +apiVersion: ecs.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/service + labels: + testing.upbound.io/example-name: example-cluster-service + name: example-cluster-service +spec: + forProvider: + region: us-west-1 diff --git a/examples/ecs/v1beta2/service.yaml b/examples/ecs/v1beta2/service.yaml new file mode 100644 index 0000000000..3ab8e2fb60 --- /dev/null +++ b/examples/ecs/v1beta2/service.yaml @@ -0,0 +1,61 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ecs.aws.upbound.io/v1beta2 +kind: Service +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/service + upjet.upbound.io/manual-intervention: Resourrce stuck in update loop + name: sample-service +spec: + forProvider: + clusterSelector: + matchLabels: + testing.upbound.io/example-name: example-cluster + launchType: EC2 + propagateTags: TASK_DEFINITION + region: us-west-1 + taskDefinitionSelector: + matchLabels: + testing.upbound.io/example-name: example-definition + +--- + +apiVersion: ecs.aws.upbound.io/v1beta2 +kind: TaskDefinition +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/service + labels: + testing.upbound.io/example-name: example-definition + name: sample-task +spec: + forProvider: + containerDefinitions: |- + [ + { + "name": "first", + "image": "service-first", + "cpu": 10, + "memory": 512, + "essential":true + } + ] + family: sampleservice + region: us-west-1 + +--- + +apiVersion: ecs.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/service + labels: + testing.upbound.io/example-name: example-cluster + name: example +spec: + forProvider: + region: us-west-1 diff --git a/examples/ecs/v1beta2/taskdefinition.yaml b/examples/ecs/v1beta2/taskdefinition.yaml new file mode 100644 index 0000000000..e639a1c229 --- /dev/null +++ b/examples/ecs/v1beta2/taskdefinition.yaml @@ -0,0 +1,24 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ecs.aws.upbound.io/v1beta2 +kind: TaskDefinition +metadata: + annotations: + meta.upbound.io/example-id: ecs/v1beta2/taskdefinition + name: sample-task +spec: + forProvider: + containerDefinitions: |- + [ + { + "name": "first", + "image": "service-first", + "cpu": 10, + "memory": 512, + "essential":true + } + ] + family: sampleservice + region: us-west-1 diff --git a/examples/efs/v1beta2/accesspoint.yaml b/examples/efs/v1beta2/accesspoint.yaml new file mode 100644 index 0000000000..7fa60d17a2 --- /dev/null +++ b/examples/efs/v1beta2/accesspoint.yaml @@ -0,0 +1,17 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: efs.aws.upbound.io/v1beta2 +kind: AccessPoint +metadata: + annotations: + meta.upbound.io/example-id: efs/v1beta2/accesspoint + labels: + testing.upbound.io/example-name: test + name: example +spec: + forProvider: + fileSystemIdRef: + name: example + region: us-west-1 diff --git a/examples/efs/v1beta2/backuppolicy.yaml b/examples/efs/v1beta2/backuppolicy.yaml new file mode 100644 index 0000000000..39a4f7e71d --- /dev/null +++ b/examples/efs/v1beta2/backuppolicy.yaml @@ -0,0 +1,35 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: efs.aws.upbound.io/v1beta2 +kind: BackupPolicy +metadata: + annotations: + meta.upbound.io/example-id: efs/v1beta2/backuppolicy + uptest.upbound.io/pre-delete-hook: testhooks/delete-filesystem.sh + name: example +spec: + forProvider: + backupPolicy: + status: ENABLED + fileSystemIdRef: + name: example + region: us-west-1 + +--- + +apiVersion: efs.aws.upbound.io/v1beta2 +kind: FileSystem +metadata: + annotations: + meta.upbound.io/example-id: efs/v1beta2/backuppolicy + labels: + testing.upbound.io/example-name: efs + name: example +spec: + forProvider: + creationToken: my-product + region: us-west-1 + tags: + Name: MyProduct diff --git a/examples/efs/v1beta2/filesystem-with-encrypted.yaml b/examples/efs/v1beta2/filesystem-with-encrypted.yaml new file mode 100644 index 0000000000..fbba9fab23 --- /dev/null +++ b/examples/efs/v1beta2/filesystem-with-encrypted.yaml @@ -0,0 +1,37 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: efs.aws.upbound.io/v1beta2 +kind: FileSystem +metadata: + annotations: + meta.upbound.io/example-id: efs/v1beta2/filesystem + labels: + testing.upbound.io/example-name: example-efs-encrypted + name: example-efs-encrypted +spec: + forProvider: + creationToken: my-product + encrypted: true + kmsKeyIdRef: + name: example-key + region: us-west-1 + tags: + Name: MyProduct + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: efs/v1beta2/filesystem + labels: + testing.upbound.io/example-name: example-key + name: example-key +spec: + forProvider: + deletionWindowInDays: 7 + description: Created with Crossplane + region: us-west-1 diff --git a/examples/efs/v1beta2/filesystem.yaml b/examples/efs/v1beta2/filesystem.yaml new file mode 100644 index 0000000000..298ac83c2d --- /dev/null +++ b/examples/efs/v1beta2/filesystem.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: efs.aws.upbound.io/v1beta2 +kind: FileSystem +metadata: + annotations: + meta.upbound.io/example-id: efs/v1beta2/filesystem + labels: + testing.upbound.io/example-name: efs + name: example +spec: + forProvider: + creationToken: my-product + region: us-west-1 + tags: + Name: MyProduct diff --git a/examples/efs/v1beta2/replicationconfiguration.yaml b/examples/efs/v1beta2/replicationconfiguration.yaml new file mode 100644 index 0000000000..30ff91c356 --- /dev/null +++ b/examples/efs/v1beta2/replicationconfiguration.yaml @@ -0,0 +1,34 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: efs.aws.upbound.io/v1beta2 +kind: ReplicationConfiguration +metadata: + annotations: + meta.upbound.io/example-id: efs/v1beta2/replicationconfiguration + labels: + testing.upbound.io/example-name: example + name: replicationconfig +spec: + forProvider: + destination: + region: us-west-2 + region: us-west-1 + sourceFileSystemIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: efs.aws.upbound.io/v1beta2 +kind: FileSystem +metadata: + annotations: + meta.upbound.io/example-id: efs/v1beta2/replicationconfiguration + labels: + testing.upbound.io/example-name: example + name: filesystem +spec: + forProvider: + region: us-west-1 diff --git a/examples/eks/v1beta2/cluster.yaml b/examples/eks/v1beta2/cluster.yaml new file mode 100644 index 0000000000..aed9a90f93 --- /dev/null +++ b/examples/eks/v1beta2/cluster.yaml @@ -0,0 +1,190 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: eks.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + uptest.upbound.io/timeout: "2400" + labels: + testing.upbound.io/example-name: example + name: sample-eks-cluster +spec: + forProvider: + region: us-west-1 + roleArnRef: + name: sample-eks-cluster + vpcConfig: + subnetIdRefs: + - name: sample-subnet1 + - name: sample-subnet2 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + name: sample-eks-cluster +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "eks.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + name: sample-cluster-policy +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonEKSClusterPolicy + roleRef: + name: sample-eks-cluster + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + name: sample-subnet1 +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.10.0/24 + mapPublicIpOnLaunch: true + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + name: sample-subnet2 +spec: + forProvider: + availabilityZone: us-west-1a + cidrBlock: 172.16.11.0/24 + mapPublicIpOnLaunch: true + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + name: private-subnet +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.12.0/24 + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: RouteTable +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + name: example +spec: + forProvider: + region: us-west-1 + tags: + Name: example + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: RouteTableAssociation +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + name: example +spec: + forProvider: + region: us-west-1 + routeTableIdRef: + name: example + subnetIdRef: + name: private-subnet + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + name: sample-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + enableDnsHostnames: true + region: us-west-1 + tags: + Name: DemoVpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: InternetGateway +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + name: example +spec: + forProvider: + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: DefaultRouteTable +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/cluster + name: example +spec: + forProvider: + defaultRouteTableIdRef: + name: sample-vpc + region: us-west-1 + route: + - cidrBlock: 0.0.0.0/0 + gatewayIdRef: + name: example diff --git a/examples/eks/v1beta2/identityproviderconfig.yaml b/examples/eks/v1beta2/identityproviderconfig.yaml new file mode 100644 index 0000000000..8446673773 --- /dev/null +++ b/examples/eks/v1beta2/identityproviderconfig.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: eks.aws.upbound.io/v1beta2 +kind: IdentityProviderConfig +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/identityproviderconfig + uptest.upbound.io/timeout: "3600" + name: example +spec: + forProvider: + clusterName: test + oidc: + clientId: test-audience + issuerUrl: https://issuer.url + region: us-west-1 diff --git a/examples/eks/v1beta2/nodegroup.yaml b/examples/eks/v1beta2/nodegroup.yaml new file mode 100644 index 0000000000..57206d5e89 --- /dev/null +++ b/examples/eks/v1beta2/nodegroup.yaml @@ -0,0 +1,281 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: eks.aws.upbound.io/v1beta2 +kind: NodeGroup +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: sample-eks-ng +spec: + forProvider: + clusterNameRef: + name: sample-eks-cluster + nodeRoleArnRef: + name: sample-node-role + region: us-west-1 + scalingConfig: + desiredSize: 1 + maxSize: 1 + minSize: 1 + subnetIdRefs: + - name: sample-subnet1 + - name: sample-subnet2 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: sample-node-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "ec2.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: sample-node-policy +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy + roleRef: + name: sample-node-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: sample-node-policy-2 +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy + roleRef: + name: sample-node-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: sample-node-policy-3 +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly + roleRef: + name: sample-node-role + +--- + +apiVersion: eks.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + uptest.upbound.io/timeout: "2400" + labels: + testing.upbound.io/example-name: example + name: sample-eks-cluster +spec: + forProvider: + region: us-west-1 + roleArnRef: + name: sample-eks-cluster + vpcConfig: + subnetIdRefs: + - name: sample-subnet1 + - name: sample-subnet2 + +--- + +apiVersion: eks.aws.upbound.io/v1beta1 +kind: ClusterAuth +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta1/cluster + name: auth +spec: + forProvider: + clusterNameSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + writeConnectionSecretToRef: + name: cluster-conn + namespace: upbound-system + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: sample-eks-cluster +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "eks.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: sample-cluster-policy +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonEKSClusterPolicy + roleRef: + name: sample-eks-cluster + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: sample-subnet1 +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.10.0/24 + mapPublicIpOnLaunch: true + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: sample-subnet2 +spec: + forProvider: + availabilityZone: us-west-1a + cidrBlock: 172.16.11.0/24 + mapPublicIpOnLaunch: true + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: private-subnet +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.12.0/24 + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: RouteTable +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: example +spec: + forProvider: + region: us-west-1 + tags: + Name: example + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: sample-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + enableDnsHostnames: true + region: us-west-1 + tags: + Name: DemoVpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: InternetGateway +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: example +spec: + forProvider: + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: DefaultRouteTable +metadata: + annotations: + meta.upbound.io/example-id: eks/v1beta2/nodegroup + name: example +spec: + forProvider: + defaultRouteTableIdRef: + name: sample-vpc + region: us-west-1 + route: + - cidrBlock: 0.0.0.0/0 + gatewayIdRef: + name: example diff --git a/examples/elasticache/v1beta2/replicationgroup-engineVersion.yaml b/examples/elasticache/v1beta2/replicationgroup-engineVersion.yaml new file mode 100644 index 0000000000..0dccb7d907 --- /dev/null +++ b/examples/elasticache/v1beta2/replicationgroup-engineVersion.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elasticache.aws.upbound.io/v1beta2 +kind: ReplicationGroup +metadata: + annotations: + meta.upbound.io/example-id: elasticache/v1beta2/replicationgroup + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: example-${Rand.RFC1123Subdomain} +spec: + forProvider: + automaticFailoverEnabled: true + description: example description + engineVersion: "7.1" + nodeType: cache.m4.large + numCacheClusters: 2 + parameterGroupName: default.redis7 + port: 6379 + region: us-west-1 diff --git a/examples/elasticache/v1beta2/replicationgroup.yaml b/examples/elasticache/v1beta2/replicationgroup.yaml index f00571a9d5..24098c3b7e 100644 --- a/examples/elasticache/v1beta2/replicationgroup.yaml +++ b/examples/elasticache/v1beta2/replicationgroup.yaml @@ -6,11 +6,11 @@ apiVersion: elasticache.aws.upbound.io/v1beta2 kind: ReplicationGroup metadata: annotations: - meta.upbound.io/example-id: elasticache/v1beta1/replicationgroup + meta.upbound.io/example-id: elasticache/v1beta2/replicationgroup uptest.upbound.io/timeout: "3600" labels: testing.upbound.io/example-name: example - name: example + name: example-${Rand.RFC1123Subdomain} spec: forProvider: automaticFailoverEnabled: true diff --git a/examples/elasticache/v1beta2/user.yaml b/examples/elasticache/v1beta2/user.yaml new file mode 100644 index 0000000000..55574d4214 --- /dev/null +++ b/examples/elasticache/v1beta2/user.yaml @@ -0,0 +1,30 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elasticache.aws.upbound.io/v1beta2 +kind: User +metadata: + annotations: + meta.upbound.io/example-id: elasticache/v1beta2/user + upjet.upbound.io/manual-intervention: This resource needs secrets that must contain + valid credentials. + name: sample-user +spec: + forProvider: + accessString: on ~app::* -@all +@read +@hash +@bitmap +@geo -setbit -bitfield + -hset -hsetnx -hmset -hincrby -hincrbyfloat -hdel -bitop -geoadd -georadius + -georadiusbymember + engine: REDIS + passwordsSecretRef: + - key: pwd-1 + name: user-passwords + namespace: crossplane-system + - key: pwd-2 + name: user-passwords + namespace: crossplane-system + region: us-west-1 + userName: testUserName + writeConnectionSecretToRef: + name: user-conn + namespace: default diff --git a/examples/elasticbeanstalk/v1beta2/application.yaml b/examples/elasticbeanstalk/v1beta2/application.yaml new file mode 100644 index 0000000000..70504f34f2 --- /dev/null +++ b/examples/elasticbeanstalk/v1beta2/application.yaml @@ -0,0 +1,19 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elasticbeanstalk.aws.upbound.io/v1beta2 +kind: Application +metadata: + annotations: + meta.upbound.io/example-id: elasticbeanstalk/v1beta2/application + labels: + testing.upbound.io/example-name: tftest + name: first-app-test-qwerty-test +spec: + forProvider: + appversionLifecycle: + deleteSourceFromS3: true + maxCount: 128 + serviceRole: arn:aws:iam::153891904029:role/aws-elasticbeanstalk-service-role + region: us-west-1 diff --git a/examples/elasticsearch/v1beta2/domain.yaml b/examples/elasticsearch/v1beta2/domain.yaml new file mode 100644 index 0000000000..dbdff4cb7d --- /dev/null +++ b/examples/elasticsearch/v1beta2/domain.yaml @@ -0,0 +1,36 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elasticsearch.aws.upbound.io/v1beta2 +kind: Domain +metadata: + annotations: + meta.upbound.io/example-id: elasticsearch/v1beta2/domain + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + accessPolicies: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "AWS": "*" + }, + "Action": "es:*", + "Resource": "arn:aws:es:us-west-1:domain/example/*" + } + ] + } + clusterConfig: + instanceType: r4.large.elasticsearch + ebsOptions: + ebsEnabled: true + volumeSize: 30 + elasticsearchVersion: "5.3" + region: us-west-1 diff --git a/examples/elasticsearch/v1beta2/domainsamloptions.yaml b/examples/elasticsearch/v1beta2/domainsamloptions.yaml new file mode 100644 index 0000000000..53bd9061e1 --- /dev/null +++ b/examples/elasticsearch/v1beta2/domainsamloptions.yaml @@ -0,0 +1,44 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elasticsearch.aws.upbound.io/v1beta2 +kind: DomainSAMLOptions +metadata: + annotations: + meta.upbound.io/example-id: elasticsearch/v1beta2/domainsamloptions + upjet.upbound.io/manual-intervention: This resource requires a valid saml metadata + content. + labels: + testing.upbound.io/example-name: example + name: example-domainsamloptions +spec: + forProvider: + region: us-west-1 + samlOptions: + enabled: true + idp: + entityId: https://example.com + metadataContent: ${file("./saml-metadata.xml")} + +--- + +apiVersion: elasticsearch.aws.upbound.io/v1beta2 +kind: Domain +metadata: + annotations: + meta.upbound.io/example-id: elasticsearch/v1beta2/domainsamloptions + upjet.upbound.io/manual-intervention: This resource is dependency of DomainSAMLOptions. + This resource is skipping because parent resource was skipped. + labels: + testing.upbound.io/example-name: example + name: example-domainsamloptions +spec: + forProvider: + clusterConfig: + instanceType: r4.large.elasticsearch + ebsOptions: + ebsEnabled: true + volumeSize: 30 + elasticsearchVersion: "5.3" + region: us-west-1 diff --git a/examples/elastictranscoder/v1beta2/pipeline.yaml b/examples/elastictranscoder/v1beta2/pipeline.yaml new file mode 100644 index 0000000000..4c6d9f883b --- /dev/null +++ b/examples/elastictranscoder/v1beta2/pipeline.yaml @@ -0,0 +1,78 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elastictranscoder.aws.upbound.io/v1beta2 +kind: Pipeline +metadata: + annotations: + meta.upbound.io/example-id: elastictranscoder/v1beta2/pipeline + labels: + testing.upbound.io/example-name: bar + name: bar +spec: + forProvider: + contentConfig: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: content_bucket_label + storageClass: Standard + inputBucketSelector: + matchLabels: + testing.upbound.io/example-name: input_bucket_label + name: pipeline_tf_test_name + region: us-west-1 + role: arn:aws:iam::153891904029:role/Elastic_Transcoder_Default_Role + thumbnailConfig: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: thumb_bucket_label + storageClass: Standard + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: elastictranscoder/v1beta2/pipeline + labels: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + testing.upbound.io/example-name: input_bucket_label + name: ${Rand.RFC1123Subdomain} +spec: + forProvider: + forceDestroy: true + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: elastictranscoder/v1beta2/pipeline + labels: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + testing.upbound.io/example-name: content_bucket_label + name: ${Rand.RFC1123Subdomain} +spec: + forProvider: + forceDestroy: true + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: elastictranscoder/v1beta2/pipeline + labels: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + testing.upbound.io/example-name: thumb_bucket_label + name: ${Rand.RFC1123Subdomain} +spec: + forProvider: + forceDestroy: true + region: us-west-1 diff --git a/examples/elastictranscoder/v1beta2/preset.yaml b/examples/elastictranscoder/v1beta2/preset.yaml new file mode 100644 index 0000000000..fefb548d60 --- /dev/null +++ b/examples/elastictranscoder/v1beta2/preset.yaml @@ -0,0 +1,62 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elastictranscoder.aws.upbound.io/v1beta2 +kind: Preset +metadata: + annotations: + meta.upbound.io/example-id: elastictranscoder/v1beta2/preset + labels: + testing.upbound.io/example-name: bar + name: bar +spec: + forProvider: + audio: + audioPackingMode: SingleTrack + bitRate: "96" + channels: "2" + codec: AAC + sampleRate: "44100" + audioCodecOptions: + profile: AAC-LC + container: mp4 + description: Sample Preset + name: sample_preset + region: us-west-1 + thumbnails: + format: png + interval: "120" + maxHeight: auto + maxWidth: auto + paddingPolicy: Pad + sizingPolicy: Fit + video: + bitRate: "1600" + codec: H.264 + displayAspectRatio: "16:9" + fixedGop: "false" + frameRate: auto + keyframesMaxDist: "240" + maxFrameRate: "60" + maxHeight: auto + maxWidth: auto + paddingPolicy: Pad + sizingPolicy: Fit + videoCodecOptions: + ColorSpaceConversionMode: None + InterlacedMode: Progressive + Level: "2.2" + MaxReferenceFrames: "3" + Profile: main + videoWatermarks: + - horizontalAlign: Right + horizontalOffset: 10px + id: Terraform Test + maxHeight: 20% + maxWidth: 20% + opacity: "55.5" + sizingPolicy: ShrinkToFit + target: Content + verticalAlign: Bottom + verticalOffset: 10px diff --git a/examples/elb/v1beta2/elb.yaml b/examples/elb/v1beta2/elb.yaml new file mode 100644 index 0000000000..80b74f9c5c --- /dev/null +++ b/examples/elb/v1beta2/elb.yaml @@ -0,0 +1,128 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elb.aws.upbound.io/v1beta2 +kind: ELB +metadata: + annotations: + meta.upbound.io/example-id: elb/v1beta2/elb + name: example +spec: + forProvider: + connectionDraining: true + connectionDrainingTimeout: 400 + crossZoneLoadBalancing: true + healthCheck: + healthyThreshold: 2 + interval: 30 + target: HTTP:8000/ + timeout: 3 + unhealthyThreshold: 2 + idleTimeout: 400 + listener: + - instancePort: 8000 + instanceProtocol: http + lbPort: 80 + lbProtocol: http + region: us-west-1 + subnetsRefs: + - name: sample-subnet1 + - name: sample-subnet2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: elb/v1beta2/elb + name: upbound-instance +spec: + forProvider: + ami: ami-07b068f843ec78e72 + creditSpecification: + cpuCredits: unlimited + instanceType: t2.micro + networkInterface: + - deviceIndex: 0 + networkInterfaceIdRef: + name: sample-ni + region: us-west-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: NetworkInterface +metadata: + annotations: + meta.upbound.io/example-id: elb/v1beta2/elb + name: sample-ni +spec: + forProvider: + privateIps: + - 172.16.10.100 + region: us-west-1 + subnetIdRef: + name: sample-subnet1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: elb/v1beta2/elb + name: sample-subnet1 +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.10.0/24 + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: elb/v1beta2/elb + name: sample-subnet2 +spec: + forProvider: + availabilityZone: us-west-1c + cidrBlock: 172.16.11.0/24 + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: elb/v1beta2/elb + name: sample-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: DemoVpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: InternetGateway +metadata: + annotations: + meta.upbound.io/example-id: elb/v1beta2/elb + name: example +spec: + forProvider: + region: us-west-1 + vpcIdRef: + name: sample-vpc diff --git a/examples/elbv2/v1beta2/lb.yaml b/examples/elbv2/v1beta2/lb.yaml new file mode 100644 index 0000000000..fb714ea644 --- /dev/null +++ b/examples/elbv2/v1beta2/lb.yaml @@ -0,0 +1,122 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elbv2.aws.upbound.io/v1beta2 +kind: LB +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lb + labels: + testing.upbound.io/example-name: elbv2 + name: test +spec: + forProvider: + enableDeletionProtection: false + internal: false + loadBalancerType: application + name: test-lb-tf + region: us-west-1 + securityGroupSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + subnetSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + tags: + Environment: production + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lb + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: DemoVpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: InternetGateway +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lb + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-internet-gateway +spec: + forProvider: + region: us-west-1 + tags: + Name: testing + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lb + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-subnet +spec: + forProvider: + availabilityZone: us-west-1a + cidrBlock: 172.16.10.0/24 + region: us-west-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lb + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-subnet-2 +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.20.0/24 + region: us-west-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lb + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-securitygroup +spec: + forProvider: + description: Allow TLS inbound traffic + name: allow_tls + region: us-west-1 + tags: + Name: allow_tls + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 diff --git a/examples/elbv2/v1beta2/lblistener.yaml b/examples/elbv2/v1beta2/lblistener.yaml new file mode 100644 index 0000000000..9713ed0129 --- /dev/null +++ b/examples/elbv2/v1beta2/lblistener.yaml @@ -0,0 +1,167 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elbv2.aws.upbound.io/v1beta2 +kind: LBListener +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistener + labels: + testing.upbound.io/example-name: elbv2 + name: front-end +spec: + forProvider: + defaultAction: + - targetGroupArnSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + type: forward + loadBalancerArnSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + port: 80 + protocol: HTTP + region: us-west-1 + +--- + +apiVersion: elbv2.aws.upbound.io/v1beta2 +kind: LBTargetGroup +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistener + labels: + testing.upbound.io/example-name: elbv2 + name: test +spec: + forProvider: + name: example-lb-tg + port: 80 + protocol: HTTP + region: us-west-1 + targetType: ip + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: elbv2.aws.upbound.io/v1beta2 +kind: LB +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistener + labels: + testing.upbound.io/example-name: elbv2 + name: test +spec: + forProvider: + enableDeletionProtection: false + internal: false + loadBalancerType: application + name: test-lb-tf + region: us-west-1 + securityGroupSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + subnetSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + tags: + Environment: production + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistener + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: DemoVpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: InternetGateway +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistener + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-internet-gateway +spec: + forProvider: + region: us-west-1 + tags: + Name: testing + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistener + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-subnet +spec: + forProvider: + availabilityZone: us-west-1a + cidrBlock: 172.16.10.0/24 + region: us-west-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistener + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-subnet-2 +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.20.0/24 + region: us-west-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistener + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-securitygroup +spec: + forProvider: + description: Allow TLS inbound traffic + name: allow_tls + region: us-west-1 + tags: + Name: allow_tls + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 diff --git a/examples/elbv2/v1beta2/lblistenerrule.yaml b/examples/elbv2/v1beta2/lblistenerrule.yaml new file mode 100644 index 0000000000..1c9f1ba505 --- /dev/null +++ b/examples/elbv2/v1beta2/lblistenerrule.yaml @@ -0,0 +1,194 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elbv2.aws.upbound.io/v1beta2 +kind: LBListenerRule +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistenerrule + labels: + testing.upbound.io/example-name: static + name: static +spec: + forProvider: + action: + - targetGroupArnSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + type: forward + condition: + - pathPattern: + values: + - /static/* + - hostHeader: + values: + - example.com + listenerArnSelector: + matchLabels: + testing.upbound.io/example-name: front_end + priority: 100 + region: us-west-1 + +--- + +apiVersion: elbv2.aws.upbound.io/v1beta2 +kind: LB +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistenerrule + labels: + testing.upbound.io/example-name: front_end + name: front-end +spec: + forProvider: + region: us-west-1 + securityGroupSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + subnetMapping: + - subnetIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + - subnetIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2s2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistenerrule + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: DemoVpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: InternetGateway +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistenerrule + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-internet-gateway +spec: + forProvider: + region: us-west-1 + tags: + Name: testing + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistenerrule + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-subnet +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.10.0/24 + region: us-west-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistenerrule + labels: + testing.upbound.io/example-name: elbv2s2 + name: elbv2-subnet-2 +spec: + forProvider: + availabilityZone: us-west-1a + cidrBlock: 172.16.20.0/24 + region: us-west-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistenerrule + labels: + testing.upbound.io/example-name: elbv2 + name: elbv2-securitygroup +spec: + forProvider: + description: Allow TLS inbound traffic + name: allow_tls + region: us-west-1 + tags: + Name: allow_tls + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: elbv2.aws.upbound.io/v1beta2 +kind: LBListener +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistenerrule + labels: + testing.upbound.io/example-name: front_end + name: front-end +spec: + forProvider: + defaultAction: + - targetGroupArnSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + type: forward + loadBalancerArnSelector: + matchLabels: + testing.upbound.io/example-name: front_end + port: 443 + region: us-west-1 + +--- + +apiVersion: elbv2.aws.upbound.io/v1beta2 +kind: LBTargetGroup +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lblistenerrule + labels: + testing.upbound.io/example-name: elbv2 + name: test +spec: + forProvider: + name: example-lb-tg + port: 80 + protocol: HTTP + region: us-west-1 + targetType: ip + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 diff --git a/examples/elbv2/v1beta2/lbtargetgroupattachment.yaml b/examples/elbv2/v1beta2/lbtargetgroupattachment.yaml new file mode 100644 index 0000000000..f3cebea9d2 --- /dev/null +++ b/examples/elbv2/v1beta2/lbtargetgroupattachment.yaml @@ -0,0 +1,41 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: elbv2.aws.upbound.io/v1beta2 +kind: LBTargetGroup +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lbtargetgroup + labels: + testing.upbound.io/example-name: elbv2 + name: test +spec: + forProvider: + name: example-lb-tg + port: 80 + protocol: HTTP + region: us-west-1 + targetType: ip + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + +--- + +apiVersion: elbv2.aws.upbound.io/v1beta1 +kind: LBTargetGroupAttachment +metadata: + annotations: + meta.upbound.io/example-id: elbv2/v1beta2/lbtargetgroup + labels: + testing.upbound.io/example-name: elbv2 + name: test +spec: + forProvider: + port: 80 + region: us-west-1 + targetGroupArnSelector: + matchLabels: + testing.upbound.io/example-name: elbv2 + targetId: 172.16.10.25 diff --git a/examples/emrserverless/v1beta2/application.yaml b/examples/emrserverless/v1beta2/application.yaml new file mode 100644 index 0000000000..0169a0c2e4 --- /dev/null +++ b/examples/emrserverless/v1beta2/application.yaml @@ -0,0 +1,21 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: emrserverless.aws.upbound.io/v1beta2 +kind: Application +metadata: + annotations: + meta.upbound.io/example-id: emrserverless/v1beta2/application + labels: + testing.upbound.io/example-name: example + name: app +spec: + forProvider: + maximumCapacity: + cpu: 2 vCPU + memory: 2 GB + name: example + region: us-west-1 + releaseLabel: emr-6.6.0 + type: hive diff --git a/examples/evidently/v1beta2/feature.yaml b/examples/evidently/v1beta2/feature.yaml new file mode 100644 index 0000000000..a9467c492d --- /dev/null +++ b/examples/evidently/v1beta2/feature.yaml @@ -0,0 +1,43 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: evidently.aws.upbound.io/v1beta2 +kind: Feature +metadata: + annotations: + meta.upbound.io/example-id: evidently/v1beta2/feature + labels: + testing.upbound.io/example-name: feature + name: feature +spec: + forProvider: + description: example description + projectSelector: + matchLabels: + testing.upbound.io/example-name: feature + region: us-east-1 + tags: + Key1: example Feature + variations: + - name: Variation1 + value: + stringValue: example + +--- + +apiVersion: evidently.aws.upbound.io/v1beta2 +kind: Project +metadata: + annotations: + meta.upbound.io/example-id: evidently/v1beta2/feature + labels: + testing.upbound.io/example-name: feature + name: feature +spec: + forProvider: + description: Example Description + name: evidentlyproject + region: us-east-1 + tags: + Key1: example Project diff --git a/examples/evidently/v1beta2/project.yaml b/examples/evidently/v1beta2/project.yaml new file mode 100644 index 0000000000..a740ec45e2 --- /dev/null +++ b/examples/evidently/v1beta2/project.yaml @@ -0,0 +1,19 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: evidently.aws.upbound.io/v1beta2 +kind: Project +metadata: + annotations: + meta.upbound.io/example-id: evidently/v1beta2/project + labels: + testing.upbound.io/example-name: evidently_project + name: evidently-project +spec: + forProvider: + description: Example Description + name: evidentlyproject + region: us-east-1 + tags: + Key1: example Project diff --git a/examples/firehose/v1beta2/deliverystream.yaml b/examples/firehose/v1beta2/deliverystream.yaml new file mode 100644 index 0000000000..57555d69e3 --- /dev/null +++ b/examples/firehose/v1beta2/deliverystream.yaml @@ -0,0 +1,65 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: firehose.aws.upbound.io/v1beta2 +kind: DeliveryStream +metadata: + annotations: + meta.upbound.io/example-id: firehose/v1beta2/deliverystream + labels: + testing.upbound.io/example-name: firehose + name: example +spec: + forProvider: + destination: extended_s3 + extendedS3Configuration: + bucketArnSelector: + matchLabels: + testing.upbound.io/example-name: firehose + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: firehose + name: example + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: efirehose + meta.upbound.io/example-id: firehose/v1beta2/deliverystream + labels: + testing.upbound.io/example-name: firehose + name: firehose +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: firehose/v1beta2/deliverystream + labels: + testing.upbound.io/example-name: firehose + name: sample-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "firehose.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } diff --git a/examples/fis/v1beta2/experimenttemplate.yaml b/examples/fis/v1beta2/experimenttemplate.yaml new file mode 100644 index 0000000000..f62f370df7 --- /dev/null +++ b/examples/fis/v1beta2/experimenttemplate.yaml @@ -0,0 +1,60 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: fis.aws.upbound.io/v1beta2 +kind: ExperimentTemplate +metadata: + annotations: + meta.upbound.io/example-id: fis/v1beta2/experimenttemplate + labels: + testing.upbound.io/example-name: experimenttemplate + name: experimenttemplate +spec: + forProvider: + action: + - actionId: aws:ec2:terminate-instances + name: example-action + target: + key: Instances + value: example-target + description: example + region: us-west-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: experimenttemplate + stopCondition: + - source: none + target: + - name: example-target + resourceTag: + - key: env + value: example + resourceType: aws:ec2:instance + selectionMode: COUNT(1) + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: fis/v1beta2/experimenttemplate + labels: + testing.upbound.io/example-name: experimenttemplate + name: experimenttemplate +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "fis.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } diff --git a/examples/fsx/v1beta2/datarepositoryassociation.yaml b/examples/fsx/v1beta2/datarepositoryassociation.yaml new file mode 100644 index 0000000000..34a1bfcee2 --- /dev/null +++ b/examples/fsx/v1beta2/datarepositoryassociation.yaml @@ -0,0 +1,100 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: fsx.aws.upbound.io/v1beta2 +kind: DataRepositoryAssociation +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/datarepositoryassociation + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + dataRepositoryPath: s3://example-rand12345 + fileSystemIdSelector: + matchLabels: + testing.upbound.io/example-name: example + fileSystemPath: /my-bucket + region: us-east-1 + s3: + autoExportPolicy: + events: + - NEW + - CHANGED + - DELETED + autoImportPolicy: + events: + - NEW + - CHANGED + - DELETED + +--- + +apiVersion: fsx.aws.upbound.io/v1beta2 +kind: LustreFileSystem +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/datarepositoryassociation + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + deploymentType: PERSISTENT_2 + perUnitStorageThroughput: 125 + region: us-east-1 + storageCapacity: 1200 + subnetIdRefs: + - name: test1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: example-rand12345 + meta.upbound.io/example-id: fsx/v1beta2/datarepositoryassociation + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-east-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/datarepositoryassociation + labels: + testing.upbound.io/example-name: test1 + name: test1 +spec: + forProvider: + availabilityZone: us-east-1a + cidrBlock: 10.0.1.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/datarepositoryassociation + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: us-east-1 diff --git a/examples/fsx/v1beta2/lustrefilesystem.yaml b/examples/fsx/v1beta2/lustrefilesystem.yaml new file mode 100644 index 0000000000..87ec62313e --- /dev/null +++ b/examples/fsx/v1beta2/lustrefilesystem.yaml @@ -0,0 +1,53 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: fsx.aws.upbound.io/v1beta2 +kind: LustreFileSystem +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/lustrefilesystem + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-east-1 + storageCapacity: 1200 + subnetIdRefs: + - name: test1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/lustrefilesystem + labels: + testing.upbound.io/example-name: test1 + name: test1 +spec: + forProvider: + availabilityZone: us-east-1a + cidrBlock: 10.0.1.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/lustrefilesystem + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: us-east-1 diff --git a/examples/fsx/v1beta2/ontapfilesystem.yaml b/examples/fsx/v1beta2/ontapfilesystem.yaml new file mode 100644 index 0000000000..75dbb8951d --- /dev/null +++ b/examples/fsx/v1beta2/ontapfilesystem.yaml @@ -0,0 +1,59 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: fsx.aws.upbound.io/v1beta2 +kind: OntapFileSystem +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/ontapfilesystem + uptest.upbound.io/timeout: "5400" + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + automaticBackupRetentionDays: 0 + deploymentType: SINGLE_AZ_1 + preferredSubnetIdSelector: + matchLabels: + testing.upbound.io/example-name: test1 + region: us-east-1 + storageCapacity: 1024 + subnetIdRefs: + - name: test1 + throughputCapacity: 128 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/ontapfilesystem + labels: + testing.upbound.io/example-name: test1 + name: test1 +spec: + forProvider: + availabilityZone: us-east-1a + cidrBlock: 10.0.1.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/ontapfilesystem + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: us-east-1 diff --git a/examples/fsx/v1beta2/ontapstoragevirtualmachine.yaml b/examples/fsx/v1beta2/ontapstoragevirtualmachine.yaml new file mode 100644 index 0000000000..cea66ad6d4 --- /dev/null +++ b/examples/fsx/v1beta2/ontapstoragevirtualmachine.yaml @@ -0,0 +1,77 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: fsx.aws.upbound.io/v1beta2 +kind: OntapStorageVirtualMachine +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/ontapstoragevirtualmachine + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + fileSystemIdSelector: + matchLabels: + testing.upbound.io/example-name: test + name: test + region: us-east-1 + +--- + +apiVersion: fsx.aws.upbound.io/v1beta2 +kind: OntapFileSystem +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/ontapstoragevirtualmachine + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + automaticBackupRetentionDays: 0 + deploymentType: SINGLE_AZ_1 + preferredSubnetIdSelector: + matchLabels: + testing.upbound.io/example-name: test1 + region: us-east-1 + storageCapacity: 1024 + subnetIdRefs: + - name: test1 + throughputCapacity: 128 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/ontapstoragevirtualmachine + labels: + testing.upbound.io/example-name: test1 + name: test1 +spec: + forProvider: + availabilityZone: us-east-1a + cidrBlock: 10.0.1.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/ontapstoragevirtualmachine + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: us-east-1 diff --git a/examples/fsx/v1beta2/windowsfilesystem.yaml b/examples/fsx/v1beta2/windowsfilesystem.yaml new file mode 100644 index 0000000000..1877bd1fba --- /dev/null +++ b/examples/fsx/v1beta2/windowsfilesystem.yaml @@ -0,0 +1,141 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: fsx.aws.upbound.io/v1beta2 +kind: WindowsFileSystem +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/windowsfilesystem + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + activeDirectoryIdSelector: + matchLabels: + testing.upbound.io/example-name: bar + kmsKeyIdSelector: + matchLabels: + testing.upbound.io/example-name: sample-key + region: us-east-1 + skipFinalBackup: true + storageCapacity: 32 + subnetIdRefs: + - name: foo + throughputCapacity: 8 + +--- + +apiVersion: ds.aws.upbound.io/v1beta2 +kind: Directory +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/windowsfilesystem + labels: + testing.upbound.io/example-name: bar + name: bar +spec: + forProvider: + edition: Standard + name: corp.notexample.com + passwordSecretRef: + key: example-key + name: example-secret + namespace: upbound-system + region: us-east-1 + tags: + Project: foo + type: MicrosoftAD + vpcSettings: + subnetIdsRefs: + - name: foo + - name: bar + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/windowsfilesystem + labels: + testing.upbound.io/example-name: bar + name: bar +spec: + forProvider: + availabilityZone: us-east-1b + cidrBlock: 10.0.2.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/windowsfilesystem + labels: + testing.upbound.io/example-name: foo + name: foo +spec: + forProvider: + availabilityZone: us-east-1a + cidrBlock: 10.0.1.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/windowsfilesystem + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: us-east-1 + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta1/windowsfilesystem + labels: + testing.upbound.io/example-name: secret-version + name: example-secret + namespace: upbound-system +stringData: + example-key: P@ssw0rd +type: Opaque + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: fsx/v1beta2/windowsfilesystem + labels: + testing.upbound.io/example-name: sample-key + name: sample-key +spec: + forProvider: + deletionWindowInDays: 7 + description: Created with Crossplane + region: us-east-1 diff --git a/examples/gamelift/v1beta2/alias.yaml b/examples/gamelift/v1beta2/alias.yaml new file mode 100644 index 0000000000..0937b34510 --- /dev/null +++ b/examples/gamelift/v1beta2/alias.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: gamelift.aws.upbound.io/v1beta2 +kind: Alias +metadata: + annotations: + meta.upbound.io/example-id: gamelift/v1beta2/alias + name: example +spec: + forProvider: + description: Example Description + name: example-alias + region: us-west-1 + routingStrategy: + message: Example Message + type: TERMINAL diff --git a/examples/gamelift/v1beta2/build.yaml b/examples/gamelift/v1beta2/build.yaml new file mode 100644 index 0000000000..3b385e5d97 --- /dev/null +++ b/examples/gamelift/v1beta2/build.yaml @@ -0,0 +1,21 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: gamelift.aws.upbound.io/v1beta2 +kind: Build +metadata: + annotations: + meta.upbound.io/example-id: gamelift/v1beta2/build + name: example +spec: + forProvider: + name: example-build + operatingSystem: WINDOWS_2012 + region: us-west-1 + storageLocation: + bucketRef: + name: example + key: new_object_key + roleArnRef: + name: example diff --git a/examples/gamelift/v1beta2/fleet.yaml b/examples/gamelift/v1beta2/fleet.yaml new file mode 100644 index 0000000000..c0a10e390a --- /dev/null +++ b/examples/gamelift/v1beta2/fleet.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: gamelift.aws.upbound.io/v1beta2 +kind: Fleet +metadata: + annotations: + meta.upbound.io/example-id: gamelift/v1beta2/fleet + name: example +spec: + forProvider: + buildIdRef: + name: example + ec2InstanceType: t2.micro + fleetType: ON_DEMAND + name: example-fleet-name + region: us-west-1 + runtimeConfiguration: + serverProcess: + - concurrentExecutions: 1 + launchPath: C:\game\GomokuServer.exe diff --git a/examples/gamelift/v1beta2/script.yaml b/examples/gamelift/v1beta2/script.yaml new file mode 100644 index 0000000000..800f4bfbea --- /dev/null +++ b/examples/gamelift/v1beta2/script.yaml @@ -0,0 +1,20 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: gamelift.aws.upbound.io/v1beta2 +kind: Script +metadata: + annotations: + meta.upbound.io/example-id: gamelift/v1beta2/script + name: example +spec: + forProvider: + name: example-script + region: us-east-1 + storageLocation: + bucketRef: + name: example + key: new_object_key + roleArnRef: + name: example diff --git a/examples/glacier/v1beta2/vault.yaml b/examples/glacier/v1beta2/vault.yaml new file mode 100644 index 0000000000..6bb01787d6 --- /dev/null +++ b/examples/glacier/v1beta2/vault.yaml @@ -0,0 +1,38 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: glacier.aws.upbound.io/v1beta2 +kind: Vault +metadata: + annotations: + meta.upbound.io/example-id: glacier/v1beta2/vault + labels: + testing.upbound.io/example-name: my_archive + name: my-archive +spec: + forProvider: + notification: + events: + - ArchiveRetrievalCompleted + - InventoryRetrievalCompleted + snsTopicSelector: + matchLabels: + testing.upbound.io/example-name: aws_sns_topic + region: us-west-1 + tags: + Test: MyArchive + +--- + +apiVersion: sns.aws.upbound.io/v1beta1 +kind: Topic +metadata: + annotations: + meta.upbound.io/example-id: glacier/v1beta2/vault + labels: + testing.upbound.io/example-name: aws_sns_topic + name: aws-sns-topic +spec: + forProvider: + region: us-west-1 diff --git a/examples/globalaccelerator/v1beta2/accelerator.yaml b/examples/globalaccelerator/v1beta2/accelerator.yaml new file mode 100644 index 0000000000..3192c61738 --- /dev/null +++ b/examples/globalaccelerator/v1beta2/accelerator.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: globalaccelerator.aws.upbound.io/v1beta2 +kind: Accelerator +metadata: + annotations: + meta.upbound.io/example-id: globalaccelerator/v1beta2/accelerator + name: sample-accelerator +spec: + forProvider: + ipAddressType: IPV4 + name: sample-accelerator + region: eu-west-1 + writeConnectionSecretToRef: + name: accelerator + namespace: upbound-system diff --git a/examples/glue/v1beta2/catalogdatabase.yaml b/examples/glue/v1beta2/catalogdatabase.yaml new file mode 100644 index 0000000000..13fec1d9f3 --- /dev/null +++ b/examples/glue/v1beta2/catalogdatabase.yaml @@ -0,0 +1,16 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: CatalogDatabase +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/catalogdatabase + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + catalogId: ${data.aws_account_id} + region: us-east-1 diff --git a/examples/glue/v1beta2/catalogtable.yaml b/examples/glue/v1beta2/catalogtable.yaml new file mode 100644 index 0000000000..91acd2c6db --- /dev/null +++ b/examples/glue/v1beta2/catalogtable.yaml @@ -0,0 +1,25 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: CatalogTable +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/catalogtable + name: example +spec: + forProvider: + catalogId: ${data.aws_account_id} + databaseNameRef: + name: example + region: us-east-1 + storageDescriptor: + columns: + - name: my_column_1 + type: string + - name: my_column_2 + type: string + - name: my_column_3 + type: string + tableType: EXTERNAL diff --git a/examples/glue/v1beta2/classifier.yaml b/examples/glue/v1beta2/classifier.yaml new file mode 100644 index 0000000000..fb50b3784e --- /dev/null +++ b/examples/glue/v1beta2/classifier.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: Classifier +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/classifier + name: example +spec: + forProvider: + csvClassifier: + allowSingleColumn: false + containsHeader: PRESENT + delimiter: ',' + disableValueTrimming: false + header: + - example1 + - example2 + quoteSymbol: '''' + region: us-east-1 diff --git a/examples/glue/v1beta2/connection.yaml b/examples/glue/v1beta2/connection.yaml new file mode 100644 index 0000000000..e5319e6b04 --- /dev/null +++ b/examples/glue/v1beta2/connection.yaml @@ -0,0 +1,34 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: Connection +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/connection + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + catalogId: ${data.aws_account_id} + connectionPropertiesSecretRef: + name: example-secret + namespace: upbound-system + region: us-west-1 + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta1/connection + name: example-secret + namespace: upbound-system +stringData: + JDBC_CONNECTION_URL: jdbc:mysql://my-db/exampledatabase + PASSWORD: examplepassword + USERNAME: exampleusername +type: Opaque diff --git a/examples/glue/v1beta2/crawler.yaml b/examples/glue/v1beta2/crawler.yaml new file mode 100644 index 0000000000..31526007d4 --- /dev/null +++ b/examples/glue/v1beta2/crawler.yaml @@ -0,0 +1,65 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: Crawler +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/crawler + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + databaseNameSelector: + matchLabels: + testing.upbound.io/example-name: example + dynamodbTarget: + - path: table-name + region: us-west-1 + roleSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/crawler + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "", + "Effect": "Allow", + "Principal": { + "Service": "glue.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: CatalogDatabase +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/crawler + labels: + testing.upbound.io/example-name: example + name: aws-glue-catalog-database +spec: + forProvider: + catalogId: ${data.aws_account_id} + region: us-west-1 diff --git a/examples/glue/v1beta2/datacatalogencryptionsettings.yaml b/examples/glue/v1beta2/datacatalogencryptionsettings.yaml new file mode 100644 index 0000000000..594d406c19 --- /dev/null +++ b/examples/glue/v1beta2/datacatalogencryptionsettings.yaml @@ -0,0 +1,36 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: DataCatalogEncryptionSettings +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/datacatalogencryptionsettings + name: example +spec: + forProvider: + dataCatalogEncryptionSettings: + connectionPasswordEncryption: + awsKmsKeyIdRef: + name: sample-key + returnConnectionPasswordEncrypted: true + encryptionAtRest: + catalogEncryptionMode: SSE-KMS + sseAwsKmsKeyIdRef: + name: sample-key + region: us-east-1 + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/datacatalogencryptionsettings + name: sample-key +spec: + forProvider: + deletionWindowInDays: 7 + description: Created with Crossplane + region: us-east-1 diff --git a/examples/glue/v1beta2/job.yaml b/examples/glue/v1beta2/job.yaml new file mode 100644 index 0000000000..b0e6647c97 --- /dev/null +++ b/examples/glue/v1beta2/job.yaml @@ -0,0 +1,46 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: CC0-1.0 + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: Job +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/job + labels: + testing.upbound.io/example-name: glue-job-example + name: example +spec: + forProvider: + region: us-east-1 + command: + scriptLocation: s3://somebucket/example.py + roleArnRef: + name: glue-job-example + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/job + labels: + testing.upbound.io/example-name: glue-job-example + name: glue-job-example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "", + "Effect": "Allow", + "Principal": { + "Service": "glue.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } diff --git a/examples/glue/v1beta2/securityconfiguration.yaml b/examples/glue/v1beta2/securityconfiguration.yaml new file mode 100644 index 0000000000..5c60d15ce2 --- /dev/null +++ b/examples/glue/v1beta2/securityconfiguration.yaml @@ -0,0 +1,41 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: SecurityConfiguration +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/securityconfiguration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + encryptionConfiguration: + cloudwatchEncryption: + cloudwatchEncryptionMode: DISABLED + jobBookmarksEncryption: + jobBookmarksEncryptionMode: DISABLED + s3Encryption: + kmsKeyArnSelector: + matchLabels: + testing.upbound.io/example-name: glue-example-key + s3EncryptionMode: SSE-KMS + region: us-west-1 + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/securityconfiguration + labels: + testing.upbound.io/example-name: glue-example-key + name: glue-example-key +spec: + forProvider: + deletionWindowInDays: 7 + description: Created with Crossplane + region: us-west-1 diff --git a/examples/glue/v1beta2/trigger.yaml b/examples/glue/v1beta2/trigger.yaml new file mode 100644 index 0000000000..9abaf40a9a --- /dev/null +++ b/examples/glue/v1beta2/trigger.yaml @@ -0,0 +1,20 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: Trigger +metadata: + annotations: + meta.upbound.io/example-id: glue/v1beta2/trigger + name: example +spec: + forProvider: + actions: + - jobName: example + predicate: + conditions: + - jobName: another + state: SUCCEEDED + region: us-east-1 + type: CONDITIONAL diff --git a/examples/grafana/v1beta2/workspace.yaml b/examples/grafana/v1beta2/workspace.yaml new file mode 100644 index 0000000000..9a47b2abc2 --- /dev/null +++ b/examples/grafana/v1beta2/workspace.yaml @@ -0,0 +1,49 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: grafana.aws.upbound.io/v1beta2 +kind: Workspace +metadata: + annotations: + meta.upbound.io/example-id: grafana/v1beta2/workspace + labels: + testing.upbound.io/example-name: example + name: example-${Rand.RFC1123Subdomain} +spec: + forProvider: + accountAccessType: CURRENT_ACCOUNT + authenticationProviders: + - SAML + permissionType: SERVICE_MANAGED + region: us-east-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: assume-w + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: grafana/v1beta2/workspace + labels: + testing.upbound.io/example-name: assume-w + name: assume-w +spec: + forProvider: + assumeRolePolicy: |- + ${jsonencode({ + Version = "2012-10-17" + Statement = [ + { + Action = "sts:AssumeRole" + Effect = "Allow" + Sid = "" + Principal = { + Service = "grafana.amazonaws.com" + } + }, + ] + })} diff --git a/examples/guardduty/v1beta2/detector.yaml b/examples/guardduty/v1beta2/detector.yaml new file mode 100644 index 0000000000..e39bbb744b --- /dev/null +++ b/examples/guardduty/v1beta2/detector.yaml @@ -0,0 +1,19 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: guardduty.aws.upbound.io/v1beta2 +kind: Detector +metadata: + annotations: + meta.upbound.io/example-id: guardduty/v1beta2/detector + labels: + testing.upbound.io/example-name: Detector + name: detector +spec: + forProvider: + datasources: + s3Logs: + enable: true + enable: true + region: us-west-1 diff --git a/examples/guardduty/v1beta2/filter.yaml b/examples/guardduty/v1beta2/filter.yaml new file mode 100644 index 0000000000..4c3557f12f --- /dev/null +++ b/examples/guardduty/v1beta2/filter.yaml @@ -0,0 +1,52 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: guardduty.aws.upbound.io/v1beta2 +kind: Filter +metadata: + annotations: + meta.upbound.io/example-id: guardduty/v1beta2/filter + labels: + testing.upbound.io/example-name: filter + name: filter +spec: + forProvider: + action: ARCHIVE + detectorIdSelector: + matchLabels: + testing.upbound.io/example-name: detector + findingCriteria: + criterion: + - equals: + - us-west-1 + field: region + - field: service.additionalInfo.threatListName + notEquals: + - some-threat + - another-threat + - field: updatedAt + greaterThan: "2020-01-01T00:00:00Z" + lessThan: "2020-02-01T00:00:00Z" + - field: severity + greaterThanOrEqual: "4" + rank: 1 + region: us-west-1 + +--- + +apiVersion: guardduty.aws.upbound.io/v1beta2 +kind: Detector +metadata: + annotations: + meta.upbound.io/example-id: guardduty/v1beta2/filter + labels: + testing.upbound.io/example-name: detector + name: detector +spec: + forProvider: + datasources: + s3Logs: + enable: true + enable: true + region: us-west-1 diff --git a/examples/identitystore/v1beta2/user.yaml b/examples/identitystore/v1beta2/user.yaml new file mode 100644 index 0000000000..1b075970b5 --- /dev/null +++ b/examples/identitystore/v1beta2/user.yaml @@ -0,0 +1,25 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: identitystore.aws.upbound.io/v1beta2 +kind: User +metadata: + annotations: + meta.upbound.io/example-id: identitystore/v1beta2/user + upjet.upbound.io/manual-intervention: This resource requires a valid identityStoreId + labels: + testing.upbound.io/example-name: example-user + name: example-user +spec: + forProvider: + displayName: John Doe + emails: + value: john@example.com + identityStoreId: Identity store id from a manually created SSO instance in the + same region specified below + name: + familyName: Doe + givenName: John + region: us-east-1 + userName: johndoe diff --git a/examples/imagebuilder/v1beta2/containerrecipe.yaml b/examples/imagebuilder/v1beta2/containerrecipe.yaml new file mode 100644 index 0000000000..044bef2198 --- /dev/null +++ b/examples/imagebuilder/v1beta2/containerrecipe.yaml @@ -0,0 +1,51 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: imagebuilder.aws.upbound.io/v1beta2 +kind: ContainerRecipe +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/containerrecipe + upjet.upbound.io/manual-intervention: It requires a real componentArn to be specified + which is not supported yet + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + component: + - componentArn: arn:aws:imagebuilder:us-west-1:153891904029:component/test-component/1.0.0/1 + containerType: DOCKER + dockerfileTemplateData: | + FROM {{{ imagebuilder:parentImage }}} + {{{ imagebuilder:environments }}} + {{{ imagebuilder:components }}} + name: example + parentImage: arn:aws:imagebuilder:us-west-1:aws:image/amazon-linux-x86-latest/x.x.x + region: us-west-1 + targetRepository: + repositoryNameSelector: + matchLabels: + testing.upbound.io/example-name: example + service: ECR + version: 1.0.0 + +--- + +apiVersion: ecr.aws.upbound.io/v1beta2 +kind: Repository +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/containerrecipe + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + imageScanningConfiguration: + scanOnPush: true + imageTagMutability: IMMUTABLE + region: us-west-1 + tags: + key1: value1 diff --git a/examples/imagebuilder/v1beta2/distributionconfiguration.yaml b/examples/imagebuilder/v1beta2/distributionconfiguration.yaml new file mode 100644 index 0000000000..7b3ef76738 --- /dev/null +++ b/examples/imagebuilder/v1beta2/distributionconfiguration.yaml @@ -0,0 +1,21 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: imagebuilder.aws.upbound.io/v1beta2 +kind: DistributionConfiguration +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/distributionconfiguration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + distribution: + - amiDistributionConfiguration: + amiTags: + CostCenter: IT + region: us-west-1 + name: examle + region: us-west-1 diff --git a/examples/imagebuilder/v1beta2/image.yaml b/examples/imagebuilder/v1beta2/image.yaml new file mode 100644 index 0000000000..d829f10213 --- /dev/null +++ b/examples/imagebuilder/v1beta2/image.yaml @@ -0,0 +1,196 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: imagebuilder.aws.upbound.io/v1beta2 +kind: Image +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/image + upjet.upbound.io/manual-intervention: It requires a ImageRecipe with manual intervention + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + imageRecipeArnSelector: + matchLabels: + testing.upbound.io/example-name: example + infrastructureConfigurationArnSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + +--- + +apiVersion: imagebuilder.aws.upbound.io/v1beta2 +kind: ImageRecipe +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/image + upjet.upbound.io/manual-intervention: It requires a real componentArn to be specified + which is not supported yet + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + blockDeviceMapping: + - deviceName: /dev/xvdb + ebs: + deleteOnTermination: "true" + volumeSize: 100 + volumeType: gp2 + component: + - componentArn: arn:aws:imagebuilder:us-west-1:153891904029:component/example/1.0.0/1 + name: example + parentImage: ami-00d8a762cb0c50254 + region: us-west-1 + version: 1.0.0 + +--- + +apiVersion: imagebuilder.aws.upbound.io/v1beta2 +kind: InfrastructureConfiguration +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/image + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: example description + instanceProfileNameSelector: + matchLabels: + testing.upbound.io/example-name: example + name: exmple + region: us-west-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/image + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/image + labels: + testing.upbound.io/example-name: role + name: role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": ["ec2.amazonaws.com", "s3.amazonaws.com"] + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/image + labels: + testing.upbound.io/example-name: ssm_managed_instance_core + name: ssm-managed-instance-core +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/image + labels: + testing.upbound.io/example-name: ssm_full_access + name: ssm-full-access +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonSSMFullAccess + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/image + labels: + testing.upbound.io/example-name: ecr_container_builds + name: ecr-container-builds +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/EC2InstanceProfileForImageBuilderECRContainerBuilds + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/image + labels: + testing.upbound.io/example-name: image_builder + name: image-builder +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/EC2InstanceProfileForImageBuilder + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/image + labels: + testing.upbound.io/example-name: ssm_managed_instance + name: ssm-managed-instance +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonSSMManagedEC2InstanceDefaultPolicy + roleSelector: + matchLabels: + testing.upbound.io/example-name: role diff --git a/examples/imagebuilder/v1beta2/imagepipeline.yaml b/examples/imagebuilder/v1beta2/imagepipeline.yaml new file mode 100644 index 0000000000..7dafe5b817 --- /dev/null +++ b/examples/imagebuilder/v1beta2/imagepipeline.yaml @@ -0,0 +1,112 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: imagebuilder.aws.upbound.io/v1beta2 +kind: ImagePipeline +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/imagepipeline + upjet.upbound.io/manual-intervention: It requires a ImageRecipe with manual intervention + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + imageRecipeArnSelector: + matchLabels: + testing.upbound.io/example-name: example + infrastructureConfigurationArnSelector: + matchLabels: + testing.upbound.io/example-name: example + name: example + region: us-west-1 + +--- + +apiVersion: imagebuilder.aws.upbound.io/v1beta2 +kind: ImageRecipe +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/imagepipeline + upjet.upbound.io/manual-intervention: It requires a real componentArn to be specified + which is not supported yet + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + blockDeviceMapping: + - deviceName: /dev/xvdb + ebs: + deleteOnTermination: "true" + volumeSize: 100 + volumeType: gp2 + component: + - componentArn: arn:aws:imagebuilder:us-west-1:153891904029:component/test-component/1.0.0/1 + name: example + parentImage: arn:aws:imagebuilder:us-west-1:aws:image/amazon-linux-2-x86/x.x.x + region: us-west-1 + version: 1.0.0 + +--- + +apiVersion: imagebuilder.aws.upbound.io/v1beta2 +kind: InfrastructureConfiguration +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/imagepipeline + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: example description + instanceProfileNameSelector: + matchLabels: + testing.upbound.io/example-name: example + name: exmple + region: us-west-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/imagepipeline + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/imagepipeline + labels: + testing.upbound.io/example-name: role + name: role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "ec2.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } diff --git a/examples/imagebuilder/v1beta2/imagerecipe.yaml b/examples/imagebuilder/v1beta2/imagerecipe.yaml new file mode 100644 index 0000000000..f32f8c42f5 --- /dev/null +++ b/examples/imagebuilder/v1beta2/imagerecipe.yaml @@ -0,0 +1,28 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: imagebuilder.aws.upbound.io/v1beta2 +kind: ImageRecipe +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/imagerecipe + upjet.upbound.io/manual-intervention: It requires a real componentArn to be specified + which is not supported yet + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + blockDeviceMapping: + - deviceName: /dev/xvdb + ebs: + deleteOnTermination: "true" + volumeSize: 100 + volumeType: gp2 + component: + - componentArn: arn:aws:imagebuilder:us-west-1:153891904029:component/test-component/1.0.0/1 + name: example + parentImage: arn:aws:imagebuilder:us-west-1:aws:image/amazon-linux-2-x86/x.x.x + region: us-west-1 + version: 1.0.0 diff --git a/examples/imagebuilder/v1beta2/infrastructureconfiguration.yaml b/examples/imagebuilder/v1beta2/infrastructureconfiguration.yaml new file mode 100644 index 0000000000..4bb6dccbc9 --- /dev/null +++ b/examples/imagebuilder/v1beta2/infrastructureconfiguration.yaml @@ -0,0 +1,63 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: imagebuilder.aws.upbound.io/v1beta2 +kind: InfrastructureConfiguration +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/infrastructureconfiguration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: example description + instanceProfileNameSelector: + matchLabels: + testing.upbound.io/example-name: example + name: exmple + region: us-west-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/infrastructureconfiguration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: imagebuilder/v1beta2/infrastructureconfiguration + labels: + testing.upbound.io/example-name: role + name: role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "ec2.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } diff --git a/examples/iot/v1beta2/indexingconfiguration.yaml b/examples/iot/v1beta2/indexingconfiguration.yaml new file mode 100644 index 0000000000..4d4395e7eb --- /dev/null +++ b/examples/iot/v1beta2/indexingconfiguration.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: iot.aws.upbound.io/v1beta2 +kind: IndexingConfiguration +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/indexingconfiguration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 + thingIndexingConfiguration: + customField: null + thingIndexingMode: REGISTRY_AND_SHADOW diff --git a/examples/iot/v1beta2/provisioningtemplate.yaml b/examples/iot/v1beta2/provisioningtemplate.yaml new file mode 100644 index 0000000000..51948f46cb --- /dev/null +++ b/examples/iot/v1beta2/provisioningtemplate.yaml @@ -0,0 +1,123 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: iot.aws.upbound.io/v1beta2 +kind: ProvisioningTemplate +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/provisioningtemplate + labels: + testing.upbound.io/example-name: fleet + name: fleet +spec: + forProvider: + description: My provisioning template + provisioningRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: role + region: us-west-1 + templateBody: |- + ${jsonencode({ + Parameters = { + SerialNumber = { Type = "String" } + } + Resources = { + certificate = { + Properties = { + CertificateId = { Ref = "AWS::IoT::Certificate::Id" } + Status = "Active" + } + Type = "AWS::IoT::Certificate" + } + policy = { + Properties = { + PolicyName = "policy" + } + Type = "AWS::IoT::Policy" + } + } + })} + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/provisioningtemplate + labels: + testing.upbound.io/example-name: role + name: role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "iot.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/provisioningtemplate + labels: + testing.upbound.io/example-name: iot_fleet_provisioning_registration + name: iot-fleet-provisioning-registration +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/service-role/AWSIoTThingsRegistration + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + +--- + +apiVersion: iot.aws.upbound.io/v1beta1 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/provisioningtemplate + labels: + testing.upbound.io/example-name: policy + name: policy +spec: + forProvider: + policy: |- + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Action": "iot:*", + "Resource": "*" + } + ] + } + region: us-west-1 + +--- + +apiVersion: iot.aws.upbound.io/v1beta1 +kind: Certificate +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/provisioningtemplate + labels: + testing.upbound.io/example-name: cert + name: cert +spec: + forProvider: + active: true + region: us-west-1 diff --git a/examples/iot/v1beta2/thinggroup.yaml b/examples/iot/v1beta2/thinggroup.yaml new file mode 100644 index 0000000000..7a8375be70 --- /dev/null +++ b/examples/iot/v1beta2/thinggroup.yaml @@ -0,0 +1,15 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: iot.aws.upbound.io/v1beta2 +kind: ThingGroup +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/thinggroup + labels: + testing.upbound.io/example-name: parent + name: parent +spec: + forProvider: + region: us-west-1 diff --git a/examples/iot/v1beta2/thingtype.yaml b/examples/iot/v1beta2/thingtype.yaml new file mode 100644 index 0000000000..80509ba23f --- /dev/null +++ b/examples/iot/v1beta2/thingtype.yaml @@ -0,0 +1,16 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: iot.aws.upbound.io/v1beta2 +kind: ThingType +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/thingtype + labels: + testing.upbound.io/example-name: example + name: lightbulb +spec: + forProvider: + name: my_iot_thing + region: us-west-1 diff --git a/examples/iot/v1beta2/topicrule.yaml b/examples/iot/v1beta2/topicrule.yaml new file mode 100644 index 0000000000..ce770a7454 --- /dev/null +++ b/examples/iot/v1beta2/topicrule.yaml @@ -0,0 +1,90 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: iot.aws.upbound.io/v1beta2 +kind: TopicRule +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/topicrule + labels: + testing.upbound.io/example-name: rule + name: rule +spec: + forProvider: + description: Example rule + enabled: true + errorAction: + sns: + messageFormat: RAW + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: role + targetArnSelector: + matchLabels: + testing.upbound.io/example-name: myerrortopic + region: us-west-1 + sns: + - messageFormat: RAW + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: role + targetArnSelector: + matchLabels: + testing.upbound.io/example-name: mytopic + sql: SELECT * FROM 'topic/test' + sqlVersion: "2016-03-23" + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/topicrule + labels: + testing.upbound.io/example-name: role + name: role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "iot.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: sns.aws.upbound.io/v1beta1 +kind: Topic +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/topicrule + labels: + testing.upbound.io/example-name: myerrortopic + name: myerrortopic +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: sns.aws.upbound.io/v1beta1 +kind: Topic +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/topicrule + labels: + testing.upbound.io/example-name: mytopic + name: mytopic +spec: + forProvider: + region: us-west-1 diff --git a/examples/iot/v1beta2/topicruledestination.yaml b/examples/iot/v1beta2/topicruledestination.yaml new file mode 100644 index 0000000000..ac06a0f2dc --- /dev/null +++ b/examples/iot/v1beta2/topicruledestination.yaml @@ -0,0 +1,169 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: iot.aws.upbound.io/v1beta2 +kind: TopicRuleDestination +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/topicruledestination + labels: + testing.upbound.io/example-name: example + name: iot-topic-rule-destination-example +spec: + forProvider: + region: us-east-2 + vpcConfiguration: + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: iot-topic-rule-destination + securityGroupSelector: + matchLabels: + testing.upbound.io/example-name: iot-topic-rule-destination + subnetIdSelector: + matchLabels: + testing.upbound.io/example-name: iot-topic-rule-destination + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: iot-topic-rule-destination + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/topicruledestination + uptest.upbound.io/pre-delete-hook: testhooks/delete-topicruledestination.sh + labels: + testing.upbound.io/example-name: iot-topic-rule-destination + name: iot-topic-rule-destination-example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "iot.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + inlinePolicy: + - name: manage-vpc-networking + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Action": [ + "ec2:CreateNetworkInterface", + "ec2:DescribeNetworkInterfaces", + "ec2:DescribeVpcs", + "ec2:DeleteNetworkInterface", + "ec2:DescribeSubnets", + "ec2:DescribeVpcAttribute", + "ec2:DescribeSecurityGroups" + ], + "Resource": "*" + }, + { + "Effect": "Allow", + "Action": "ec2:CreateNetworkInterfacePermission", + "Resource": "*", + "Condition": { + "StringEquals": { + "ec2:ResourceTag/VPCDestinationENI": "true" + } + } + }, + { + "Effect": "Allow", + "Action": [ + "ec2:CreateTags" + ], + "Resource": "*", + "Condition": { + "StringEquals": { + "ec2:CreateAction": "CreateNetworkInterface", + "aws:RequestTag/VPCDestinationENI": "true" + } + } + } + ] + } + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/topicruledestination + labels: + testing.upbound.io/example-name: iot-topic-rule-destination + name: iot-topic-rule-destination-example +spec: + forProvider: + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: iot-topic-rule-destination + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/topicruledestination + labels: + testing.upbound.io/example-name: iot-topic-rule-destination + name: iot-topic-rule-destination-example-az1 +spec: + forProvider: + availabilityZone: us-east-2a + cidrBlock: 192.168.0.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: iot-topic-rule-destination + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/topicruledestination + labels: + testing.upbound.io/example-name: iot-topic-rule-destination + name: iot-topic-rule-destination-example-az2 +spec: + forProvider: + availabilityZone: us-east-2b + cidrBlock: 192.168.1.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: iot-topic-rule-destination + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: iot/v1beta2/topicruledestination + labels: + testing.upbound.io/example-name: iot-topic-rule-destination + name: iot-topic-rule-destination-example-vpc +spec: + forProvider: + cidrBlock: 192.168.0.0/22 + region: us-east-2 diff --git a/examples/ivs/v1beta2/recordingconfiguration.yaml b/examples/ivs/v1beta2/recordingconfiguration.yaml new file mode 100644 index 0000000000..0d055d2e1e --- /dev/null +++ b/examples/ivs/v1beta2/recordingconfiguration.yaml @@ -0,0 +1,19 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ivs.aws.upbound.io/v1beta2 +kind: RecordingConfiguration +metadata: + annotations: + meta.upbound.io/example-id: ivs/v1beta2/recordingconfiguration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + destinationConfiguration: + s3: + bucketName: upbound-provider-test-data + name: recording_configuration-1 + region: us-east-1 diff --git a/examples/kafka/v1beta2/serverlesscluster.yaml b/examples/kafka/v1beta2/serverlesscluster.yaml new file mode 100644 index 0000000000..95218bffa3 --- /dev/null +++ b/examples/kafka/v1beta2/serverlesscluster.yaml @@ -0,0 +1,98 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kafka.aws.upbound.io/v1beta2 +kind: ServerlessCluster +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta2/serverlesscluster + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + clientAuthentication: + sasl: + iam: + enabled: true + clusterName: Example + region: us-east-2 + vpcConfig: + - securityGroupIdSelector: + matchLabels: + testing.upbound.io/example-name: sg + subnetIdSelector: + matchLabels: + testing.upbound.io/example-name: subnets + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta2/serverlesscluster + labels: + testing.upbound.io/example-name: sg + name: sg +spec: + forProvider: + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta2/serverlesscluster + labels: + testing.upbound.io/example-name: subnets + name: subnet-az1 +spec: + forProvider: + availabilityZone: us-east-2a + cidrBlock: 192.168.0.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta2/serverlesscluster + labels: + testing.upbound.io/example-name: subnets + name: subnet-az2 +spec: + forProvider: + availabilityZone: us-east-2b + cidrBlock: 192.168.1.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta2/serverlesscluster + labels: + testing.upbound.io/example-name: vpc + name: vpc +spec: + forProvider: + cidrBlock: 192.168.0.0/22 + enableDnsHostnames: true + region: us-east-2 diff --git a/examples/kafka/v1beta3/cluster-ligth.yaml b/examples/kafka/v1beta3/cluster-ligth.yaml new file mode 100644 index 0000000000..e618cfba8b --- /dev/null +++ b/examples/kafka/v1beta3/cluster-ligth.yaml @@ -0,0 +1,97 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kafka.aws.upbound.io/v1beta3 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + brokerNodeGroupInfo: + clientSubnetsRefs: + - name: subnet-az1 + - name: subnet-az2 + instanceType: kafka.t3.small + securityGroupsRefs: + - name: sg + storageInfo: + ebsStorageInfo: + volumeSize: 1000 + clusterName: ${Rand.RFC1123Subdomain} + kafkaVersion: 2.6.0 + numberOfBrokerNodes: 2 + region: us-east-2 + tags: + foo: bar + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + labels: + testing.upbound.io/example-name: sg + name: sg +spec: + forProvider: + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + name: subnet-az1 +spec: + forProvider: + availabilityZone: us-east-2a + cidrBlock: 192.168.0.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + name: subnet-az2 +spec: + forProvider: + availabilityZone: us-east-2b + cidrBlock: 192.168.1.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + labels: + testing.upbound.io/example-name: vpc + name: vpc +spec: + forProvider: + cidrBlock: 192.168.0.0/22 + region: us-east-2 diff --git a/examples/kafka/v1beta3/cluster.yaml b/examples/kafka/v1beta3/cluster.yaml new file mode 100644 index 0000000000..a769a3934a --- /dev/null +++ b/examples/kafka/v1beta3/cluster.yaml @@ -0,0 +1,176 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kafka.aws.upbound.io/v1beta3 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + brokerNodeGroupInfo: + clientSubnetsRefs: + - name: subnet-az1 + - name: subnet-az2 + instanceType: kafka.t3.small + securityGroupsRefs: + - name: sg + storageInfo: + ebsStorageInfo: + volumeSize: 1000 + clusterName: ${Rand.RFC1123Subdomain} + configurationInfo: + arnSelector: + matchLabels: + testing.upbound.io/example-name: example + revision: 1 + encryptionInfo: + encryptionAtRestKmsKeyArnSelector: + matchLabels: + testing.upbound.io/example-name: kms + kafkaVersion: 2.6.0 + numberOfBrokerNodes: 2 + openMonitoring: + prometheus: + jmxExporter: + enabledInBroker: true + nodeExporter: + enabledInBroker: true + region: us-east-2 + tags: + foo: bar + +--- + +apiVersion: kafka.aws.upbound.io/v1beta1 +kind: Configuration +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + kafkaVersions: + - 2.6.0 + name: ${Rand.RFC1123Subdomain} + region: us-east-2 + serverProperties: | + auto.create.topics.enable = true + delete.topic.enable = true + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + labels: + testing.upbound.io/example-name: kms + name: kms +spec: + forProvider: + description: example + region: us-east-2 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + labels: + testing.upbound.io/example-name: bucket + name: ${Rand.RFC1123Subdomain} +spec: + forProvider: + region: us-east-2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + labels: + testing.upbound.io/example-name: sg + name: sg +spec: + forProvider: + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + name: subnet-az1 +spec: + forProvider: + availabilityZone: us-east-2a + cidrBlock: 192.168.0.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + name: subnet-az2 +spec: + forProvider: + availabilityZone: us-east-2b + cidrBlock: 192.168.1.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + labels: + testing.upbound.io/example-name: vpc + name: vpc +spec: + forProvider: + cidrBlock: 192.168.0.0/22 + region: us-east-2 + +--- + +apiVersion: cloudwatchlogs.aws.upbound.io/v1beta1 +kind: Group +metadata: + annotations: + meta.upbound.io/example-id: kafka/v1beta3/cluster + name: test +spec: + forProvider: + region: us-east-2 + tags: + Application: serviceA + Environment: production diff --git a/examples/kafkaconnect/v1beta2/connector-nokafka.yaml b/examples/kafkaconnect/v1beta2/connector-nokafka.yaml new file mode 100644 index 0000000000..2b086a5008 --- /dev/null +++ b/examples/kafkaconnect/v1beta2/connector-nokafka.yaml @@ -0,0 +1,285 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kafkaconnect.aws.upbound.io/v1beta2 +kind: Connector +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + uptest.upbound.io/timeout: "2100" + labels: + testing.upbound.io/example-name: connector-nokafka + name: connector-nokafka +spec: + forProvider: + capacity: + autoscaling: + maxWorkerCount: 2 + mcuCount: 1 + minWorkerCount: 1 + scaleInPolicy: + cpuUtilizationPercentage: 20 + scaleOutPolicy: + cpuUtilizationPercentage: 80 + connectorConfiguration: + connector.class: org.apache.kafka.connect.file.FileStreamSinkConnector + tasks.max: "1" + topics: example + kafkaCluster: + apacheKafkaCluster: + bootstrapServers: localhost:9092 + vpc: + securityGroupSelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + subnetSelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + kafkaClusterClientAuthentication: + authenticationType: NONE + kafkaClusterEncryptionInTransit: + encryptionType: PLAINTEXT + kafkaconnectVersion: 2.7.1 + logDelivery: + workerLogDelivery: + cloudwatchLogs: + enabled: true + logGroupSelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + firehose: + enabled: false + name: connector-nokafka + plugin: + - customPlugin: + arnSelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + revision: 1 + region: us-east-2 + serviceExecutionRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + +--- + +apiVersion: kafkaconnect.aws.upbound.io/v1beta2 +kind: CustomPlugin +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector-nokafka + name: example +spec: + forProvider: + contentType: ZIP + location: + s3: + bucketArnSelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + fileKeySelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + name: empty-example + region: us-east-2 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector-nokafka + name: connector-nokafka +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": [ + "kafkaconnect.amazonaws.com", + "firehose.amazonaws.com" + ] + }, + "Action": "sts:AssumeRole" + } + ] + } + managedPolicyArns: + - arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector-nokafka + name: ${Rand.RFC1123Subdomain} +spec: + forProvider: + forceDestroy: true + region: us-east-2 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Object +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + uptest.upbound.io/disable-import: "true" + labels: + testing.upbound.io/example-name: connector-nokafka + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + contentBase64: | + UEsDBAoAAAAAAPpkXlcAAAAAAAAAAAAAAAAFABwAZW1wdHlVVAkAA4gGQGWIBkBldXgLAAEE6AMAAAToAwAAUEsBAh4DCgAAAAAA+mReVwAAAAAAAAAAAAAAAAUAGAAAAAAAAAAAALSBAAAAAGVtcHR5VVQFAAOIBkBldXgLAAEE6AMAAAToAwAAUEsFBgAAAAABAAEASwAAAD8AAAAAAA== + contentType: application/zip + key: empty.zip + region: us-east-2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector-nokafka + name: sg +spec: + forProvider: + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector-nokafka + name: subnet-az1 +spec: + forProvider: + availabilityZone: us-east-2a + cidrBlock: 192.168.0.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector-nokafka + name: subnet-az2 +spec: + forProvider: + availabilityZone: us-east-2b + cidrBlock: 192.168.1.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: connector-nokafka + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector-nokafka + name: vpc +spec: + forProvider: + cidrBlock: 192.168.0.0/22 + region: us-east-2 + +--- + +apiVersion: cloudwatchlogs.aws.upbound.io/v1beta1 +kind: Group +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector-nokafka + name: test +spec: + forProvider: + region: us-east-2 + retentionInDays: 1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroupRule +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector-nokafka + name: ingress +spec: + forProvider: + cidrBlocks: + - 0.0.0.0/0 + fromPort: 0 + protocol: all + region: us-east-2 + securityGroupIdRef: + name: sg + toPort: 0 + type: ingress + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroupRule +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector-nokafka + name: egress +spec: + forProvider: + cidrBlocks: + - 0.0.0.0/0 + fromPort: 0 + protocol: all + region: us-east-2 + securityGroupIdRef: + name: sg + toPort: 0 + type: egress diff --git a/examples/kafkaconnect/v1beta2/connector.yaml b/examples/kafkaconnect/v1beta2/connector.yaml new file mode 100644 index 0000000000..b34c1acb0b --- /dev/null +++ b/examples/kafkaconnect/v1beta2/connector.yaml @@ -0,0 +1,407 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kafkaconnect.aws.upbound.io/v1beta2 +kind: Connector +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + upjet.upbound.io/manual-intervention: This resource requires a valid kafka broker + connectionString + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: connector + name: connector +spec: + forProvider: + capacity: + autoscaling: + maxWorkerCount: 2 + mcuCount: 1 + minWorkerCount: 1 + scaleInPolicy: + cpuUtilizationPercentage: 20 + scaleOutPolicy: + cpuUtilizationPercentage: 80 + connectorConfiguration: + connector.class: org.apache.kafka.connect.file.FileStreamSinkConnector + tasks.max: "1" + topics: example + kafkaCluster: + apacheKafkaCluster: + bootstrapServers: REPLACE-ME plaintext kafka broker string:9092 + vpc: + securityGroupSelector: + matchLabels: + testing.upbound.io/example-name: connector + subnetSelector: + matchLabels: + testing.upbound.io/example-name: connector + kafkaClusterClientAuthentication: + authenticationType: NONE + kafkaClusterEncryptionInTransit: + encryptionType: PLAINTEXT + kafkaconnectVersion: 2.7.1 + logDelivery: + workerLogDelivery: + cloudwatchLogs: + enabled: true + logGroupSelector: + matchLabels: + testing.upbound.io/example-name: connector + firehose: + deliveryStreamSelector: + matchLabels: + testing.upbound.io/example-name: connector + enabled: true + name: connector + plugin: + - customPlugin: + arnSelector: + matchLabels: + testing.upbound.io/example-name: connector + revision: 1 + region: us-east-2 + serviceExecutionRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: connector + workerConfiguration: + arnSelector: + matchLabels: + testing.upbound.io/example-name: connector + revision: 1 + +--- + +apiVersion: kafkaconnect.aws.upbound.io/v1beta1 +kind: WorkerConfiguration +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: connector +spec: + forProvider: + name: ${Rand.RFC1123Subdomain} + propertiesFileContent: | + key.converter=org.apache.kafka.connect.storage.StringConverter + value.converter=org.apache.kafka.connect.storage.StringConverter + region: us-east-2 + +--- + +apiVersion: kafkaconnect.aws.upbound.io/v1beta2 +kind: CustomPlugin +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: example +spec: + forProvider: + contentType: ZIP + location: + s3: + bucketArnSelector: + matchLabels: + testing.upbound.io/example-name: connector + fileKeySelector: + matchLabels: + testing.upbound.io/example-name: connector + name: empty-example + region: us-east-2 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: connector +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": [ + "kafkaconnect.amazonaws.com", + "firehose.amazonaws.com" + ] + }, + "Action": "sts:AssumeRole" + } + ] + } + managedPolicyArns: + - arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess + +--- + +apiVersion: firehose.aws.upbound.io/v1beta2 +kind: DeliveryStream +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: connector +spec: + forProvider: + destination: extended_s3 + extendedS3Configuration: + bucketArnSelector: + matchLabels: + testing.upbound.io/example-name: connector + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: connector + name: ${Rand.RFC1123Subdomain} + region: us-east-2 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: ${Rand.RFC1123Subdomain} +spec: + forProvider: + forceDestroy: true + region: us-east-2 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Object +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + uptest.upbound.io/disable-import: "true" + labels: + testing.upbound.io/example-name: connector + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: connector + contentBase64: | + UEsDBAoAAAAAAPpkXlcAAAAAAAAAAAAAAAAFABwAZW1wdHlVVAkAA4gGQGWIBkBldXgLAAEE6AMAAAToAwAAUEsBAh4DCgAAAAAA+mReVwAAAAAAAAAAAAAAAAUAGAAAAAAAAAAAALSBAAAAAGVtcHR5VVQFAAOIBkBldXgLAAEE6AMAAAToAwAAUEsFBgAAAAABAAEASwAAAD8AAAAAAA== + contentType: application/zip + key: empty.zip + region: us-east-2 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: sg +spec: + forProvider: + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: connector + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: subnet-az1 +spec: + forProvider: + availabilityZone: us-east-2a + cidrBlock: 192.168.0.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: connector + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: subnet-az2 +spec: + forProvider: + availabilityZone: us-east-2b + cidrBlock: 192.168.1.0/24 + region: us-east-2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: connector + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: vpc +spec: + forProvider: + cidrBlock: 192.168.0.0/22 + region: us-east-2 + +--- + +apiVersion: cloudwatchlogs.aws.upbound.io/v1beta1 +kind: Group +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: test +spec: + forProvider: + region: us-east-2 + retentionInDays: 1 + +--- + +apiVersion: kafka.aws.upbound.io/v1beta3 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: connector + name: example +spec: + forProvider: + brokerNodeGroupInfo: + clientSubnetsRefs: + - name: subnet-az1 + - name: subnet-az2 + instanceType: kafka.t3.small + securityGroupsRefs: + - name: sg + storageInfo: + ebsStorageInfo: + volumeSize: 1000 + clusterName: example + configurationInfo: + arnSelector: + matchLabels: + testing.upbound.io/example-name: connector + revision: 1 + encryptionInfo: + encryptionInTransit: + clientBroker: PLAINTEXT + kafkaVersion: 2.7.0 + loggingInfo: + brokerLogs: + cloudwatchLogs: + enabled: true + logGroupSelector: + matchLabels: + testing.upbound.io/example-name: connector + numberOfBrokerNodes: 2 + openMonitoring: + prometheus: + jmxExporter: + enabledInBroker: true + nodeExporter: + enabledInBroker: true + region: us-east-2 + tags: + foo: bar + +--- + +apiVersion: kafka.aws.upbound.io/v1beta1 +kind: Configuration +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: example +spec: + forProvider: + kafkaVersions: + - 2.7.0 + name: example + region: us-east-2 + serverProperties: | + auto.create.topics.enable = true + delete.topic.enable = true + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroupRule +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: ingress +spec: + forProvider: + cidrBlocks: + - 0.0.0.0/0 + fromPort: 0 + protocol: all + region: us-east-2 + securityGroupIdRef: + name: sg + toPort: 0 + type: ingress + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroupRule +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/connector + labels: + testing.upbound.io/example-name: connector + name: egress +spec: + forProvider: + cidrBlocks: + - 0.0.0.0/0 + fromPort: 0 + protocol: all + region: us-east-2 + securityGroupIdRef: + name: sg + toPort: 0 + type: egress diff --git a/examples/kafkaconnect/v1beta2/customplugin.yaml b/examples/kafkaconnect/v1beta2/customplugin.yaml new file mode 100644 index 0000000000..b100b3892f --- /dev/null +++ b/examples/kafkaconnect/v1beta2/customplugin.yaml @@ -0,0 +1,62 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kafkaconnect.aws.upbound.io/v1beta2 +kind: CustomPlugin +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/customplugin + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + contentType: ZIP + location: + s3: + bucketArnSelector: + matchLabels: + testing.upbound.io/example-name: customplugin + fileKeySelector: + matchLabels: + testing.upbound.io/example-name: customplugin + name: debezium-example + region: us-east-2 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: kafkaconnect/v1beta2/customplugin + labels: + testing.upbound.io/example-name: customplugin + name: example +spec: + forProvider: + region: us-east-2 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Object +metadata: + annotations: + meta.upbound.io/example-id: kafkaconnect/v1beta2/customplugin + uptest.upbound.io/disable-import: "true" + labels: + testing.upbound.io/example-name: customplugin + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: customplugin + contentBase64: | + UEsDBAoAAAAAAPpkXlcAAAAAAAAAAAAAAAAFABwAZW1wdHlVVAkAA4gGQGWIBkBldXgLAAEE6AMAAAToAwAAUEsBAh4DCgAAAAAA+mReVwAAAAAAAAAAAAAAAAUAGAAAAAAAAAAAALSBAAAAAGVtcHR5VVQFAAOIBkBldXgLAAEE6AMAAAToAwAAUEsFBgAAAAABAAEASwAAAD8AAAAAAA== + contentType: application/zip + key: empty.zip + region: us-east-2 diff --git a/examples/kendra/v1beta2/datasource.yaml b/examples/kendra/v1beta2/datasource.yaml new file mode 100644 index 0000000000..ba0f3983d5 --- /dev/null +++ b/examples/kendra/v1beta2/datasource.yaml @@ -0,0 +1,44 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kendra.aws.upbound.io/v1beta2 +kind: DataSource +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/datasource + upjet.upbound.io/manual-intervention: Uptest doesn't pick up successful resource + status + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: datasource +spec: + forProvider: + description: example + indexIdSelector: + matchLabels: + testing.upbound.io/example-name: example + languageCode: en + name: datasource + region: us-east-1 + tags: + hello: world + type: CUSTOM + +--- + +apiVersion: kendra.aws.upbound.io/v1beta2 +kind: Index +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/datasource + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: index-1 +spec: + forProvider: + name: index-1 + region: us-east-1 + roleArn: arn:aws:iam::153891904029:role/kendra-index-role diff --git a/examples/kendra/v1beta2/experience.yaml b/examples/kendra/v1beta2/experience.yaml new file mode 100644 index 0000000000..a20b60474c --- /dev/null +++ b/examples/kendra/v1beta2/experience.yaml @@ -0,0 +1,44 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kendra.aws.upbound.io/v1beta2 +kind: Experience +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/experience + upjet.upbound.io/manual-intervention: Uptest doesn't pick up successful resource + status + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: experiencename +spec: + forProvider: + configuration: + userIdentityConfiguration: + identityAttributeName: e4c8e4a8-3091-7073-dc39-8bfc99e6ebe8 + description: My Kendra Experience + indexIdSelector: + matchLabels: + testing.upbound.io/example-name: example + name: experiencename + region: us-east-1 + roleArn: arn:aws:iam::153891904029:role/service-role/AmazonKendra-my-experience-role + +--- + +apiVersion: kendra.aws.upbound.io/v1beta2 +kind: Index +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/experience + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: index-3 +spec: + forProvider: + name: index-3 + region: us-east-1 + roleArn: arn:aws:iam::153891904029:role/kendra-index-role diff --git a/examples/kendra/v1beta2/index.yaml b/examples/kendra/v1beta2/index.yaml new file mode 100644 index 0000000000..b67a2d6853 --- /dev/null +++ b/examples/kendra/v1beta2/index.yaml @@ -0,0 +1,20 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kendra.aws.upbound.io/v1beta2 +kind: Index +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/index + upjet.upbound.io/manual-intervention: Uptest doesn't pick up successful resource + status + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: index-2 +spec: + forProvider: + name: index-2 + region: us-west-2 + roleArn: arn:aws:iam::153891904029:role/kendra-index-role diff --git a/examples/kendra/v1beta2/querysuggestionsblocklist.yaml b/examples/kendra/v1beta2/querysuggestionsblocklist.yaml new file mode 100644 index 0000000000..b04902bed3 --- /dev/null +++ b/examples/kendra/v1beta2/querysuggestionsblocklist.yaml @@ -0,0 +1,84 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kendra.aws.upbound.io/v1beta2 +kind: QuerySuggestionsBlockList +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/querysuggestionsblocklist + upjet.upbound.io/manual-intervention: Uptest doesn't pick up successful resource + status + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: blocklist +spec: + forProvider: + indexIdSelector: + matchLabels: + testing.upbound.io/example-name: example + name: blocklist + region: us-east-1 + roleArn: arn:aws:iam::153891904029:role/service-role/AmazonKendra-block-list-role + sourceS3Path: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example + key: object_key + +--- + +apiVersion: kendra.aws.upbound.io/v1beta2 +kind: Index +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/querysuggestionsblocklist + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: index-4 +spec: + forProvider: + name: index-4 + region: us-east-1 + roleArn: arn:aws:iam::153891904029:role/kendra-index-role + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/querysuggestionsblocklist + uptest.upbound.io/timeout: "7200" + labels: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + testing.upbound.io/example-name: example + name: ${Rand.RFC1123Subdomain} +spec: + forProvider: + forceDestroy: true + region: us-east-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Object +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/querysuggestionsblocklist + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: objectname +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example + contentBase64: dGhpcyBpcyBhIHRleHQg + key: object_key + region: us-east-1 + providerConfigRef: + name: default diff --git a/examples/kendra/v1beta2/thesaurus.yaml b/examples/kendra/v1beta2/thesaurus.yaml new file mode 100644 index 0000000000..0b8e11cf42 --- /dev/null +++ b/examples/kendra/v1beta2/thesaurus.yaml @@ -0,0 +1,86 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kendra.aws.upbound.io/v1beta2 +kind: Thesaurus +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/thesaurus + upjet.upbound.io/manual-intervention: Uptest doesn't pick up successful resource + status + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: thesaurus +spec: + forProvider: + indexIdSelector: + matchLabels: + testing.upbound.io/example-name: example + name: thesaurus + region: us-east-1 + roleArn: arn:aws:iam::153891904029:role/thesaurus-kendra-role + sourceS3Path: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example + keySelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: kendra.aws.upbound.io/v1beta2 +kind: Index +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/thesaurus + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: index-5 +spec: + forProvider: + name: index-5 + region: us-east-1 + roleArn: arn:aws:iam::153891904029:role/kendra-index-role + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/thesaurus + uptest.upbound.io/timeout: "7200" + labels: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + testing.upbound.io/example-name: example + name: ${Rand.RFC1123Subdomain} +spec: + forProvider: + forceDestroy: true + region: us-east-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Object +metadata: + annotations: + meta.upbound.io/example-id: kendra/v1beta2/thesaurus + uptest.upbound.io/timeout: "7200" + labels: + testing.upbound.io/example-name: example + name: objectname +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example + contentBase64: dGhpcyBpcyBhIHRleHQg + key: object_key + region: us-east-1 + providerConfigRef: + name: default diff --git a/examples/keyspaces/v1beta2/table.yaml b/examples/keyspaces/v1beta2/table.yaml new file mode 100644 index 0000000000..8a25e5523a --- /dev/null +++ b/examples/keyspaces/v1beta2/table.yaml @@ -0,0 +1,39 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: keyspaces.aws.upbound.io/v1beta2 +kind: Table +metadata: + annotations: + meta.upbound.io/example-id: keyspaces/v1beta2/table + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + keyspaceNameSelector: + matchLabels: + testing.upbound.io/example-name: keyspacelabel + region: us-west-1 + schemaDefinition: + column: + - name: message + type: boolean + partitionKey: + - name: message + tableName: my_table + +--- + +apiVersion: keyspaces.aws.upbound.io/v1beta1 +kind: Keyspace +metadata: + annotations: + meta.upbound.io/example-id: keyspaces/v1beta2/table + labels: + testing.upbound.io/example-name: keyspacelabel + name: keyspacename +spec: + forProvider: + region: us-west-1 diff --git a/examples/kinesis/v1beta2/stream.yaml b/examples/kinesis/v1beta2/stream.yaml new file mode 100644 index 0000000000..44da0d5f3e --- /dev/null +++ b/examples/kinesis/v1beta2/stream.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kinesis.aws.upbound.io/v1beta2 +kind: Stream +metadata: + annotations: + meta.upbound.io/example-id: kinesis/v1beta2/stream + name: example +spec: + forProvider: + region: us-west-1 + retentionPeriod: 48 + shardCount: 1 + shardLevelMetrics: + - IncomingBytes + - OutgoingBytes + streamModeDetails: + streamMode: PROVISIONED + tags: + Environment: test diff --git a/examples/kinesisanalytics/v1beta2/application.yaml b/examples/kinesisanalytics/v1beta2/application.yaml new file mode 100644 index 0000000000..e40ceec661 --- /dev/null +++ b/examples/kinesisanalytics/v1beta2/application.yaml @@ -0,0 +1,77 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kinesisanalytics.aws.upbound.io/v1beta2 +kind: Application +metadata: + annotations: + meta.upbound.io/example-id: kinesisanalytics/v1beta2/application + name: kinesis-analytics-application-test +spec: + forProvider: + inputs: + kinesisStream: + resourceArnRef: + name: example + roleArnRef: + name: kinesis-app-role + namePrefix: test_prefix + parallelism: + count: 1 + schema: + recordColumns: + - mapping: $.test + name: test + sqlType: VARCHAR(8) + recordEncoding: UTF-8 + recordFormat: + mappingParameters: + json: + recordRowPath: $ + region: us-west-1 + +--- + +apiVersion: kinesis.aws.upbound.io/v1beta2 +kind: Stream +metadata: + annotations: + meta.upbound.io/example-id: kinesisanalytics/v1beta2/application + name: example +spec: + forProvider: + region: us-west-1 + retentionPeriod: 48 + shardCount: 1 + shardLevelMetrics: + - IncomingBytes + - OutgoingBytes + streamModeDetails: + streamMode: PROVISIONED + tags: + Environment: test + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: kinesisanalytics/v1beta2/application + name: kinesis-app-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "kinesisanalytics.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } diff --git a/examples/kinesisanalyticsv2/v1beta2/application.yaml b/examples/kinesisanalyticsv2/v1beta2/application.yaml new file mode 100644 index 0000000000..f60183ff50 --- /dev/null +++ b/examples/kinesisanalyticsv2/v1beta2/application.yaml @@ -0,0 +1,54 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: kinesisanalyticsv2.aws.upbound.io/v1beta2 +kind: Application +metadata: + annotations: + meta.upbound.io/example-id: kinesisanalyticsv2/v1beta2/application + name: example-application +spec: + forProvider: + applicationConfiguration: + applicationCodeConfiguration: + codeContentType: ZIPFILE + environmentProperties: + propertyGroup: + - propertyGroupId: PROPERTY-GROUP-1 + propertyMap: + Key1: Value1 + - propertyGroupId: PROPERTY-GROUP-2 + propertyMap: + KeyA: ValueA + KeyB: ValueB + region: us-west-1 + runtimeEnvironment: FLINK-1_8 + serviceExecutionRoleRef: + name: kinesis-app-role + tags: + Environment: test + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: kinesisanalyticsv2/v1beta2/application + name: kinesis-app-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "kinesisanalytics.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } diff --git a/examples/lakeformation/v1beta2/permissions.yaml b/examples/lakeformation/v1beta2/permissions.yaml new file mode 100644 index 0000000000..ca98e3c0a9 --- /dev/null +++ b/examples/lakeformation/v1beta2/permissions.yaml @@ -0,0 +1,59 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lakeformation.aws.upbound.io/v1beta2 +kind: Permissions +metadata: + annotations: + meta.upbound.io/example-id: lakeformation/v1beta2/permissions + name: example +spec: + forProvider: + database: + catalogId: "609897127049" + name: example + permissions: + - ALL + - ALTER + - CREATE_TABLE + - DROP + principal: ${aws_iam_role.workflow_role.arn} + region: us-east-1 + +--- + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: CatalogDatabase +metadata: + annotations: + meta.upbound.io/example-id: lakeformation/v1beta2/permissions + name: example +spec: + forProvider: + catalogId: "609897127049" + region: us-east-1 + +--- + +apiVersion: glue.aws.upbound.io/v1beta2 +kind: CatalogTable +metadata: + annotations: + meta.upbound.io/example-id: lakeformation/v1beta2/permissions + name: example +spec: + forProvider: + catalogId: "609897127049" + databaseNameRef: + name: example + region: us-east-1 + storageDescriptor: + columns: + - name: my_column_1 + type: string + - name: my_column_2 + type: string + - name: my_column_3 + type: string + tableType: EXTERNAL diff --git a/examples/lambda/v1beta2/alias.yaml b/examples/lambda/v1beta2/alias.yaml new file mode 100644 index 0000000000..f54be89ce1 --- /dev/null +++ b/examples/lambda/v1beta2/alias.yaml @@ -0,0 +1,119 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: Alias +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/alias + labels: + testing.upbound.io/example-name: test_lambda_alias + name: test-lambda-alias +spec: + forProvider: + description: a sample description + functionNameSelector: + matchLabels: + testing.upbound.io/example-name: test_lambda_alias + functionVersion: "1" + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/alias + labels: + testing.upbound.io/example-name: test_lambda_alias + name: test-lambda-alias +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Object +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/alias + labels: + testing.upbound.io/example-name: test_lambda_alias + name: test-lambda-alias +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: test_lambda_alias + contentBase64: | + UEsDBBQAAAAIAKtNjFYSV7EydQAAAKAAAAASABwAbGFtYmRhX2Z1bmN0aW9uLnB5VVQJAAOibzZkEHQ2ZHV4CwABBPUBAAAEFAAAAD1NQQrCQBC79xXjaSyUPqDg3T+IlNGdVWF2FmZHEUr/3rpWQy5JSBI4glC6BBrvpEHY9vxi9Q6uWZ3f3g4NrEhcCt0YDoBHFskwzSt32MdsifxbOmF8WPFRKTGeO9hMob/X1jFjf5rCVMUHuM0jDL+nms3NAlBLAQIeAxQAAAAIAKtNjFYSV7EydQAAAKAAAAASABgAAAAAAAEAAACkgQAAAABsYW1iZGFfZnVuY3Rpb24ucHlVVAUAA6JvNmR1eAsAAQT1AQAABBQAAABQSwUGAAAAAAEAAQBYAAAAwQAAAAAA + key: lambda-alias-test.zip + region: us-west-1 + +--- + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: Function +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/alias + labels: + testing.upbound.io/example-name: test_lambda_alias + name: test-lambda-alias +spec: + forProvider: + handler: lambda_function.lambda_handler + publish: true + region: us-west-1 + roleSelector: + matchLabels: + testing.upbound.io/example-name: test_lambda_alias + runtime: python3.9 + s3Bucket: test-lambda-alias + s3Key: lambda-alias-test.zip + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/alias + labels: + testing.upbound.io/example-name: test_lambda_alias + name: test-lambda-alias +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "lambda.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/alias + labels: + testing.upbound.io/example-name: test_lambda_alias + name: test-lambda-alias +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole + roleSelector: + matchLabels: + testing.upbound.io/example-name: test_lambda_alias diff --git a/examples/lambda/v1beta2/codesigningconfig.yaml b/examples/lambda/v1beta2/codesigningconfig.yaml new file mode 100644 index 0000000000..44dd50a884 --- /dev/null +++ b/examples/lambda/v1beta2/codesigningconfig.yaml @@ -0,0 +1,19 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: CodeSigningConfig +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/codesigningconfig + name: example +spec: + forProvider: + allowedPublishers: + signingProfileVersionArnsRefs: + - name: example + description: My awesome code signing config. + policies: + untrustedArtifactOnDeployment: Warn + region: us-west-1 diff --git a/examples/lambda/v1beta2/eventsourcemapping.yaml b/examples/lambda/v1beta2/eventsourcemapping.yaml new file mode 100644 index 0000000000..3ff73cf99c --- /dev/null +++ b/examples/lambda/v1beta2/eventsourcemapping.yaml @@ -0,0 +1,17 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: EventSourceMapping +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/eventsourcemapping + name: example +spec: + forProvider: + eventSourceArn: null + functionNameRef: + name: example + region: us-west-1 + startingPosition: LATEST diff --git a/examples/lambda/v1beta2/function.yaml b/examples/lambda/v1beta2/function.yaml new file mode 100644 index 0000000000..76f5c5d11f --- /dev/null +++ b/examples/lambda/v1beta2/function.yaml @@ -0,0 +1,165 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: Function +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/function + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + handler: index.py + packageType: Zip + region: us-east-1 + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + runtime: python3.9 + s3Bucket: official-provider-test-data + s3Key: hello-python.zip + timeout: 60 + vpcConfig: + securityGroupIdSelector: + matchLabels: + testing.upbound.io/example-name: example + subnetIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/function + labels: + testing.upbound.io/example-name: role + name: sample-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": ["ec2.amazonaws.com", "lambda.amazonaws.com"] + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/function + labels: + testing.upbound.io/example-name: policy + name: sample-user-policy +spec: + forProvider: + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": [ + "ec2:DescribeVpcEndpoints", + "ec2:DescribeRouteTables", + "ec2:CreateNetworkInterface", + "ec2:DeleteNetworkInterface", + "ec2:DescribeSecurityGroups", + "ec2:DescribeSubnets", + "ec2:DescribeVpcAttribute", + "ec2:DescribeNetworkInterfaces" + ], + "Effect": "Allow", + "Resource": "*" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/function + labels: + testing.upbound.io/example-name: policy-attachment + name: sample-user-policy-attachment +spec: + forProvider: + policyArnSelector: + matchLabels: + testing.upbound.io/example-name: policy + roleSelector: + matchLabels: + testing.upbound.io/example-name: role + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/function + labels: + testing.upbound.io/example-name: example + name: sample-subnet1 +spec: + forProvider: + cidrBlock: 172.16.10.0/24 + region: us-east-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/function + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: Allow TLS inbound traffic + name: allow_tls + region: us-east-1 + tags: + Name: allow_tls + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/function + labels: + testing.upbound.io/example-name: example + name: sample-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-east-1 + tags: + Name: DemoVpc diff --git a/examples/lambda/v1beta2/functioneventinvokeconfig.yaml b/examples/lambda/v1beta2/functioneventinvokeconfig.yaml new file mode 100644 index 0000000000..eaa263a929 --- /dev/null +++ b/examples/lambda/v1beta2/functioneventinvokeconfig.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: FunctionEventInvokeConfig +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/functioneventinvokeconfig + name: example +spec: + forProvider: + destinationConfig: + onFailure: + destinationRef: + name: example + functionName: example + region: us-west-1 diff --git a/examples/lambda/v1beta2/functionurl.yaml b/examples/lambda/v1beta2/functionurl.yaml new file mode 100644 index 0000000000..ad1012b3fa --- /dev/null +++ b/examples/lambda/v1beta2/functionurl.yaml @@ -0,0 +1,16 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: FunctionURL +metadata: + annotations: + meta.upbound.io/example-id: lambda/v1beta2/functionurl + name: example +spec: + forProvider: + authorizationType: NONE + functionNameRef: + name: example + region: us-west-1 diff --git a/examples/lexmodels/v1beta2/bot.yaml b/examples/lexmodels/v1beta2/bot.yaml new file mode 100644 index 0000000000..d0af08fb89 --- /dev/null +++ b/examples/lexmodels/v1beta2/bot.yaml @@ -0,0 +1,32 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lexmodels.aws.upbound.io/v1beta2 +kind: Bot +metadata: + annotations: + meta.upbound.io/example-id: lexmodels/v1beta2/bot + name: example +spec: + forProvider: + abortStatement: + message: + - content: Sorry, I am not able to assist at this time + contentType: PlainText + childDirected: false + clarificationPrompt: + maxAttempts: 2 + message: + - content: I didn't understand you, what would you like to do? + contentType: PlainText + createVersion: false + description: Bot to order flowers on the behalf of a user + idleSessionTtlInSeconds: 600 + intent: + - intentName: example + intentVersion: $LATEST + locale: en-US + processBehavior: BUILD + region: us-east-1 + voiceId: Salli diff --git a/examples/lexmodels/v1beta2/botalias.yaml b/examples/lexmodels/v1beta2/botalias.yaml new file mode 100644 index 0000000000..462c480d23 --- /dev/null +++ b/examples/lexmodels/v1beta2/botalias.yaml @@ -0,0 +1,16 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lexmodels.aws.upbound.io/v1beta2 +kind: BotAlias +metadata: + annotations: + meta.upbound.io/example-id: lexmodels/v1beta2/botalias + name: example +spec: + forProvider: + botName: example + botVersion: $LATEST + description: Production Version of the OrderFlowers Bot. + region: us-east-1 diff --git a/examples/lexmodels/v1beta2/intent.yaml b/examples/lexmodels/v1beta2/intent.yaml new file mode 100644 index 0000000000..4673fa5734 --- /dev/null +++ b/examples/lexmodels/v1beta2/intent.yaml @@ -0,0 +1,30 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lexmodels.aws.upbound.io/v1beta2 +kind: Intent +metadata: + annotations: + meta.upbound.io/example-id: lexmodels/v1beta2/intent + name: example +spec: + forProvider: + confirmationPrompt: + maxAttempts: 2 + message: + - content: Okay, your {FlowerType} will be ready for pickup by {PickupTime} + on {PickupDate}. Does this sound okay? + contentType: PlainText + createVersion: false + description: Intent to order a bouquet of flowers for pick up + fulfillmentActivity: + type: ReturnIntent + region: us-east-1 + rejectionStatement: + message: + - content: Okay, I will not place your order. + contentType: PlainText + sampleUtterances: + - I would like to order some flowers + - I would like to pick up flowers diff --git a/examples/lightsail/v1beta2/containerservice.yaml b/examples/lightsail/v1beta2/containerservice.yaml new file mode 100644 index 0000000000..e414b2b25d --- /dev/null +++ b/examples/lightsail/v1beta2/containerservice.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lightsail.aws.upbound.io/v1beta2 +kind: ContainerService +metadata: + annotations: + meta.upbound.io/example-id: lightsail/v1beta2/containerservice + labels: + testing.upbound.io/example-name: my_container_service + name: my-container-service +spec: + forProvider: + isDisabled: true + name: container-service-1 + power: nano + region: us-east-1 + scale: 1 + tags: + foo1: bar1 + foo2: "" diff --git a/examples/lightsail/v1beta2/instance.yaml b/examples/lightsail/v1beta2/instance.yaml new file mode 100644 index 0000000000..1168284018 --- /dev/null +++ b/examples/lightsail/v1beta2/instance.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: lightsail.aws.upbound.io/v1beta2 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: lightsail/v1beta2/instance + labels: + testing.upbound.io/example-name: gitlab_test + name: gitlab-test +spec: + forProvider: + availabilityZone: us-east-2a + blueprintId: wordpress + bundleId: large_2_0 + region: us-east-2 diff --git a/examples/location/v1beta2/placeindex.yaml b/examples/location/v1beta2/placeindex.yaml new file mode 100644 index 0000000000..120d085470 --- /dev/null +++ b/examples/location/v1beta2/placeindex.yaml @@ -0,0 +1,16 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: location.aws.upbound.io/v1beta2 +kind: PlaceIndex +metadata: + annotations: + meta.upbound.io/example-id: location/v1beta2/placeindex + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + dataSource: Here + region: us-east-1 diff --git a/examples/macie2/v1beta2/classificationjob.yaml b/examples/macie2/v1beta2/classificationjob.yaml new file mode 100644 index 0000000000..329cd91bc3 --- /dev/null +++ b/examples/macie2/v1beta2/classificationjob.yaml @@ -0,0 +1,36 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: macie2.aws.upbound.io/v1beta2 +kind: ClassificationJob +metadata: + annotations: + meta.upbound.io/example-id: macie2/v1beta2/classificationjob + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + jobType: ONE_TIME + name: test + region: us-east-1 + s3JobDefinition: + bucketDefinitions: + - accountId: "153891904029" + buckets: + - upbound-provider-test-data + +--- + +apiVersion: macie2.aws.upbound.io/v1beta1 +kind: Account +metadata: + annotations: + meta.upbound.io/example-id: macie2/v1beta2/classificationjob + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + region: us-east-1 diff --git a/examples/macie2/v1beta2/findingsfilter.yaml b/examples/macie2/v1beta2/findingsfilter.yaml new file mode 100644 index 0000000000..4ac0846c3e --- /dev/null +++ b/examples/macie2/v1beta2/findingsfilter.yaml @@ -0,0 +1,38 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: macie2.aws.upbound.io/v1beta2 +kind: FindingsFilter +metadata: + annotations: + meta.upbound.io/example-id: macie2/v1beta2/findingsfilter + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + action: ARCHIVE + description: DESCRIPTION + findingCriteria: + criterion: + - eq: + - us-east-1 + field: region + name: example + position: 1 + region: us-east-1 + +--- + +apiVersion: macie2.aws.upbound.io/v1beta1 +kind: Account +metadata: + annotations: + meta.upbound.io/example-id: macie2/v1beta2/findingsfilter + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-east-1 diff --git a/examples/mediaconvert/v1beta2/queue.yaml b/examples/mediaconvert/v1beta2/queue.yaml new file mode 100644 index 0000000000..00375c3caa --- /dev/null +++ b/examples/mediaconvert/v1beta2/queue.yaml @@ -0,0 +1,15 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: mediaconvert.aws.upbound.io/v1beta2 +kind: Queue +metadata: + annotations: + meta.upbound.io/example-id: mediaconvert/v1beta2/queue + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + region: us-west-1 diff --git a/examples/medialive/v1beta2/channel.yaml b/examples/medialive/v1beta2/channel.yaml new file mode 100644 index 0000000000..88b4b04c81 --- /dev/null +++ b/examples/medialive/v1beta2/channel.yaml @@ -0,0 +1,157 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: medialive.aws.upbound.io/v1beta2 +kind: Channel +metadata: + annotations: + meta.upbound.io/example-id: medialive/v1beta2/channel + upjet.upbound.io/manual-intervention: Input resource requires at least one valid + input_security_group id. + labels: + testing.upbound.io/example-name: channel + name: channel +spec: + forProvider: + channelClass: STANDARD + destinations: + - id: destination + settings: + - url: s3://channel1/test1 + - url: s3://channel2/test2 + encoderSettings: + audioDescriptions: + - audioSelectorName: example audio selector + name: audio-selector + outputGroups: + - outputGroupSettings: + archiveGroupSettings: + - destination: + destinationRefId: destination + outputs: + - audioDescriptionNames: + - audio-selector + outputName: example-name + outputSettings: + archiveOutputSettings: + containerSettings: + m2tsSettings: + audioBufferModel: ATSC + bufferModel: MULTIPLEX + rateMode: CBR + extension: m2ts + nameModifier: _1 + videoDescriptionName: example-vidoe + timecodeConfig: + source: EMBEDDED + videoDescriptions: + - name: example-vidoe + inputAttachments: + - inputAttachmentName: example-input + inputIdSelector: + matchLabels: + testing.upbound.io/example-name: channel + inputSpecification: + codec: AVC + inputResolution: HD + maximumBitrate: MAX_20_MBPS + name: example-channel + region: us-east-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: channel + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: medialive/v1beta2/channel + labels: + testing.upbound.io/example-name: channel + name: channel1 +spec: + forProvider: + forceDestroy: true + region: us-east-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: medialive/v1beta2/channel + labels: + testing.upbound.io/example-name: channel + name: channel2 +spec: + forProvider: + forceDestroy: true + region: us-east-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: medialive/v1beta2/channel + labels: + testing.upbound.io/example-name: channel + name: channel +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "medialive.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: medialive.aws.upbound.io/v1beta2 +kind: Input +metadata: + annotations: + meta.upbound.io/example-id: medialive/v1beta2/channel + labels: + testing.upbound.io/example-name: channel + name: channel +spec: + forProvider: + inputSecurityGroups: + - ${aws_medialive_input_security_group.id} + name: example-input + region: us-east-1 + tags: + ENVIRONMENT: prod + type: UDP_PUSH + +--- + +apiVersion: medialive.aws.upbound.io/v1beta1 +kind: InputSecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: medialive/v1beta2/channel + labels: + testing.upbound.io/example-name: channel + name: channel +spec: + forProvider: + region: us-east-1 + tags: + ENVIRONMENT: prod + whitelistRules: + - cidr: 10.0.0.8/32 diff --git a/examples/medialive/v1beta2/input.yaml b/examples/medialive/v1beta2/input.yaml new file mode 100644 index 0000000000..4fe69a691b --- /dev/null +++ b/examples/medialive/v1beta2/input.yaml @@ -0,0 +1,41 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: medialive.aws.upbound.io/v1beta2 +kind: Input +metadata: + annotations: + meta.upbound.io/example-id: medialive/v1beta2/input + upjet.upbound.io/manual-intervention: Input resource requires at least one valid + input_security_group id. + labels: + testing.upbound.io/example-name: input + name: input +spec: + forProvider: + inputSecurityGroups: + - ${aws_medialive_input_security_group.id} + name: example-input + region: us-east-1 + tags: + ENVIRONMENT: prod + type: UDP_PUSH + +--- + +apiVersion: medialive.aws.upbound.io/v1beta1 +kind: InputSecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: medialive/v1beta2/input + labels: + testing.upbound.io/example-name: input + name: input +spec: + forProvider: + region: us-east-1 + tags: + ENVIRONMENT: prod + whitelistRules: + - cidr: 10.0.0.8/32 diff --git a/examples/medialive/v1beta2/multiplex.yaml b/examples/medialive/v1beta2/multiplex.yaml new file mode 100644 index 0000000000..0f62f7b869 --- /dev/null +++ b/examples/medialive/v1beta2/multiplex.yaml @@ -0,0 +1,27 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: medialive.aws.upbound.io/v1beta2 +kind: Multiplex +metadata: + annotations: + meta.upbound.io/example-id: medialive/v1beta2/multiplex + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + availabilityZones: + - us-east-1a + - us-east-1b + multiplexSettings: + maximumVideoBufferDelayMilliseconds: 1000 + transportStreamBitrate: 1000000 + transportStreamId: 1 + transportStreamReservedBitrate: 1 + name: example-multiplex-changed + region: us-east-1 + startMultiplex: true + tags: + tag1: value1 diff --git a/examples/memorydb/v1beta2/user.yaml b/examples/memorydb/v1beta2/user.yaml new file mode 100644 index 0000000000..190ad82d20 --- /dev/null +++ b/examples/memorydb/v1beta2/user.yaml @@ -0,0 +1,58 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: memorydb.aws.upbound.io/v1beta2 +kind: User +metadata: + annotations: + meta.upbound.io/example-id: memorydb/v1beta2/user + labels: + testing.upbound.io/example-name: memorydb-user + name: memorydb-user +spec: + forProvider: + accessString: on ~* &* +@all + authenticationMode: + passwordsSecretRef: + - key: password + name: memorydb-user-password-1 + namespace: upbound-system + - key: password + name: memorydb-user-password-2 + namespace: upbound-system + type: password + region: us-west-1 + writeConnectionSecretToRef: + name: user-conn + namespace: default + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: memorydb/v1beta1/user + labels: + testing.upbound.io/example-name: memorydb-user-password-1 + name: memorydb-user-password-1 + namespace: upbound-system +stringData: + password: TestCr0ssplanePassw0rd! +type: Opaque + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: memorydb/v1beta1/user + labels: + testing.upbound.io/example-name: memorydb-user-password-2 + name: memorydb-user-password-2 + namespace: upbound-system +stringData: + password: AnotherCr0ssplanePassw0rd! +type: Opaque diff --git a/examples/mq/v1beta2/broker.yaml b/examples/mq/v1beta2/broker.yaml new file mode 100644 index 0000000000..72902e816f --- /dev/null +++ b/examples/mq/v1beta2/broker.yaml @@ -0,0 +1,61 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: mq.aws.upbound.io/v1beta2 +kind: Broker +metadata: + annotations: + meta.upbound.io/example-id: mq/v1beta2/broker + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + brokerName: example-broker + engineType: ActiveMQ + engineVersion: 5.17.6 + hostInstanceType: mq.t2.micro + region: us-west-1 + securityGroupRefs: + - name: example + user: + - passwordSecretRef: + key: password + name: mq-secret + namespace: upbound-system + username: admin + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: mq/v1beta1/broker + uptest.upbound.io/pre-delete-hook: testhooks/delete-broker.sh + labels: + testing.upbound.io/example-name: mq-secret + name: mq-secret + namespace: upbound-system +stringData: + password: Upboundtest! +type: Opaque + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + annotations: + meta.upbound.io/example-id: mq/v1beta2/broker + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: Allow TLS inbound traffic + name: allow_tls + region: us-west-1 + tags: + Name: allow_tls diff --git a/examples/neptune/v1beta2/cluster.yaml b/examples/neptune/v1beta2/cluster.yaml new file mode 100644 index 0000000000..5eddeda63d --- /dev/null +++ b/examples/neptune/v1beta2/cluster.yaml @@ -0,0 +1,19 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: neptune.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: neptune/v1beta2/cluster + name: sample-cluster +spec: + forProvider: + applyImmediately: true + backupRetentionPeriod: 5 + engine: neptune + iamDatabaseAuthenticationEnabled: true + preferredBackupWindow: 07:00-09:00 + region: eu-central-1 + skipFinalSnapshot: true diff --git a/examples/networkfirewall/v1beta2/firewall.yaml b/examples/networkfirewall/v1beta2/firewall.yaml new file mode 100644 index 0000000000..eb00a20da7 --- /dev/null +++ b/examples/networkfirewall/v1beta2/firewall.yaml @@ -0,0 +1,193 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: Firewall +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewall + uptest.upbound.io/timeout: "3600" + uptest.upbound.io/update-parameter: '{"tags":{"update-test-tag":"val"}}' + labels: + testing.upbound.io/example-name: example + name: firewallname +spec: + forProvider: + firewallPolicyArnSelector: + matchLabels: + testing.upbound.io/example-name: example + firewallPolicyChangeProtection: true + name: firewallname + region: us-west-1 + subnetChangeProtection: true + subnetMapping: + - subnetIdSelector: + matchLabels: + testing.upbound.io/example-name: example + tags: + Tag1: Value1 + Tag2: Value2 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: FirewallPolicy +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewall + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: firewallpolicy +spec: + forProvider: + firewallPolicy: + statelessDefaultActions: + - aws:pass + statelessFragmentDefaultActions: + - aws:drop + statelessRuleGroupReference: + - priority: 1 + resourceArnSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + tags: + Tag1: Value1 + Tag2: Value2 + +--- + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: RuleGroup +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewall + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: rulegroup +spec: + forProvider: + capacity: 100 + name: rulegroup + region: us-west-1 + ruleGroup: + rulesSource: + statelessRulesAndCustomActions: + customAction: + - actionDefinition: + publishMetricAction: + dimension: + - value: "2" + actionName: ExampleMetricsAction + statelessRule: + - priority: 1 + ruleDefinition: + actions: + - aws:pass + - ExampleMetricsAction + matchAttributes: + destination: + - addressDefinition: 124.1.1.5/32 + destinationPort: + - fromPort: 443 + toPort: 443 + protocols: + - 6 + source: + - addressDefinition: 1.2.3.4/32 + sourcePort: + - fromPort: 443 + toPort: 443 + tcpFlag: + - flags: + - SYN + masks: + - SYN + - ACK + tags: + Tag1: Value1 + Tag2: Value2 + type: STATELESS + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewall + labels: + testing.upbound.io/example-name: example + name: sample-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: DemoVpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewall + labels: + testing.upbound.io/example-name: example + name: sample-subnet1 +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.10.0/24 + region: us-west-1 + vpcIdRef: + name: sample-vpc + +--- + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: LoggingConfiguration +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewall + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + firewallArnSelector: + matchLabels: + testing.upbound.io/example-name: example + loggingConfiguration: + logDestinationConfig: + - logDestination: + bucketName: uptest-networkfirewall-logging + prefix: /example + logDestinationType: S3 + logType: FLOW + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewall + labels: + testing.upbound.io/example-name: s3-networkfirewall + name: uptest-networkfirewall-logging +spec: + deletionPolicy: Orphan + forProvider: + objectLockEnabled: true + region: us-west-1 + tags: + Name: uptest-networkfirewall-logging diff --git a/examples/networkfirewall/v1beta2/firewallpolicy-complex.yaml b/examples/networkfirewall/v1beta2/firewallpolicy-complex.yaml new file mode 100644 index 0000000000..8b6e48d376 --- /dev/null +++ b/examples/networkfirewall/v1beta2/firewallpolicy-complex.yaml @@ -0,0 +1,127 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: FirewallPolicy +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewallpolicy + labels: + testing.upbound.io/example-name: example-default-policy + name: example-default-policy +spec: + forProvider: + firewallPolicy: + statefulRuleGroupReference: + - resourceArnSelector: + matchLabels: + testing.upbound.io/example-name: example-allow-domainlist + - resourceArnSelector: + matchLabels: + testing.upbound.io/example-name: example-deny + statelessDefaultActions: + - aws:forward_to_sfe + statelessFragmentDefaultActions: + - aws:pass + statelessRuleGroupReference: + - priority: 2 + resourceArnSelector: + matchLabels: + testing.upbound.io/example-name: example-forward-all + region: us-west-1 + +--- + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: RuleGroup +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewallpolicy + labels: + testing.upbound.io/example-name: example-forward-all + name: example-forward-all +spec: + forProvider: + capacity: 1 + name: example-forward-all + region: us-west-1 + ruleGroup: + rulesSource: + statelessRulesAndCustomActions: + statelessRule: + - priority: 1 + ruleDefinition: + actions: + - aws:forward_to_sfe + matchAttributes: + destination: + - addressDefinition: 0.0.0.0/0 + source: + - addressDefinition: 0.0.0.0/0 + type: STATELESS + +--- + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: RuleGroup +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewallpolicy + labels: + testing.upbound.io/example-name: example-allow-domainlist + name: example-allow-domainlist +spec: + forProvider: + capacity: 1000 + name: example-allow-domainlist + region: us-west-1 + ruleGroup: + ruleVariables: + ipSets: + - ipSet: + definition: + - 10.0.0.0/8 + key: HOME_NET + rulesSource: + rulesSourceList: + generatedRulesType: ALLOWLIST + targetTypes: + - TLS_SNI + - HTTP_HOST + targets: + - xpkg.upbound.io + type: STATEFUL + +--- + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: RuleGroup +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewallpolicy + labels: + testing.upbound.io/example-name: example-deny + name: example-deny +spec: + forProvider: + capacity: 300 + name: example-deny + region: us-west-1 + ruleGroup: + ruleVariables: + ipSets: + - ipSet: + definition: + - 10.0.0.0/8 + key: UP_NET + - ipSet: + definition: + - 172.16.0.0/16 + key: TGW_NET + rulesSource: + rulesString: | + drop ip $TGW_NET,$UP_NET any <> $EXTERNAL_NET any (msg: "Drop non-TCP traffic."; ip_proto:!TCP;sid:1003; rev:1;) + drop tcp $TGW_NET any -> $EXTERNAL_NET [!443] (msg:"Drop All non-TCP:443"; sid:1002; priority:2; rev:1;) + drop tcp $UP_NET any -> $EXTERNAL_NET [!443] (msg:"Drop All non-TCP:443"; sid:1001; priority:1; rev:1;) + type: STATEFUL diff --git a/examples/networkfirewall/v1beta2/firewallpolicy.yaml b/examples/networkfirewall/v1beta2/firewallpolicy.yaml new file mode 100644 index 0000000000..02996ff7b5 --- /dev/null +++ b/examples/networkfirewall/v1beta2/firewallpolicy.yaml @@ -0,0 +1,82 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: FirewallPolicy +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewallpolicy + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + firewallPolicy: + statelessDefaultActions: + - aws:pass + statelessFragmentDefaultActions: + - aws:drop + statelessRuleGroupReference: + - priority: 1 + resourceArnSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + tags: + Tag1: Value1 + Tag2: Value2 + +--- + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: RuleGroup +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/firewallpolicy + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + capacity: 100 + name: example + region: us-west-1 + ruleGroup: + rulesSource: + statelessRulesAndCustomActions: + customAction: + - actionDefinition: + publishMetricAction: + dimension: + - value: "2" + actionName: ExampleMetricsAction + statelessRule: + - priority: 1 + ruleDefinition: + actions: + - aws:pass + - ExampleMetricsAction + matchAttributes: + destination: + - addressDefinition: 124.1.1.5/32 + destinationPort: + - fromPort: 443 + toPort: 443 + protocols: + - 6 + source: + - addressDefinition: 1.2.3.4/32 + sourcePort: + - fromPort: 443 + toPort: 443 + tcpFlag: + - flags: + - SYN + masks: + - SYN + - ACK + tags: + Tag1: Value1 + Tag2: Value2 + type: STATELESS diff --git a/examples/networkfirewall/v1beta2/rulegroup.yaml b/examples/networkfirewall/v1beta2/rulegroup.yaml new file mode 100644 index 0000000000..51a4b29cca --- /dev/null +++ b/examples/networkfirewall/v1beta2/rulegroup.yaml @@ -0,0 +1,29 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: networkfirewall.aws.upbound.io/v1beta2 +kind: RuleGroup +metadata: + annotations: + meta.upbound.io/example-id: networkfirewall/v1beta2/rulegroup + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + capacity: 100 + name: example + region: us-west-1 + ruleGroup: + rulesSource: + rulesSourceList: + generatedRulesType: DENYLIST + targetTypes: + - HTTP_HOST + targets: + - test.example.com + tags: + Tag1: Value1 + Tag2: Value2 + type: STATEFUL diff --git a/examples/networkmanager/v1beta2/connectattachment.yaml b/examples/networkmanager/v1beta2/connectattachment.yaml new file mode 100644 index 0000000000..2e13a893a4 --- /dev/null +++ b/examples/networkmanager/v1beta2/connectattachment.yaml @@ -0,0 +1,146 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: networkmanager.aws.upbound.io/v1beta2 +kind: ConnectAttachment +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/connectattachment + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: connectattachment +spec: + forProvider: + coreNetworkIdSelector: + matchLabels: + testing.upbound.io/example-name: example + edgeLocationSelector: + matchLabels: + testing.upbound.io/example-name: example + options: + protocol: GRE + region: us-west-1 + transportAttachmentIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: networkmanager.aws.upbound.io/v1beta2 +kind: VPCAttachment +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/connectattachment + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: vpcattachment +spec: + forProvider: + coreNetworkIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + subnetArnsSelector: + matchLabels: + testing.upbound.io/example-name: example + vpcArnSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/connectattachment + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/connectattachment + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: subnet +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.10.0/24 + region: us-west-1 + vpcIdRef: + name: vpc + +--- + +apiVersion: networkmanager.aws.upbound.io/v1beta1 +kind: CoreNetwork +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/connectattachment + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: corenetworkname +spec: + forProvider: + globalNetworkIdSelector: + matchLabels: + testing.upbound.io/example-name: example + policyDocument: | + { + "version": "2021.12", + "core-network-configuration": { + "vpn-ecmp-support": false, + "inside-cidr-blocks": [ + "10.0.0.0/16" + ], + "asn-ranges": [ + "64512-65534" + ], + "edge-locations": [ + { + "location": "us-west-1" + } + ] + }, + "segments": [ + { + "name": "development", + "require-attachment-acceptance": false + } + ] + } + region: us-west-1 + +--- + +apiVersion: networkmanager.aws.upbound.io/v1beta1 +kind: GlobalNetwork +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/connectattachment + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: globalnetworkname +spec: + forProvider: + description: example + region: us-west-1 diff --git a/examples/networkmanager/v1beta2/device.yaml b/examples/networkmanager/v1beta2/device.yaml new file mode 100644 index 0000000000..d68ad57b42 --- /dev/null +++ b/examples/networkmanager/v1beta2/device.yaml @@ -0,0 +1,52 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: networkmanager.aws.upbound.io/v1beta2 +kind: Device +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/device + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + globalNetworkIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + siteIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: networkmanager.aws.upbound.io/v1beta2 +kind: Site +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/device + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + globalNetworkIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + +--- + +apiVersion: networkmanager.aws.upbound.io/v1beta1 +kind: GlobalNetwork +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/device + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 diff --git a/examples/networkmanager/v1beta2/link.yaml b/examples/networkmanager/v1beta2/link.yaml new file mode 100644 index 0000000000..b39f575cf9 --- /dev/null +++ b/examples/networkmanager/v1beta2/link.yaml @@ -0,0 +1,56 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: networkmanager.aws.upbound.io/v1beta2 +kind: Link +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/link + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + bandwidth: + downloadSpeed: 50 + uploadSpeed: 10 + globalNetworkIdSelector: + matchLabels: + testing.upbound.io/example-name: example + providerName: MegaCorp + region: us-west-1 + siteIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: networkmanager.aws.upbound.io/v1beta2 +kind: Site +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/link + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + globalNetworkIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + +--- + +apiVersion: networkmanager.aws.upbound.io/v1beta1 +kind: GlobalNetwork +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/link + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 diff --git a/examples/networkmanager/v1beta2/site.yaml b/examples/networkmanager/v1beta2/site.yaml new file mode 100644 index 0000000000..be9666a2f5 --- /dev/null +++ b/examples/networkmanager/v1beta2/site.yaml @@ -0,0 +1,32 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: networkmanager.aws.upbound.io/v1beta2 +kind: Site +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/site + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + globalNetworkIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + +--- + +apiVersion: networkmanager.aws.upbound.io/v1beta1 +kind: GlobalNetwork +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/site + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 diff --git a/examples/networkmanager/v1beta2/vpcattachment.yaml b/examples/networkmanager/v1beta2/vpcattachment.yaml new file mode 100644 index 0000000000..9068e77e5e --- /dev/null +++ b/examples/networkmanager/v1beta2/vpcattachment.yaml @@ -0,0 +1,115 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: networkmanager.aws.upbound.io/v1beta2 +kind: VPCAttachment +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/vpcattachment + labels: + testing.upbound.io/example-name: example + name: vpcattachment +spec: + forProvider: + coreNetworkIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + subnetArnsSelector: + matchLabels: + testing.upbound.io/example-name: example + vpcArnSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/vpcattachment + labels: + testing.upbound.io/example-name: example + name: vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: vpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/vpcattachment + labels: + testing.upbound.io/example-name: example + name: subnet +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.10.0/24 + region: us-west-1 + vpcIdRef: + name: vpc + +--- + +apiVersion: networkmanager.aws.upbound.io/v1beta1 +kind: CoreNetwork +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/vpcattachment + labels: + testing.upbound.io/example-name: example + name: corenetworkname +spec: + forProvider: + globalNetworkIdSelector: + matchLabels: + testing.upbound.io/example-name: example + policyDocument: | + { + "version": "2021.12", + "core-network-configuration": { + "vpn-ecmp-support": false, + "inside-cidr-blocks": [ + "10.0.0.0/16" + ], + "asn-ranges": [ + "64512-65534" + ], + "edge-locations": [ + { + "location": "us-west-1" + } + ] + }, + "segments": [ + { + "name": "development", + "require-attachment-acceptance": false + } + ] + } + region: us-west-1 + +--- + +apiVersion: networkmanager.aws.upbound.io/v1beta1 +kind: GlobalNetwork +metadata: + annotations: + meta.upbound.io/example-id: networkmanager/v1beta2/vpcattachment + labels: + testing.upbound.io/example-name: example + name: globalnetworkname +spec: + forProvider: + description: example + region: us-west-1 diff --git a/examples/opensearch/v1beta2/domain.yaml b/examples/opensearch/v1beta2/domain.yaml new file mode 100644 index 0000000000..8f5bcc8dd4 --- /dev/null +++ b/examples/opensearch/v1beta2/domain.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opensearch.aws.upbound.io/v1beta2 +kind: Domain +metadata: + annotations: + meta.upbound.io/example-id: opensearch/v1beta2/domain + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + clusterConfig: + instanceType: m4.large.search + domainName: example-domain-name + ebsOptions: + ebsEnabled: true + volumeSize: 10 + volumeType: gp2 + engineVersion: OpenSearch_1.0 + region: us-west-1 diff --git a/examples/opensearch/v1beta2/domainsamloptions.yaml b/examples/opensearch/v1beta2/domainsamloptions.yaml new file mode 100644 index 0000000000..71122ed800 --- /dev/null +++ b/examples/opensearch/v1beta2/domainsamloptions.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opensearch.aws.upbound.io/v1beta2 +kind: DomainSAMLOptions +metadata: + annotations: + meta.upbound.io/example-id: opensearch/v1beta2/domainsamloptions + upjet.upbound.io/manual-intervention: This resource requires a valid saml metadata + content. + name: example +spec: + forProvider: + domainNameRef: + name: example + region: us-west-1 + samlOptions: + enabled: true + idp: + entityId: https://example.com + metadataContent: ${file("./saml-metadata.xml")} diff --git a/examples/opsworks/v1beta2/customlayer.yaml b/examples/opsworks/v1beta2/customlayer.yaml new file mode 100644 index 0000000000..8e20023084 --- /dev/null +++ b/examples/opsworks/v1beta2/customlayer.yaml @@ -0,0 +1,81 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: CustomLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/customlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: custlayer + name: custlayer +spec: + forProvider: + autoAssignPublicIps: true + name: My Awesome Custom Layer + shortName: awesome + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/customlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/customlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/opsworks/v1beta2/ecsclusterlayer.yaml b/examples/opsworks/v1beta2/ecsclusterlayer.yaml new file mode 100644 index 0000000000..2d8cef89ab --- /dev/null +++ b/examples/opsworks/v1beta2/ecsclusterlayer.yaml @@ -0,0 +1,157 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: EcsClusterLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/ecsclusterlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + ecsClusterArnSelector: + matchLabels: + testing.upbound.io/example-name: example + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: ecs.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/ecsclusterlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-east-1 + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/ecsclusterlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + defaultSubnetIdSelector: + matchLabels: + testing.upbound.io/example-name: subnet + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpclink + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/ecsclusterlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/ecsclusterlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: vpclink + name: sample-vpc +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-east-1 + tags: + Name: DemoVpc + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/ecsclusterlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: subnet + name: sample-subnet1 +spec: + forProvider: + availabilityZone: us-east-1b + cidrBlock: 172.16.10.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpclink diff --git a/examples/opsworks/v1beta2/ganglialayer.yaml b/examples/opsworks/v1beta2/ganglialayer.yaml new file mode 100644 index 0000000000..93e330620f --- /dev/null +++ b/examples/opsworks/v1beta2/ganglialayer.yaml @@ -0,0 +1,80 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: GangliaLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/ganglialayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: monitor + name: monitor +spec: + forProvider: + autoAssignPublicIps: true + password: foobarbaz + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/ganglialayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/ganglialayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/opsworks/v1beta2/haproxylayer.yaml b/examples/opsworks/v1beta2/haproxylayer.yaml new file mode 100644 index 0000000000..8ef36593f5 --- /dev/null +++ b/examples/opsworks/v1beta2/haproxylayer.yaml @@ -0,0 +1,80 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: HAProxyLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/haproxylayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: lb + name: lb +spec: + forProvider: + autoAssignPublicIps: true + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + statsPassword: foobarbaz + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/haproxylayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/haproxylayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/opsworks/v1beta2/javaapplayer.yaml b/examples/opsworks/v1beta2/javaapplayer.yaml new file mode 100644 index 0000000000..38407cd856 --- /dev/null +++ b/examples/opsworks/v1beta2/javaapplayer.yaml @@ -0,0 +1,79 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: JavaAppLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/javaapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: app + name: app +spec: + forProvider: + autoAssignPublicIps: true + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/javaapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/javaapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/opsworks/v1beta2/memcachedlayer.yaml b/examples/opsworks/v1beta2/memcachedlayer.yaml new file mode 100644 index 0000000000..2e0f2c6c5c --- /dev/null +++ b/examples/opsworks/v1beta2/memcachedlayer.yaml @@ -0,0 +1,79 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: MemcachedLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/memcachedlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: cache + name: cache +spec: + forProvider: + autoAssignPublicIps: true + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/memcachedlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/memcachedlayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/opsworks/v1beta2/mysqllayer.yaml b/examples/opsworks/v1beta2/mysqllayer.yaml new file mode 100644 index 0000000000..0d05098f19 --- /dev/null +++ b/examples/opsworks/v1beta2/mysqllayer.yaml @@ -0,0 +1,79 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: MySQLLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/mysqllayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: db + name: db +spec: + forProvider: + autoAssignPublicIps: true + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/mysqllayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/mysqllayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/opsworks/v1beta2/nodejsapplayer.yaml b/examples/opsworks/v1beta2/nodejsapplayer.yaml new file mode 100644 index 0000000000..2d30eacfa6 --- /dev/null +++ b/examples/opsworks/v1beta2/nodejsapplayer.yaml @@ -0,0 +1,79 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: NodeJSAppLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/nodejsapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: app + name: app +spec: + forProvider: + autoAssignPublicIps: true + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/nodejsapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/nodejsapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/opsworks/v1beta2/phpapplayer.yaml b/examples/opsworks/v1beta2/phpapplayer.yaml new file mode 100644 index 0000000000..5a92b904d1 --- /dev/null +++ b/examples/opsworks/v1beta2/phpapplayer.yaml @@ -0,0 +1,79 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: PHPAppLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/phpapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: app + name: app +spec: + forProvider: + autoAssignPublicIps: true + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/phpapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/phpapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/opsworks/v1beta2/railsapplayer.yaml b/examples/opsworks/v1beta2/railsapplayer.yaml new file mode 100644 index 0000000000..014ae4dcb3 --- /dev/null +++ b/examples/opsworks/v1beta2/railsapplayer.yaml @@ -0,0 +1,79 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: RailsAppLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/railsapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: app + name: app +spec: + forProvider: + autoAssignPublicIps: true + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/railsapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/railsapplayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/opsworks/v1beta2/stack.yaml b/examples/opsworks/v1beta2/stack.yaml new file mode 100644 index 0000000000..6c5f3706a5 --- /dev/null +++ b/examples/opsworks/v1beta2/stack.yaml @@ -0,0 +1,55 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/stack + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/stack + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/opsworks/v1beta2/staticweblayer.yaml b/examples/opsworks/v1beta2/staticweblayer.yaml new file mode 100644 index 0000000000..1a1bd5408d --- /dev/null +++ b/examples/opsworks/v1beta2/staticweblayer.yaml @@ -0,0 +1,79 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: StaticWebLayer +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/staticweblayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: web + name: web +spec: + forProvider: + autoAssignPublicIps: true + stackIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: opsworks.aws.upbound.io/v1beta2 +kind: Stack +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/staticweblayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + customJson: | + { + "opsworkstest": { + "version": "1.0.0" + } + } + defaultAvailabilityZone: us-east-1a + defaultInstanceProfileArnSelector: + matchLabels: + testing.upbound.io/example-name: test_profile + name: awesome-stack + region: us-east-1 + serviceRoleArn: arn:aws:iam::153891904029:role/example-ops-role + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: InstanceProfile +metadata: + annotations: + meta.upbound.io/example-id: opsworks/v1beta2/staticweblayer + upjet.upbound.io/manual-intervention: 'Need try to use hooks to avoid manual intervention. + This resource needs a service role with next policies (policies need more time + to be attached to the role and we start create resources without policy attached): + AWS OpsWorks Full Access, AWS ECS Full Access, OpsWorks CM servers, EC2 Full + Access, AWS RDS Full Access, ElasticLoad Balancing Full Access. Also it will + be created 17 security groups when create Stack resource and we cant delete + it automatically.' + labels: + testing.upbound.io/example-name: test_profile + name: test-profile +spec: + forProvider: + role: example-ops-role diff --git a/examples/pinpoint/v1beta2/app.yaml b/examples/pinpoint/v1beta2/app.yaml new file mode 100644 index 0000000000..79096f3f3c --- /dev/null +++ b/examples/pinpoint/v1beta2/app.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: pinpoint.aws.upbound.io/v1beta2 +kind: App +metadata: + annotations: + meta.upbound.io/example-id: pinpoint/v1beta2/app + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + limits: + maximumDuration: 600 + messagesPerSecond: 60 + name: test-app + quietTime: + end: "06:00" + start: "00:00" + region: us-east-1 diff --git a/examples/qldb/v1beta2/stream.yaml b/examples/qldb/v1beta2/stream.yaml new file mode 100644 index 0000000000..a793775b31 --- /dev/null +++ b/examples/qldb/v1beta2/stream.yaml @@ -0,0 +1,138 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: qldb.aws.upbound.io/v1beta2 +kind: Stream +metadata: + annotations: + meta.upbound.io/example-id: qldb/v1beta2/stream + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + inclusiveStartTime: "2021-01-01T00:00:00Z" + kinesisConfiguration: + aggregationEnabled: false + streamArnSelector: + matchLabels: + testing.upbound.io/example-name: example + ledgerNameSelector: + matchLabels: + testing.upbound.io/example-name: sample-ledger + region: us-east-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + streamName: test-ledger-stream + tags: + example: tag + +--- + +apiVersion: qldb.aws.upbound.io/v1beta1 +kind: Ledger +metadata: + annotations: + meta.upbound.io/example-id: qldb/v1beta2/stream + labels: + testing.upbound.io/example-name: sample-ledger + name: sample-ledger +spec: + forProvider: + deletionProtection: false + permissionsMode: STANDARD + region: us-east-1 + +--- + +apiVersion: kinesis.aws.upbound.io/v1beta2 +kind: Stream +metadata: + annotations: + meta.upbound.io/example-id: qldb/v1beta2/stream + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-east-1 + retentionPeriod: 48 + shardCount: 1 + shardLevelMetrics: + - IncomingBytes + - OutgoingBytes + streamModeDetails: + streamMode: PROVISIONED + tags: + Environment: test + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: qldb/v1beta2/stream + labels: + testing.upbound.io/example-name: example + name: sample-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": ["qldb.amazonaws.com", "kinesis.amazonaws.com"] + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: qldb/v1beta2/stream + labels: + testing.upbound.io/example-name: policy + name: sample-user-policy +spec: + forProvider: + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": ["qldb:*", "kinesis:*"], + "Effect": "Allow", + "Resource": "*" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: qldb/v1beta2/stream + labels: + testing.upbound.io/example-name: attachment + name: sample-policy-attachment +spec: + forProvider: + policyArnSelector: + matchLabels: + testing.upbound.io/example-name: policy + roleSelector: + matchLabels: + testing.upbound.io/example-name: example diff --git a/examples/rds/v1beta2/cluster.yaml b/examples/rds/v1beta2/cluster.yaml new file mode 100644 index 0000000000..292a893fb4 --- /dev/null +++ b/examples/rds/v1beta2/cluster.yaml @@ -0,0 +1,70 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: rds.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: rds/v1beta2/cluster + name: example +spec: + forProvider: + autoGeneratePassword: true + dbClusterParameterGroupNameSelector: + matchLabels: + testing.upbound.io/example-name: example-ci-cluster + dbInstanceParameterGroupNameSelector: + matchLabels: + testing.upbound.io/example-name: example-ci-cluster-instance + engine: aurora-postgresql + masterPasswordSecretRef: + key: password + name: sample-cluster-password + namespace: upbound-system + masterUsername: cpadmin + region: us-west-1 + skipFinalSnapshot: true + writeConnectionSecretToRef: + name: sample-rds-cluster-secret + namespace: upbound-system + +--- + +apiVersion: rds.aws.upbound.io/v1beta1 +kind: ClusterParameterGroup +metadata: + annotations: + meta.upbound.io/example-id: rds/v1beta2/cluster + labels: + testing.upbound.io/example-name: example-ci-cluster + name: example-ci-cluster +spec: + forProvider: + description: RDS custom cluster parameter group + family: aurora-postgresql15 + parameter: + - applyMethod: immediate + name: application_name + value: example-rds-cluster + region: us-west-1 + +--- + +apiVersion: rds.aws.upbound.io/v1beta1 +kind: ParameterGroup +metadata: + annotations: + meta.upbound.io/example-id: rds/v1beta2/cluster + labels: + testing.upbound.io/example-name: example-ci-cluster-instance + name: example-parametergroup-ci-cluster-instance +spec: + forProvider: + description: example + family: aurora-postgresql15 + parameter: + - applyMethod: immediate + name: application_name + value: example-cluster-instance + region: us-west-1 diff --git a/examples/rds/v1beta2/proxydefaulttargetgroup.yaml b/examples/rds/v1beta2/proxydefaulttargetgroup.yaml new file mode 100644 index 0000000000..eb3b8d2fa5 --- /dev/null +++ b/examples/rds/v1beta2/proxydefaulttargetgroup.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: rds.aws.upbound.io/v1beta2 +kind: ProxyDefaultTargetGroup +metadata: + annotations: + meta.upbound.io/example-id: rds/v1beta2/proxydefaulttargetgroup + upjet.upbound.io/manual-intervention: This resource has a reference to Proxy, + which needs manual intervention. + name: example +spec: + forProvider: + connectionPoolConfig: + connectionBorrowTimeout: 120 + initQuery: SET x=1, y=2 + maxConnectionsPercent: 100 + maxIdleConnectionsPercent: 50 + sessionPinningFilters: + - EXCLUDE_VARIABLE_SETS + dbProxyName: example + region: us-west-1 diff --git a/examples/rds/v1beta3/instance.yaml b/examples/rds/v1beta3/instance.yaml new file mode 100644 index 0000000000..f8bf8c64cf --- /dev/null +++ b/examples/rds/v1beta3/instance.yaml @@ -0,0 +1,57 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: rds.aws.upbound.io/v1beta3 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: rds/v1beta3/instance + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example-dbinstance + name: example-dbinstance-${Rand.RFC1123Subdomain} +spec: + forProvider: + allocatedStorage: 20 + autoGeneratePassword: true + autoMinorVersionUpgrade: true + backupRetentionPeriod: 14 + backupWindow: 09:46-10:16 + dbName: example + engine: postgres + engineVersion: "16.1" + instanceClass: db.t3.micro + kmsKeyIdSelector: + matchLabels: + testing.upbound.io/example-name: sample-key + maintenanceWindow: Mon:00:00-Mon:03:00 + passwordSecretRef: + key: password + name: example-dbinstance + namespace: upbound-system + publiclyAccessible: false + region: us-west-1 + skipFinalSnapshot: true + storageEncrypted: true + storageType: gp2 + username: adminuser + writeConnectionSecretToRef: + name: example-dbinstance-out + namespace: default + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: rds/v1beta3/instance + labels: + testing.upbound.io/example-name: sample-key + name: sample-key-${Rand.RFC1123Subdomain} +spec: + forProvider: + deletionWindowInDays: 7 + description: Created with Crossplane + region: us-west-1 diff --git a/examples/redshift/v1beta2/cluster.yaml b/examples/redshift/v1beta2/cluster.yaml new file mode 100644 index 0000000000..dda158fbe8 --- /dev/null +++ b/examples/redshift/v1beta2/cluster.yaml @@ -0,0 +1,40 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: redshift.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: redshift/v1beta2/cluster + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + clusterType: single-node + databaseName: mydb + masterPasswordSecretRef: + key: example-key + name: cluster-secret + namespace: upbound-system + masterUsername: exampleuser + nodeType: ra3.xlplus + region: us-west-1 + skipFinalSnapshot: true + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: redshift/v1beta1/cluster + uptest.upbound.io/pre-delete-hook: testhooks/delete-cluster.sh + labels: + testing.upbound.io/example-name: cluster-secret + name: cluster-secret + namespace: upbound-system +stringData: + example-key: Upbound!1 +type: Opaque diff --git a/examples/redshift/v1beta2/scheduledaction.yaml b/examples/redshift/v1beta2/scheduledaction.yaml new file mode 100644 index 0000000000..03fd0c7efa --- /dev/null +++ b/examples/redshift/v1beta2/scheduledaction.yaml @@ -0,0 +1,138 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: redshift.aws.upbound.io/v1beta2 +kind: ScheduledAction +metadata: + annotations: + meta.upbound.io/example-id: redshift/v1beta2/scheduledaction + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + iamRoleSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + schedule: cron(00 23 * * ? *) + targetAction: + pauseCluster: + clusterIdentifier: example-redshift001 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: redshift/v1beta2/scheduledaction + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "VisualEditor0", + "Effect": "Allow", + "Action": [ + "redshift:PauseCluster", + "redshift:ResumeCluster", + "redshift:ResizeCluster" + ], + "Resource": "*" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: redshift/v1beta2/scheduledaction + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": [ + "scheduler.redshift.amazonaws.com" + ] + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: redshift/v1beta2/scheduledaction + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + policyArnSelector: + matchLabels: + testing.upbound.io/example-name: example + roleSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: redshift.aws.upbound.io/v1beta2 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: redshift/v1beta2/scheduledaction + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + clusterType: single-node + databaseName: mydb + masterPasswordSecretRef: + key: example-key + name: cluster-secret + namespace: upbound-system + masterUsername: exampleuser + nodeType: ra3.xlplus + region: us-west-1 + skipFinalSnapshot: true + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: redshift/v1beta1/scheduledaction + uptest.upbound.io/pre-delete-hook: testhooks/delete-cluster.sh + labels: + testing.upbound.io/example-name: cluster-secret + name: cluster-secret + namespace: upbound-system +stringData: + example-key: Upbound!1 +type: Opaque diff --git a/examples/resourcegroups/v1beta2/group.yaml b/examples/resourcegroups/v1beta2/group.yaml new file mode 100644 index 0000000000..e2497c9ae5 --- /dev/null +++ b/examples/resourcegroups/v1beta2/group.yaml @@ -0,0 +1,28 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: resourcegroups.aws.upbound.io/v1beta2 +kind: Group +metadata: + annotations: + meta.upbound.io/example-id: resourcegroups/v1beta2/group + name: example +spec: + forProvider: + region: us-west-1 + resourceQuery: + query: | + { + "ResourceTypeFilters": [ + "AWS::EC2::Instance" + ], + "TagFilters": [ + { + "Key": "Stage", + "Values": ["Test"] + } + ] + } + providerConfigRef: + name: default diff --git a/examples/route53/v1beta2/record.yaml b/examples/route53/v1beta2/record.yaml new file mode 100644 index 0000000000..eb7de90e81 --- /dev/null +++ b/examples/route53/v1beta2/record.yaml @@ -0,0 +1,35 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: route53.aws.upbound.io/v1beta2 +kind: Record +metadata: + annotations: + meta.upbound.io/example-id: route53/v1beta2/record + name: example +spec: + forProvider: + name: www + records: + - dev.upbound.io + region: us-west-1 + ttl: 5 + type: CNAME + zoneIdRef: + name: example + +--- + +apiVersion: route53.aws.upbound.io/v1beta1 +kind: Zone +metadata: + annotations: + meta.upbound.io/example-id: route53/v1beta2/record + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + name: mycompany.test + region: us-west-1 diff --git a/examples/route53recoverycontrolconfig/v1beta2/safetyrule.yaml b/examples/route53recoverycontrolconfig/v1beta2/safetyrule.yaml new file mode 100644 index 0000000000..3db4dd8904 --- /dev/null +++ b/examples/route53recoverycontrolconfig/v1beta2/safetyrule.yaml @@ -0,0 +1,80 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: route53recoverycontrolconfig.aws.upbound.io/v1beta2 +kind: SafetyRule +metadata: + annotations: + meta.upbound.io/example-id: route53recoverycontrolconfig/v1beta2/safetyrule + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assertedControlsRefs: + - name: example + controlPanelArnSelector: + matchLabels: + testing.upbound.io/example-name: example + name: daisyguttridge + region: us-west-1 + ruleConfig: + inverted: false + threshold: 1 + type: ATLEAST + waitPeriodMs: 5000 + +--- + +apiVersion: route53recoverycontrolconfig.aws.upbound.io/v1beta1 +kind: RoutingControl +metadata: + annotations: + meta.upbound.io/example-id: route53recoverycontrolconfig/v1beta2/safetyrule + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + clusterArnSelector: + matchLabels: + testing.upbound.io/example-name: example + controlPanelArnSelector: + matchLabels: + testing.upbound.io/example-name: example + name: tinlicker + region: us-west-1 + +--- + +apiVersion: route53recoverycontrolconfig.aws.upbound.io/v1beta1 +kind: ControlPanel +metadata: + annotations: + meta.upbound.io/example-id: route53recoverycontrolconfig/v1beta2/safetyrule + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + clusterArnSelector: + matchLabels: + testing.upbound.io/example-name: example + name: balmorhea + region: us-west-1 + +--- + +apiVersion: route53recoverycontrolconfig.aws.upbound.io/v1beta1 +kind: Cluster +metadata: + annotations: + meta.upbound.io/example-id: route53recoverycontrolconfig/v1beta2/safetyrule + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + name: georgefitzgerald + region: us-west-1 diff --git a/examples/route53recoveryreadiness/v1beta2/resourceset.yaml b/examples/route53recoveryreadiness/v1beta2/resourceset.yaml new file mode 100644 index 0000000000..73931683d7 --- /dev/null +++ b/examples/route53recoveryreadiness/v1beta2/resourceset.yaml @@ -0,0 +1,43 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: route53recoveryreadiness.aws.upbound.io/v1beta2 +kind: ResourceSet +metadata: + annotations: + meta.upbound.io/example-id: route53recoveryreadiness/v1beta2/resourceset + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 + resourceSetType: AWS::CloudWatch::Alarm + resources: + - resourceArnSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: cloudwatch.aws.upbound.io/v1beta2 +kind: MetricAlarm +metadata: + annotations: + meta.upbound.io/example-id: route53recoveryreadiness/v1beta2/resourceset + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + alarmDescription: This metric monitors ec2 cpu utilization + comparisonOperator: GreaterThanOrEqualToThreshold + evaluationPeriods: 2 + insufficientDataActions: [] + metricName: CPUUtilization + namespace: AWS/EC2 + period: 120 + region: us-west-1 + statistic: Average + threshold: 80 diff --git a/examples/rum/v1beta2/appmonitor.yaml b/examples/rum/v1beta2/appmonitor.yaml new file mode 100644 index 0000000000..6a59939292 --- /dev/null +++ b/examples/rum/v1beta2/appmonitor.yaml @@ -0,0 +1,31 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: rum.aws.upbound.io/v1beta2 +kind: AppMonitor +metadata: + annotations: + meta.upbound.io/example-id: rum/v1beta2/appmonitor + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + domain: myDomain.com + region: us-east-1 + +--- + +apiVersion: lightsail.aws.upbound.io/v1beta1 +kind: Domain +metadata: + annotations: + meta.upbound.io/example-id: rum/v1beta2/appmonitor + labels: + testing.upbound.io/example-name: domain + name: domain +spec: + forProvider: + domainName: myDomain.com + region: us-east-1 diff --git a/examples/s3/v1beta2/bucket.yaml b/examples/s3/v1beta2/bucket.yaml new file mode 100644 index 0000000000..493636527c --- /dev/null +++ b/examples/s3/v1beta2/bucket.yaml @@ -0,0 +1,34 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucket + labels: + testing.upbound.io/example-name: s3 + name: ${Rand.RFC1123Subdomain} +spec: + forProvider: + objectLockEnabled: true + region: us-west-1 + tags: + Name: SampleBucket + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucket + labels: + testing.upbound.io/example-name: s3-2 + name: ${Rand.RFC1123Subdomain}-2 +spec: + forProvider: + region: us-west-1 + tags: + Name: SampleBucket-2 diff --git a/examples/s3/v1beta2/bucketacl-canned.yaml b/examples/s3/v1beta2/bucketacl-canned.yaml new file mode 100644 index 0000000000..0847c198dc --- /dev/null +++ b/examples/s3/v1beta2/bucketacl-canned.yaml @@ -0,0 +1,33 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketACL +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketacl + name: example +spec: + forProvider: + acl: private + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3-canned + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketacl + labels: + testing.upbound.io/example-name: s3-canned + name: ${Rand.RFC1123Subdomain}-canned +spec: + forProvider: + region: us-west-1 + tags: + Name: SampleBucketCannedAcl diff --git a/examples/s3/v1beta2/bucketacl.yaml b/examples/s3/v1beta2/bucketacl.yaml new file mode 100644 index 0000000000..dde5f48ef5 --- /dev/null +++ b/examples/s3/v1beta2/bucketacl.yaml @@ -0,0 +1,26 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketACL +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketacl + upjet.upbound.io/manual-intervention: Requires adding canonical ID of the owner + user who created the Bucket. + name: example +spec: + forProvider: + accessControlPolicy: + grant: + - grantee: + id: ${data.aws_canonical_user_id.current.id} + type: CanonicalUser + permission: READ + owner: + id: ${data.aws_canonical_user_id.current.id} + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + region: us-west-1 diff --git a/examples/s3/v1beta2/bucketanalyticsconfiguration.yaml b/examples/s3/v1beta2/bucketanalyticsconfiguration.yaml new file mode 100644 index 0000000000..725c46264e --- /dev/null +++ b/examples/s3/v1beta2/bucketanalyticsconfiguration.yaml @@ -0,0 +1,24 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketAnalyticsConfiguration +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketanalyticsconfiguration + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + name: EntireBucket + region: us-west-1 + storageClassAnalysis: + dataExport: + destination: + s3BucketDestination: + bucketArnSelector: + matchLabels: + testing.upbound.io/example-name: s3 diff --git a/examples/s3/v1beta2/bucketintelligenttieringconfiguration.yaml b/examples/s3/v1beta2/bucketintelligenttieringconfiguration.yaml new file mode 100644 index 0000000000..38a0423cfb --- /dev/null +++ b/examples/s3/v1beta2/bucketintelligenttieringconfiguration.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketIntelligentTieringConfiguration +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketintelligenttieringconfiguration + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + name: EntireBucket + region: us-west-1 + tiering: + - accessTier: DEEP_ARCHIVE_ACCESS + days: 180 + - accessTier: ARCHIVE_ACCESS + days: 125 diff --git a/examples/s3/v1beta2/bucketinventory.yaml b/examples/s3/v1beta2/bucketinventory.yaml new file mode 100644 index 0000000000..5e4e90ac78 --- /dev/null +++ b/examples/s3/v1beta2/bucketinventory.yaml @@ -0,0 +1,26 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketInventory +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketinventory + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + destination: + bucket: + bucketArnSelector: + matchLabels: + testing.upbound.io/example-name: s3-2 + format: ORC + includedObjectVersions: All + name: EntireBucketDaily + region: us-west-1 + schedule: + frequency: Daily diff --git a/examples/s3/v1beta2/bucketlifecycleconfiguration.yaml b/examples/s3/v1beta2/bucketlifecycleconfiguration.yaml new file mode 100644 index 0000000000..08e8a64ff0 --- /dev/null +++ b/examples/s3/v1beta2/bucketlifecycleconfiguration.yaml @@ -0,0 +1,42 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketLifecycleConfiguration +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketlifecycleconfiguration + labels: + testing.upbound.io/example-name: example + name: example-blc +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + region: us-west-1 + rule: + - expiration: + days: 90 + filter: + prefix: tmp/ + id: rule-1 + status: Enabled + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketlifecycleconfiguration + labels: + testing.upbound.io/example-name: s3 + name: example-${Rand.RFC1123Subdomain} +spec: + forProvider: + objectLockEnabled: true + region: us-west-1 + tags: + Name: SampleBucket diff --git a/examples/s3/v1beta2/bucketlogging.yaml b/examples/s3/v1beta2/bucketlogging.yaml new file mode 100644 index 0000000000..804fd64a40 --- /dev/null +++ b/examples/s3/v1beta2/bucketlogging.yaml @@ -0,0 +1,50 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketLogging +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketlogging + labels: + testing.upbound.io/example-name: example + name: example-bl +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + targetBucketSelector: + matchLabels: + testing.upbound.io/example-name: log_bucket + targetPrefix: log/ + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketlogging + labels: + testing.upbound.io/example-name: example + name: example-${Rand.RFC1123Subdomain} +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketlogging + labels: + testing.upbound.io/example-name: log_bucket + name: log-bucket-${Rand.RFC1123Subdomain} +spec: + forProvider: + region: us-west-1 diff --git a/examples/s3/v1beta2/bucketmetric.yaml b/examples/s3/v1beta2/bucketmetric.yaml new file mode 100644 index 0000000000..e89cd65608 --- /dev/null +++ b/examples/s3/v1beta2/bucketmetric.yaml @@ -0,0 +1,17 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketMetric +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketmetric + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + name: EntireBucket + region: us-west-1 diff --git a/examples/s3/v1beta2/bucketobjectlockconfiguration.yaml b/examples/s3/v1beta2/bucketobjectlockconfiguration.yaml new file mode 100644 index 0000000000..83dcaca5a1 --- /dev/null +++ b/examples/s3/v1beta2/bucketobjectlockconfiguration.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketObjectLockConfiguration +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketobjectlockconfiguration + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + region: us-west-1 + rule: + defaultRetention: + days: 5 + mode: COMPLIANCE diff --git a/examples/s3/v1beta2/bucketownershipcontrols.yaml b/examples/s3/v1beta2/bucketownershipcontrols.yaml new file mode 100644 index 0000000000..31f3013a95 --- /dev/null +++ b/examples/s3/v1beta2/bucketownershipcontrols.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketOwnershipControls +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketownershipcontrols + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + region: us-west-1 + rule: + objectOwnership: BucketOwnerPreferred diff --git a/examples/s3/v1beta2/bucketreplicationconfiguration.yaml b/examples/s3/v1beta2/bucketreplicationconfiguration.yaml new file mode 100644 index 0000000000..eef960a53d --- /dev/null +++ b/examples/s3/v1beta2/bucketreplicationconfiguration.yaml @@ -0,0 +1,31 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketReplicationConfiguration +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketreplicationconfiguration + upjet.upbound.io/manual-intervention: Requires a Role with permissions on both + buckets. + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + region: us-west-1 + role: + rule: + - deleteMarkerReplication: + status: Enabled + destination: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + storageClass: STANDARD + filter: + prefix: foo + id: foobar + status: Enabled diff --git a/examples/s3/v1beta2/bucketserversideencryptionconfiguration.yaml b/examples/s3/v1beta2/bucketserversideencryptionconfiguration.yaml new file mode 100644 index 0000000000..81fb36008a --- /dev/null +++ b/examples/s3/v1beta2/bucketserversideencryptionconfiguration.yaml @@ -0,0 +1,54 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketServerSideEncryptionConfiguration +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketserversideencryptionconfiguration + labels: + testing.upbound.io/example-name: example + name: example-bssec +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: mybucket + region: us-west-1 + rule: + - applyServerSideEncryptionByDefault: + kmsMasterKeyIdSelector: + matchLabels: + testing.upbound.io/example-name: mykey + sseAlgorithm: aws:kms + +--- + +apiVersion: kms.aws.upbound.io/v1beta1 +kind: Key +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketserversideencryptionconfiguration + labels: + testing.upbound.io/example-name: mykey + name: mykey-${Rand.RFC1123Subdomain} +spec: + forProvider: + deletionWindowInDays: 10 + description: This key is used to encrypt bucket objects + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketserversideencryptionconfiguration + labels: + testing.upbound.io/example-name: mybucket + name: mybucket-${Rand.RFC1123Subdomain} +spec: + forProvider: + region: us-west-1 diff --git a/examples/s3/v1beta2/bucketversioning.yaml b/examples/s3/v1beta2/bucketversioning.yaml new file mode 100644 index 0000000000..2429f74802 --- /dev/null +++ b/examples/s3/v1beta2/bucketversioning.yaml @@ -0,0 +1,34 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketVersioning +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketversioning + labels: + testing.upbound.io/example-name: versioning_example + name: versioning-example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + versioningConfiguration: + status: Enabled + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketversioning + labels: + testing.upbound.io/example-name: example + name: example-${Rand.RFC1123Subdomain} +spec: + forProvider: + region: us-west-1 diff --git a/examples/s3/v1beta2/bucketwebsiteconfiguration.yaml b/examples/s3/v1beta2/bucketwebsiteconfiguration.yaml new file mode 100644 index 0000000000..a8c0e9ed48 --- /dev/null +++ b/examples/s3/v1beta2/bucketwebsiteconfiguration.yaml @@ -0,0 +1,25 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: BucketWebsiteConfiguration +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/bucketwebsiteconfiguration + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + errorDocument: + key: error.html + indexDocument: + suffix: index.html + region: us-west-1 + routingRule: + - condition: + keyPrefixEquals: docs/ + redirect: + replaceKeyPrefixWith: documents/ diff --git a/examples/s3/v1beta2/object.yaml b/examples/s3/v1beta2/object.yaml new file mode 100644 index 0000000000..efcc9b003a --- /dev/null +++ b/examples/s3/v1beta2/object.yaml @@ -0,0 +1,38 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Object +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/object + uptest.upbound.io/disable-import: "true" + labels: + testing.upbound.io/example-name: object + name: example-object +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: s3 + contentBase64: dGhpcyBpcyBhIHRleHQg + key: object_key + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + meta.upbound.io/example-id: s3/v1beta2/object + labels: + testing.upbound.io/example-name: s3 + name: example-${Rand.RFC1123Subdomain} +spec: + forProvider: + objectLockEnabled: true + region: us-west-1 + tags: + Name: SampleBucket diff --git a/examples/s3control/v1beta2/accesspoint.yaml b/examples/s3control/v1beta2/accesspoint.yaml new file mode 100644 index 0000000000..68950563a0 --- /dev/null +++ b/examples/s3control/v1beta2/accesspoint.yaml @@ -0,0 +1,34 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3control.aws.upbound.io/v1beta2 +kind: AccessPoint +metadata: + annotations: + meta.upbound.io/example-id: s3control/v1beta2/accesspoint + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example + name: example + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: s3control/v1beta2/accesspoint + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 diff --git a/examples/s3control/v1beta2/multiregionaccesspoint.yaml b/examples/s3control/v1beta2/multiregionaccesspoint.yaml new file mode 100644 index 0000000000..52d9890c0a --- /dev/null +++ b/examples/s3control/v1beta2/multiregionaccesspoint.yaml @@ -0,0 +1,54 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3control.aws.upbound.io/v1beta2 +kind: MultiRegionAccessPoint +metadata: + annotations: + meta.upbound.io/example-id: s3control/v1beta2/multiregionaccesspoint + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + details: + name: example + region: + - bucketSelector: + matchLabels: + testing.upbound.io/example-name: foo_bucket + - bucketSelector: + matchLabels: + testing.upbound.io/example-name: bar_bucket + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: s3control/v1beta2/multiregionaccesspoint + labels: + testing.upbound.io/example-name: bar_bucket + name: bar-bucket +spec: + forProvider: + region: us-east-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: s3control/v1beta2/multiregionaccesspoint + labels: + testing.upbound.io/example-name: foo_bucket + name: foo-bucket +spec: + forProvider: + region: us-west-1 diff --git a/examples/s3control/v1beta2/multiregionaccesspointpolicy.yaml b/examples/s3control/v1beta2/multiregionaccesspointpolicy.yaml new file mode 100644 index 0000000000..7ebb71c83b --- /dev/null +++ b/examples/s3control/v1beta2/multiregionaccesspointpolicy.yaml @@ -0,0 +1,69 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3control.aws.upbound.io/v1beta2 +kind: MultiRegionAccessPointPolicy +metadata: + annotations: + meta.upbound.io/example-id: s3control/v1beta2/multiregionaccesspointpolicy + upjet.upbound.io/manual-intervention: Requires manual replacing {aws_s3control_multi_region_access_point.example.alias} + - randomly generated alias could not to add automatically + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + details: + name: example + policy: |- + ${jsonencode({ + "Version" : "2012-10-17", + "Statement" : [ + { + "Sid" : "Example", + "Effect" : "Allow", + "Principal" : { + "AWS" : "${data.aws_account_id}" + }, + "Action" : ["s3:GetObject", "s3:PutObject"], + "Resource" : "arn:aws:s3::${data.aws_account_id}:accesspoint/${aws_s3control_multi_region_access_point.example.alias}/object/*" + } + ] + })} + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: s3control/v1beta2/multiregionaccesspointpolicy + labels: + testing.upbound.io/example-name: foo_bucket + name: foo-bucket +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: s3control.aws.upbound.io/v1beta2 +kind: MultiRegionAccessPoint +metadata: + annotations: + meta.upbound.io/example-id: s3control/v1beta2/multiregionaccesspointpolicy + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + details: + name: example + region: + - bucketSelector: + matchLabels: + testing.upbound.io/example-name: foo_bucket + region: us-west-1 diff --git a/examples/s3control/v1beta2/objectlambdaaccesspoint.yaml b/examples/s3control/v1beta2/objectlambdaaccesspoint.yaml new file mode 100644 index 0000000000..fcedb4cacd --- /dev/null +++ b/examples/s3control/v1beta2/objectlambdaaccesspoint.yaml @@ -0,0 +1,111 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3control.aws.upbound.io/v1beta2 +kind: ObjectLambdaAccessPoint +metadata: + annotations: + meta.upbound.io/example-id: s3control/v1beta2/objectlambdaaccesspoint + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + configuration: + supportingAccessPointSelector: + matchLabels: + testing.upbound.io/example-name: example + transformationConfiguration: + - actions: + - GetObject + contentTransformation: + awsLambda: + functionArnSelector: + matchLabels: + testing.upbound.io/example-name: example + name: example + region: us-east-1 + +--- + +apiVersion: s3control.aws.upbound.io/v1beta2 +kind: AccessPoint +metadata: + annotations: + meta.upbound.io/example-id: s3control/v1beta2/objectlambdaaccesspoint + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example + name: example + region: us-east-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: s3control/v1beta2/objectlambdaaccesspoint + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-east-1 + +--- + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: Function +metadata: + annotations: + meta.upbound.io/example-id: s3control/v1beta2/objectlambdaaccesspoint + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + environment: + variables: + foo: bar + handler: index.py + region: us-east-1 + roleRef: + name: sample-role + runtime: python3.9 + s3Bucket: upbound-provider-test-data + s3Key: hello-python.zip + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: s3control/v1beta2/objectlambdaaccesspoint + labels: + testing.upbound.io/example-name: role + name: sample-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "lambda.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } diff --git a/examples/s3control/v1beta2/storagelensconfiguration.yaml b/examples/s3control/v1beta2/storagelensconfiguration.yaml new file mode 100644 index 0000000000..d34301a70a --- /dev/null +++ b/examples/s3control/v1beta2/storagelensconfiguration.yaml @@ -0,0 +1,24 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: s3control.aws.upbound.io/v1beta2 +kind: StorageLensConfiguration +metadata: + annotations: + meta.upbound.io/example-id: s3control/v1beta2/storagelensconfiguration + labels: + testing.upbound.io/example-name: example + name: slcexample +spec: + forProvider: + configId: example-1 + region: us-west-1 + storageLensConfiguration: + accountLevel: + activityMetrics: + enabled: true + bucketLevel: + activityMetrics: + enabled: true + enabled: false diff --git a/examples/sagemaker/v1beta2/app.yaml b/examples/sagemaker/v1beta2/app.yaml new file mode 100644 index 0000000000..8a15817778 --- /dev/null +++ b/examples/sagemaker/v1beta2/app.yaml @@ -0,0 +1,132 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: App +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/app + uptest.upbound.io/timeout: "2400" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + appName: example + appType: JupyterServer + domainIdSelector: + matchLabels: + testing.upbound.io/example-name: example-domain + region: us-east-1 + userProfileNameSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: UserProfile +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/app + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + domainIdSelector: + matchLabels: + testing.upbound.io/example-name: example-domain + region: us-east-1 + userProfileName: example + +--- + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Domain +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/app + labels: + testing.upbound.io/example-name: example-domain + name: example-domain +spec: + forProvider: + authMode: IAM + defaultUserSettings: + executionRoleSelector: + matchLabels: + testing.upbound.io/example-name: example + domainName: example + region: us-east-1 + retentionPolicy: + homeEfsFileSystem: Delete + subnetIdRefs: + - name: sample-subnet-sage + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: sample-vpc-sage + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/app + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "sagemaker.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + path: / + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/app + labels: + testing.upbound.io/example-name: sample-subnet-sage + name: sample-subnet-sage +spec: + forProvider: + availabilityZone: us-east-1b + cidrBlock: 172.16.10.0/24 + region: us-east-1 + vpcIdRef: + name: sample-vpc-sage + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/app + labels: + testing.upbound.io/example-name: sample-vpc-sage + name: sample-vpc-sage +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-east-1 + tags: + Name: DemoVpc-Sage diff --git a/examples/sagemaker/v1beta2/appimageconfig.yaml b/examples/sagemaker/v1beta2/appimageconfig.yaml new file mode 100644 index 0000000000..f53d69f2b4 --- /dev/null +++ b/examples/sagemaker/v1beta2/appimageconfig.yaml @@ -0,0 +1,18 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: AppImageConfig +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/appimageconfig + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + kernelGatewayImageConfig: + kernelSpec: + - name: example + region: us-west-1 diff --git a/examples/sagemaker/v1beta2/coderepository.yaml b/examples/sagemaker/v1beta2/coderepository.yaml new file mode 100644 index 0000000000..0369fe97dc --- /dev/null +++ b/examples/sagemaker/v1beta2/coderepository.yaml @@ -0,0 +1,17 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: CodeRepository +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/coderepository + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + gitConfig: + repositoryUrl: https://github.com/hashicorp/terraform-provider-aws.git + region: us-west-1 diff --git a/examples/sagemaker/v1beta2/device.yaml b/examples/sagemaker/v1beta2/device.yaml new file mode 100644 index 0000000000..05eb547438 --- /dev/null +++ b/examples/sagemaker/v1beta2/device.yaml @@ -0,0 +1,117 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Device +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/device + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + device: + deviceName: example + deviceFleetNameSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-east-1 + +--- + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: DeviceFleet +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/device + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + outputConfig: + s3OutputLocation: s3://bucketname012/ + region: us-east-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/device + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": ["iot.amazonaws.com", "sagemaker.amazonaws.com"] + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: bucketname012 + meta.upbound.io/example-id: sagemaker/v1beta2/device + labels: + testing.upbound.io/example-name: bucketname012 + name: bucketname012 +spec: + forProvider: + region: us-east-1 + tags: + Name: bucketname012 + +--- + +apiVersion: s3.aws.upbound.io/v1beta1 +kind: BucketPolicy +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/device + labels: + testing.upbound.io/example-name: s3-policy + name: s3-policy +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: bucketname012 + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "Statement1", + "Effect": "Allow", + "Principal": { + "AWS": "arn:aws:iam::${data.aws_account_id}:role/example" + }, + "Action": "*", + "Resource": [ + "arn:aws:s3:::bucketname012", + "arn:aws:s3:::bucketname012/*" + ] + } + ] + } + region: us-east-1 diff --git a/examples/sagemaker/v1beta2/devicefleet.yaml b/examples/sagemaker/v1beta2/devicefleet.yaml new file mode 100644 index 0000000000..45038aba78 --- /dev/null +++ b/examples/sagemaker/v1beta2/devicefleet.yaml @@ -0,0 +1,98 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: DeviceFleet +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/devicefleet + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + outputConfig: + s3OutputLocation: s3://bucketname012/ + region: us-east-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/devicefleet + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": ["iot.amazonaws.com", "sagemaker.amazonaws.com"] + }, + "Action": "sts:AssumeRole" + } + ] + } + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: bucketname012 + meta.upbound.io/example-id: sagemaker/v1beta2/devicefleet + labels: + testing.upbound.io/example-name: bucketname012 + name: bucketname012 +spec: + forProvider: + region: us-east-1 + tags: + Name: bucketname012 + +--- + +apiVersion: s3.aws.upbound.io/v1beta1 +kind: BucketPolicy +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/devicefleet + labels: + testing.upbound.io/example-name: s3-policy + name: s3-policy +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: bucketname012 + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "Statement1", + "Effect": "Allow", + "Principal": { + "AWS": "arn:aws:iam::${data.aws_account_id}:role/example" + }, + "Action": "*", + "Resource": [ + "arn:aws:s3:::bucketname012", + "arn:aws:s3:::bucketname012/*" + ] + } + ] + } + region: us-east-1 diff --git a/examples/sagemaker/v1beta2/domain.yaml b/examples/sagemaker/v1beta2/domain.yaml new file mode 100644 index 0000000000..f6bee6cb8d --- /dev/null +++ b/examples/sagemaker/v1beta2/domain.yaml @@ -0,0 +1,91 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Domain +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/domain + labels: + testing.upbound.io/example-name: example-sage + name: example-sage +spec: + forProvider: + authMode: IAM + defaultUserSettings: + executionRoleSelector: + matchLabels: + testing.upbound.io/example-name: example-sage-role + domainName: example + region: us-west-1 + retentionPolicy: + homeEfsFileSystem: Delete + subnetIdRefs: + - name: sample-subnet1-sage + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: sample-vpc-sage + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/domain + labels: + testing.upbound.io/example-name: example-sage-role + name: example-sage-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "sagemaker.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + path: / + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/domain + labels: + testing.upbound.io/example-name: sample-subnet1-sage + name: sample-subnet1-sage +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.10.0/24 + region: us-west-1 + vpcIdRef: + name: sample-vpc-sage + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/domain + labels: + testing.upbound.io/example-name: sample-vpc-sage + name: sample-vpc-sage +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: DemoVpcSage diff --git a/examples/sagemaker/v1beta2/endpoint.yaml b/examples/sagemaker/v1beta2/endpoint.yaml new file mode 100644 index 0000000000..82c0495b60 --- /dev/null +++ b/examples/sagemaker/v1beta2/endpoint.yaml @@ -0,0 +1,116 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Endpoint +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/endpoint + upjet.upbound.io/manual-intervention: This resource is skipping because the EndpointConfiguration + resource on which this resource depends was skipped. + labels: + testing.upbound.io/example-name: e + name: e +spec: + forProvider: + endpointConfigNameSelector: + matchLabels: + testing.upbound.io/example-name: ec + region: us-east-1 + tags: + Name: foo + +--- + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: EndpointConfiguration +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/endpoint + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: ec + name: ec +spec: + forProvider: + productionVariants: + - initialInstanceCount: 1 + instanceType: ml.t2.medium + modelNameSelector: + matchLabels: + testing.upbound.io/example-name: example + variantName: variant-1 + region: us-east-1 + tags: + Name: foo + +--- + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Model +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/endpoint + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + executionRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + primaryContainer: + image: ${data.aws_account_id}.dkr.ecr.us-east-1.amazonaws.com/sagemaker-scikit-learn:latest + region: us-east-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/endpoint + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "sagemaker.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/endpoint + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonSageMakerFullAccess + roleSelector: + matchLabels: + testing.upbound.io/example-name: example diff --git a/examples/sagemaker/v1beta2/endpointconfiguration.yaml b/examples/sagemaker/v1beta2/endpointconfiguration.yaml new file mode 100644 index 0000000000..da1e795d53 --- /dev/null +++ b/examples/sagemaker/v1beta2/endpointconfiguration.yaml @@ -0,0 +1,95 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: EndpointConfiguration +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/endpointconfiguration + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: ec + name: ec +spec: + forProvider: + productionVariants: + - initialInstanceCount: 1 + instanceType: ml.t2.medium + modelNameSelector: + matchLabels: + testing.upbound.io/example-name: example + variantName: variant-1 + region: us-east-1 + tags: + Name: foo + +--- + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Model +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/endpointconfiguration + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + executionRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + primaryContainer: + image: ${data.aws_account_id}.dkr.ecr.us-east-1.amazonaws.com/sagemaker-scikit-learn:latest + region: us-east-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/endpointconfiguration + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "sagemaker.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/endpointconfiguration + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonSageMakerFullAccess + roleSelector: + matchLabels: + testing.upbound.io/example-name: example diff --git a/examples/sagemaker/v1beta2/featuregroup.yaml b/examples/sagemaker/v1beta2/featuregroup.yaml new file mode 100644 index 0000000000..745d296e95 --- /dev/null +++ b/examples/sagemaker/v1beta2/featuregroup.yaml @@ -0,0 +1,53 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: FeatureGroup +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/featuregroup + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + eventTimeFeatureName: example + featureDefinition: + - featureName: example + featureType: String + onlineStoreConfig: + enableOnlineStore: true + recordIdentifierFeatureName: example + region: us-west-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/featuregroup + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "sagemaker.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + path: / diff --git a/examples/sagemaker/v1beta2/model.yaml b/examples/sagemaker/v1beta2/model.yaml new file mode 100644 index 0000000000..476915cb69 --- /dev/null +++ b/examples/sagemaker/v1beta2/model.yaml @@ -0,0 +1,70 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Model +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/model + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + executionRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + primaryContainer: + image: ${data.aws_account_id}.dkr.ecr.us-east-1.amazonaws.com/sagemaker-scikit-learn:latest + region: us-east-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/model + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "sagemaker.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/model + upjet.upbound.io/manual-intervention: It requires an image which can be create/deleted + only using AWS CLI + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonSageMakerFullAccess + roleSelector: + matchLabels: + testing.upbound.io/example-name: example diff --git a/examples/sagemaker/v1beta2/notebookinstance.yaml b/examples/sagemaker/v1beta2/notebookinstance.yaml new file mode 100644 index 0000000000..631aa1ea9b --- /dev/null +++ b/examples/sagemaker/v1beta2/notebookinstance.yaml @@ -0,0 +1,49 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: NotebookInstance +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/notebookinstance + labels: + testing.upbound.io/example-name: ni + name: ni +spec: + forProvider: + instanceType: ml.t2.medium + region: us-west-1 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + tags: + Name: foo + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/notebookinstance + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "sagemaker.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + path: / diff --git a/examples/sagemaker/v1beta2/space.yaml b/examples/sagemaker/v1beta2/space.yaml new file mode 100644 index 0000000000..65f43664ae --- /dev/null +++ b/examples/sagemaker/v1beta2/space.yaml @@ -0,0 +1,114 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Space +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/space + upjet.upbound.io/manual-intervention: Depends on resource with manual intervention. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + domainIdSelector: + matchLabels: + testing.upbound.io/example-name: example-sage + region: us-west-1 + spaceName: example + +--- + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Domain +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/space + upjet.upbound.io/manual-intervention: Require executionRole arn to be manually + specified. + labels: + testing.upbound.io/example-name: example-sage + name: example-sage +spec: + forProvider: + authMode: IAM + defaultSpaceSettings: + executionRole: arn:aws:iam::153891904029:role/example-sage-role + defaultUserSettings: + executionRoleSelector: + matchLabels: + testing.upbound.io/example-name: example-sage-role + domainName: example + region: us-west-1 + retentionPolicy: + homeEfsFileSystem: Delete + subnetIdRefs: + - name: sample-subnet1-sage + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: sample-vpc-sage + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/space + labels: + testing.upbound.io/example-name: example-sage-role + name: example-sage-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "sagemaker.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + path: / + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/space + labels: + testing.upbound.io/example-name: sample-subnet1-sage + name: sample-subnet1-sage +spec: + forProvider: + availabilityZone: us-west-1b + cidrBlock: 172.16.10.0/24 + region: us-west-1 + vpcIdRef: + name: sample-vpc-sage + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/space + labels: + testing.upbound.io/example-name: sample-vpc-sage + name: sample-vpc-sage +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-west-1 + tags: + Name: DemoVpcSage diff --git a/examples/sagemaker/v1beta2/userprofile.yaml b/examples/sagemaker/v1beta2/userprofile.yaml new file mode 100644 index 0000000000..6f6b07afbb --- /dev/null +++ b/examples/sagemaker/v1beta2/userprofile.yaml @@ -0,0 +1,110 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: UserProfile +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/userprofile + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + domainIdSelector: + matchLabels: + testing.upbound.io/example-name: example-domain + region: us-east-1 + userProfileName: example + +--- + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Domain +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/userprofile + labels: + testing.upbound.io/example-name: example-domain + name: example-domain +spec: + forProvider: + authMode: IAM + defaultUserSettings: + executionRoleSelector: + matchLabels: + testing.upbound.io/example-name: example + domainName: example + region: us-east-1 + retentionPolicy: + homeEfsFileSystem: Delete + subnetIdRefs: + - name: sample-subnet-sage + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: sample-vpc-sage + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/userprofile + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "sagemaker.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + path: / + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/userprofile + labels: + testing.upbound.io/example-name: sample-subnet-sage + name: sample-subnet-sage +spec: + forProvider: + availabilityZone: us-east-1b + cidrBlock: 172.16.10.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: sample-vpc-sage + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/userprofile + labels: + testing.upbound.io/example-name: sample-vpc-sage + name: sample-vpc-sage +spec: + forProvider: + cidrBlock: 172.16.0.0/16 + region: us-east-1 + tags: + Name: DemoVpc-Sage diff --git a/examples/sagemaker/v1beta2/workforce.yaml b/examples/sagemaker/v1beta2/workforce.yaml new file mode 100644 index 0000000000..1b53c4f5bb --- /dev/null +++ b/examples/sagemaker/v1beta2/workforce.yaml @@ -0,0 +1,74 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Workforce +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workforce + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + cognitoConfig: + clientIdSelector: + matchLabels: + testing.upbound.io/example-name: example + userPoolSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-2 + +--- + +apiVersion: cognitoidp.aws.upbound.io/v1beta2 +kind: UserPool +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workforce + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + name: example + region: us-west-2 + +--- + +apiVersion: cognitoidp.aws.upbound.io/v1beta1 +kind: UserPoolClient +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workforce + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + generateSecret: true + name: example + region: us-west-2 + userPoolIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: cognitoidp.aws.upbound.io/v1beta1 +kind: UserPoolDomain +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workforce + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + domain: testdom + region: us-west-2 + userPoolIdSelector: + matchLabels: + testing.upbound.io/example-name: example diff --git a/examples/sagemaker/v1beta2/workteam.yaml b/examples/sagemaker/v1beta2/workteam.yaml new file mode 100644 index 0000000000..af781929be --- /dev/null +++ b/examples/sagemaker/v1beta2/workteam.yaml @@ -0,0 +1,160 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Workteam +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workteam + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: example + memberDefinition: + - cognitoMemberDefinition: + clientIdSelector: + matchLabels: + testing.upbound.io/example-name: example + userGroupSelector: + matchLabels: + testing.upbound.io/example-name: example + userPoolSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-2 + workforceNameSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: cognitoidp.aws.upbound.io/v1beta1 +kind: UserGroup +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workteam + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + name: example + precedence: 42 + region: us-west-2 + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: group_role + userPoolIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: cognitoidp.aws.upbound.io/v1beta2 +kind: UserPool +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workteam + labels: + testing.upbound.io/example-name: main + name: main +spec: + forProvider: + name: identity pool + region: us-west-2 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workteam + labels: + testing.upbound.io/example-name: group_role + name: group-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "", + "Effect": "Allow", + "Principal": { + "Federated": "cognito-identity.amazonaws.com" + }, + "Action": "sts:AssumeRoleWithWebIdentity", + "Condition": { + "StringEquals": { + "cognito-identity.amazonaws.com:aud": "us-east-1:12345678-dead-beef-cafe-123456790ab" + }, + "ForAnyValue:StringLike": { + "cognito-identity.amazonaws.com:amr": "authenticated" + } + } + } + ] + } + +--- + +apiVersion: cognitoidp.aws.upbound.io/v1beta1 +kind: UserPoolClient +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workteam + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + generateSecret: true + name: example + region: us-west-2 + userPoolIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: cognitoidp.aws.upbound.io/v1beta1 +kind: UserPoolDomain +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workteam + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + domain: testdom + region: us-west-2 + userPoolIdSelector: + matchLabels: + testing.upbound.io/example-name: main + +--- + +apiVersion: sagemaker.aws.upbound.io/v1beta2 +kind: Workforce +metadata: + annotations: + meta.upbound.io/example-id: sagemaker/v1beta2/workteam + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + cognitoConfig: + clientIdSelector: + matchLabels: + testing.upbound.io/example-name: example + userPoolSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-2 diff --git a/examples/scheduler/v1beta2/schedule.yaml b/examples/scheduler/v1beta2/schedule.yaml new file mode 100644 index 0000000000..6576dd5aa5 --- /dev/null +++ b/examples/scheduler/v1beta2/schedule.yaml @@ -0,0 +1,74 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: scheduler.aws.upbound.io/v1beta2 +kind: Schedule +metadata: + annotations: + meta.upbound.io/example-id: scheduler/v1beta2/schedule + labels: + testing.upbound.io/example-name: example + name: shexample +spec: + forProvider: + flexibleTimeWindow: + mode: "OFF" + groupName: default + name: my-schedule + region: us-east-1 + scheduleExpression: rate(1 hour) + target: + arnSelector: + matchLabels: + testing.upbound.io/example-name: example + roleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: sqs.aws.upbound.io/v1beta1 +kind: Queue +metadata: + annotations: + meta.upbound.io/example-id: scheduler/v1beta2/schedule + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + delaySeconds: 90 + maxMessageSize: 2048 + messageRetentionSeconds: 86400 + name: upbound-sqs + receiveWaitTimeSeconds: 10 + region: us-east-1 + tags: + Environment: production + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: scheduler/v1beta2/schedule + labels: + testing.upbound.io/example-name: example + name: sample-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": ["eks.amazonaws.com", "scheduler.amazonaws.com"] + }, + "Action": "sts:AssumeRole" + } + ] + } diff --git a/examples/secretsmanager/v1beta2/secretrotation.yaml b/examples/secretsmanager/v1beta2/secretrotation.yaml new file mode 100644 index 0000000000..c1c7cd38dd --- /dev/null +++ b/examples/secretsmanager/v1beta2/secretrotation.yaml @@ -0,0 +1,147 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: secretsmanager.aws.upbound.io/v1beta2 +kind: SecretRotation +metadata: + annotations: + meta.upbound.io/example-id: secretsmanager/v1beta2/secretrotation + labels: + testing.upbound.io/example-name: secretrotation + name: example-secretrotation +spec: + forProvider: + region: us-east-1 + rotationLambdaArnSelector: + matchLabels: + testing.upbound.io/example-name: secretrotation + rotationRules: + automaticallyAfterDays: 30 + secretIdSelector: + matchLabels: + testing.upbound.io/example-name: secretrotation + +--- + +apiVersion: lambda.aws.upbound.io/v1beta1 +kind: Permission +metadata: + annotations: + meta.upbound.io/example-id: secretsmanager/v1beta2/secretrotation + labels: + testing.upbound.io/example-name: secretrotation + name: example-secretrotation +spec: + forProvider: + action: lambda:InvokeFunction + functionNameSelector: + matchLabels: + testing.upbound.io/example-name: secretrotation + principal: secretsmanager.amazonaws.com + region: us-east-1 + statementId: AllowExecutionFromSecretsManager + +--- + +apiVersion: secretsmanager.aws.upbound.io/v1beta1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: secretsmanager/v1beta2/secretrotation + labels: + testing.upbound.io/example-name: secretrotation + name: example-secretrotation +spec: + forProvider: + name: example-${Rand.RFC1123Subdomain} + region: us-east-1 + +--- + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: Function +metadata: + annotations: + meta.upbound.io/example-id: secretsmanager/v1beta2/secretrotation + labels: + testing.upbound.io/example-name: secretrotation + name: example-secretrotation +spec: + forProvider: + environment: + variables: + foo: bar + handler: handler + region: us-east-1 + roleSelector: + matchLabels: + testing.upbound.io/example-name: secretrotation + runtime: nodejs18.x + s3BucketSelector: + matchLabels: + testing.upbound.io/example-name: secretrotation + s3Key: lambda.zip + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: secretsmanager/v1beta2/secretrotation + labels: + testing.upbound.io/example-name: secretrotation + name: sample-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "lambda.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: ${Rand.RFC1123Subdomain} + meta.upbound.io/example-id: secretsmanager/v1beta2/secretrotation + labels: + testing.upbound.io/example-name: secretrotation + name: example-secretrotation +spec: + forProvider: + region: us-east-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Object +metadata: + annotations: + meta.upbound.io/example-id: secretsmanager/v1beta2/secretrotation + uptest.upbound.io/disable-import: "true" + labels: + testing.upbound.io/example-name: secretrotation + name: example-secretrotation +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: secretrotation + contentBase64: UEsDBBQAAAAIAFd7c1eDOfFtMAAAADEAAAAIABwAaW5kZXguanNVVAkAA7WZWmWrmVpldXgLAAEE6AMAAAToAwAAS60oyC8qKdbLSMxLyUktUrBV0NBUsLVTSM7PK87PSdXLyU/XUPfLB/FLUvNK1DUBUEsBAh4DFAAAAAgAV3tzV4M58W0wAAAAMQAAAAgAGAAAAAAAAQAAALSBAAAAAGluZGV4LmpzVVQFAAO1mVpldXgLAAEE6AMAAAToAwAAUEsFBgAAAAABAAEATgAAAHIAAAAAAA== + contentType: application/zip + key: lambda.zip + region: us-east-1 diff --git a/examples/securityhub/v1beta2/insight.yaml b/examples/securityhub/v1beta2/insight.yaml new file mode 100644 index 0000000000..4d358fc101 --- /dev/null +++ b/examples/securityhub/v1beta2/insight.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: securityhub.aws.upbound.io/v1beta2 +kind: Insight +metadata: + annotations: + meta.upbound.io/example-id: securityhub/v1beta2/insight + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + filters: + awsAccountId: + - comparison: EQUALS + value: "1234567890" + - comparison: EQUALS + value: "09876543210" + groupByAttribute: AwsAccountId + name: example-insight + region: us-west-1 diff --git a/examples/servicecatalog/v1beta2/product.yaml b/examples/servicecatalog/v1beta2/product.yaml new file mode 100644 index 0000000000..0923671c45 --- /dev/null +++ b/examples/servicecatalog/v1beta2/product.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: servicecatalog.aws.upbound.io/v1beta2 +kind: Product +metadata: + annotations: + meta.upbound.io/example-id: servicecatalog/v1beta2/product + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + name: example + owner: test testovich + provisioningArtifactParameters: + templateUrl: https://s3-us-west-1.amazonaws.com/cloudformation-templates-us-west-1/LAMP_Single_Instance.template + type: CLOUD_FORMATION_TEMPLATE + region: us-west-1 + tags: + foo: bar + type: CLOUD_FORMATION_TEMPLATE diff --git a/examples/servicecatalog/v1beta2/serviceaction.yaml b/examples/servicecatalog/v1beta2/serviceaction.yaml new file mode 100644 index 0000000000..8ebf61bedf --- /dev/null +++ b/examples/servicecatalog/v1beta2/serviceaction.yaml @@ -0,0 +1,20 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: servicecatalog.aws.upbound.io/v1beta2 +kind: ServiceAction +metadata: + annotations: + meta.upbound.io/example-id: servicecatalog/v1beta2/serviceaction + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + definition: + name: AWS-RestartEC2Instance + version: "1" + description: Motor generator unit + name: MGU + region: us-west-1 diff --git a/examples/servicediscovery/v1beta2/service.yaml b/examples/servicediscovery/v1beta2/service.yaml new file mode 100644 index 0000000000..1ffe1946f9 --- /dev/null +++ b/examples/servicediscovery/v1beta2/service.yaml @@ -0,0 +1,62 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: servicediscovery.aws.upbound.io/v1beta2 +kind: Service +metadata: + annotations: + meta.upbound.io/example-id: servicediscovery/v1beta2/service + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + dnsConfig: + dnsRecords: + - ttl: 10 + type: A + namespaceIdSelector: + matchLabels: + testing.upbound.io/example-name: example + routingPolicy: MULTIVALUE + healthCheckCustomConfig: + failureThreshold: 1 + name: example + region: us-west-1 + +--- + +apiVersion: servicediscovery.aws.upbound.io/v1beta1 +kind: PrivateDNSNamespace +metadata: + annotations: + meta.upbound.io/example-id: servicediscovery/v1beta2/service + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + description: example + name: example.terraform.local + region: us-west-1 + vpcSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: servicediscovery/v1beta2/service + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + enableDnsHostnames: true + enableDnsSupport: true + region: us-west-1 diff --git a/examples/ses/v1beta2/configurationset.yaml b/examples/ses/v1beta2/configurationset.yaml new file mode 100644 index 0000000000..5550d8155c --- /dev/null +++ b/examples/ses/v1beta2/configurationset.yaml @@ -0,0 +1,15 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ses.aws.upbound.io/v1beta2 +kind: ConfigurationSet +metadata: + annotations: + meta.upbound.io/example-id: ses/v1beta2/configurationset + labels: + testing.upbound.io/example-name: test + name: v1-test +spec: + forProvider: + region: us-east-1 diff --git a/examples/ses/v1beta2/eventdestination.yaml b/examples/ses/v1beta2/eventdestination.yaml new file mode 100644 index 0000000000..ae05032b9f --- /dev/null +++ b/examples/ses/v1beta2/eventdestination.yaml @@ -0,0 +1,55 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ses.aws.upbound.io/v1beta2 +kind: EventDestination +metadata: + annotations: + meta.upbound.io/example-id: ses/v1beta2/eventdestination + labels: + testing.upbound.io/example-name: sns + name: sns +spec: + forProvider: + configurationSetNameSelector: + matchLabels: + testing.upbound.io/example-name: test + enabled: true + matchingTypes: + - bounce + - send + region: us-east-1 + snsDestination: + topicArnSelector: + matchLabels: + testing.upbound.io/example-name: test + +--- + +apiVersion: ses.aws.upbound.io/v1beta2 +kind: ConfigurationSet +metadata: + annotations: + meta.upbound.io/example-id: ses/v1beta2/eventdestination + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + region: us-east-1 + +--- + +apiVersion: sns.aws.upbound.io/v1beta1 +kind: Topic +metadata: + annotations: + meta.upbound.io/example-id: ses/v1beta2/eventdestination + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + displayName: backup-vault-events + region: us-east-1 diff --git a/examples/sesv2/v1beta2/configurationset.yaml b/examples/sesv2/v1beta2/configurationset.yaml new file mode 100644 index 0000000000..e34616ef11 --- /dev/null +++ b/examples/sesv2/v1beta2/configurationset.yaml @@ -0,0 +1,25 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sesv2.aws.upbound.io/v1beta2 +kind: ConfigurationSet +metadata: + annotations: + meta.upbound.io/example-id: sesv2/v1beta2/configurationset + labels: + testing.upbound.io/example-name: example + name: v2-example +spec: + forProvider: + deliveryOptions: + tlsPolicy: REQUIRE + region: us-west-1 + reputationOptions: + reputationMetricsEnabled: false + sendingOptions: + sendingEnabled: true + suppressionOptions: + suppressedReasons: + - BOUNCE + - COMPLAINT diff --git a/examples/sesv2/v1beta2/configurationseteventdestination.yaml b/examples/sesv2/v1beta2/configurationseteventdestination.yaml new file mode 100644 index 0000000000..44d3474829 --- /dev/null +++ b/examples/sesv2/v1beta2/configurationseteventdestination.yaml @@ -0,0 +1,42 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sesv2.aws.upbound.io/v1beta2 +kind: ConfigurationSetEventDestination +metadata: + annotations: + meta.upbound.io/example-id: sesv2/v1beta2/configurationseteventdestination + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + configurationSetNameSelector: + matchLabels: + testing.upbound.io/example-name: example + eventDestination: + cloudWatchDestination: + dimensionConfiguration: + - defaultDimensionValue: example + dimensionName: example + dimensionValueSource: MESSAGE_TAG + enabled: true + matchingEventTypes: + - SEND + eventDestinationName: example + region: us-west-1 + +--- + +apiVersion: sesv2.aws.upbound.io/v1beta2 +kind: ConfigurationSet +metadata: + annotations: + meta.upbound.io/example-id: sesv2/v1beta2/configurationseteventdestination + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 diff --git a/examples/sesv2/v1beta2/emailidentity.yaml b/examples/sesv2/v1beta2/emailidentity.yaml new file mode 100644 index 0000000000..871b1fef18 --- /dev/null +++ b/examples/sesv2/v1beta2/emailidentity.yaml @@ -0,0 +1,16 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sesv2.aws.upbound.io/v1beta2 +kind: EmailIdentity +metadata: + annotations: + meta.upbound.io/example-id: sesv2/v1beta2/emailidentity + labels: + testing.upbound.io/example-name: example + name: v2-example +spec: + forProvider: + email: v2-example@example.com + region: us-west-1 diff --git a/examples/sfn/v1beta2/statemachine.yaml b/examples/sfn/v1beta2/statemachine.yaml new file mode 100644 index 0000000000..0094471d0e --- /dev/null +++ b/examples/sfn/v1beta2/statemachine.yaml @@ -0,0 +1,54 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: sfn.aws.upbound.io/v1beta2 +kind: StateMachine +metadata: + annotations: + meta.upbound.io/example-id: sfn/v1beta2/statemachine + name: my-state-machine +spec: + forProvider: + definition: | + { + "Comment": "A Hello World example of the Amazon States Language using an AWS Lambda Function", + "StartAt": "HelloWorld", + "States": { + "HelloWorld": { + "Type": "Task", + "Resource": "arn:aws:lambda:us-west-1:609897127049:function:example", + "End": true + } + } + } + region: us-west-1 + roleArnRef: + name: example + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: sfn/v1beta2/statemachine + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "states.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } diff --git a/examples/signer/v1beta2/signingjob.yaml b/examples/signer/v1beta2/signingjob.yaml new file mode 100644 index 0000000000..71338e435e --- /dev/null +++ b/examples/signer/v1beta2/signingjob.yaml @@ -0,0 +1,27 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: signer.aws.upbound.io/v1beta2 +kind: SigningJob +metadata: + annotations: + meta.upbound.io/example-id: signer/v1beta2/signingjob + upjet.upbound.io/manual-intervention: It requires a real active profile to be + specified + labels: + testing.upbound.io/example-name: build_signing_job + name: build-signing-job +spec: + forProvider: + destination: + s3: + bucket: upbound-provider-test-data + ignoreSigningJobFailure: true + profileName: test + region: us-east-1 + source: + s3: + bucket: upbound-provider-test-data + key: hello-python-test.zip + version: Yamdn8_YrdYjwmni6isSpknLMq3IDThN diff --git a/examples/signer/v1beta2/signingprofile.yaml b/examples/signer/v1beta2/signingprofile.yaml new file mode 100644 index 0000000000..6c973e98d0 --- /dev/null +++ b/examples/signer/v1beta2/signingprofile.yaml @@ -0,0 +1,14 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: signer.aws.upbound.io/v1beta2 +kind: SigningProfile +metadata: + annotations: + meta.upbound.io/example-id: signer/v1beta2/signingprofile + name: example +spec: + forProvider: + platformId: AWSLambda-SHA384-ECDSA + region: us-west-1 diff --git a/examples/ssm/v1beta2/association.yaml b/examples/ssm/v1beta2/association.yaml new file mode 100644 index 0000000000..6dd9a444f1 --- /dev/null +++ b/examples/ssm/v1beta2/association.yaml @@ -0,0 +1,55 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ssm.aws.upbound.io/v1beta2 +kind: Association +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/association + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + nameSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-west-1 + targets: + - key: tag:Environment + values: + - Development + +--- + +apiVersion: ssm.aws.upbound.io/v1beta1 +kind: Document +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/association + labels: + testing.upbound.io/example-name: example + name: foo +spec: + forProvider: + content: | + { + "schemaVersion": "1.2", + "description": "Check ip configuration of a Linux instance.", + "parameters": { + + }, + "runtimeConfig": { + "aws:runShellScript": { + "properties": [ + { + "id": "0.aws:runShellScript", + "runCommand": ["ifconfig"] + } + ] + } + } + } + documentType: Command + region: us-west-1 diff --git a/examples/ssm/v1beta2/maintenancewindowtask.yaml b/examples/ssm/v1beta2/maintenancewindowtask.yaml new file mode 100644 index 0000000000..4057c0fa8c --- /dev/null +++ b/examples/ssm/v1beta2/maintenancewindowtask.yaml @@ -0,0 +1,172 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ssm.aws.upbound.io/v1beta2 +kind: MaintenanceWindowTask +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/maintenancewindowtask + upjet.upbound.io/manual-intervention: It requires an aws_instance id + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + maxConcurrency: "2" + maxErrors: "1" + priority: 1 + region: us-east-1 + targets: + - key: InstanceIds + values: + - ${aws_instance} + taskArnSelector: + matchLabels: + testing.upbound.io/example-name: example + taskInvocationParameters: + lambdaParameters: + clientContext: eyJrZXkiOiAidmFsdWUifQ== + taskType: LAMBDA + windowIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta2 +kind: Instance +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/maintenancewindowtask + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + ami: ami-0b5eea76982371e91 + instanceType: t2.micro + networkInterface: + - deviceIndex: 0 + networkInterfaceIdRef: + name: test + region: us-east-1 + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: NetworkInterface +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/maintenancewindowtask + labels: + testing.upbound.io/example-name: test + name: test +spec: + forProvider: + region: us-east-1 + subnetIdSelector: + matchLabels: + testing.upbound.io/example-name: subnetattach + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/maintenancewindowtask + labels: + testing.upbound.io/example-name: subnetattach + name: subnetattach +spec: + forProvider: + availabilityZone: us-east-1b + cidrBlock: 10.0.5.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: vpcattach + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/maintenancewindowtask + labels: + testing.upbound.io/example-name: vpcattach + name: vpcattach +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: us-east-1 + +--- + +apiVersion: lambda.aws.upbound.io/v1beta2 +kind: Function +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/maintenancewindowtask + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + environment: + variables: + foo: bar + handler: index.py + region: us-east-1 + roleRef: + name: sample-role + runtime: python3.9 + s3Bucket: upbound-provider-test-data + s3Key: hello-python.zip + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/maintenancewindowtask + labels: + testing.upbound.io/example-name: role + name: sample-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "lambda.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + +--- + +apiVersion: ssm.aws.upbound.io/v1beta1 +kind: MaintenanceWindow +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/maintenancewindowtask + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + cutoff: 1 + duration: 3 + name: maintenance-window-application + region: us-east-1 + schedule: cron(0 16 ? * TUE *) diff --git a/examples/ssm/v1beta2/resourcedatasync.yaml b/examples/ssm/v1beta2/resourcedatasync.yaml new file mode 100644 index 0000000000..49a9f23cc4 --- /dev/null +++ b/examples/ssm/v1beta2/resourcedatasync.yaml @@ -0,0 +1,83 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ssm.aws.upbound.io/v1beta2 +kind: ResourceDataSync +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/resourcedatasync + upjet.upbound.io/manual-intervention: It requires a deleting internal S3 Bucket + objects + labels: + testing.upbound.io/example-name: foo + name: foo +spec: + forProvider: + region: us-west-1 + s3Destination: + bucketNameSelector: + matchLabels: + testing.upbound.io/example-name: hoge + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: ssm-resourcedatasync-cnjbekjbsjcgfwlwfewfw + meta.upbound.io/example-id: ssm/v1beta2/resourcedatasync + labels: + testing.upbound.io/example-name: hoge + name: hoge +spec: + forProvider: + region: us-west-1 + +--- + +apiVersion: s3.aws.upbound.io/v1beta1 +kind: BucketPolicy +metadata: + annotations: + meta.upbound.io/example-id: ssm/v1beta2/resourcedatasync + labels: + testing.upbound.io/example-name: hoge + name: hoge +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: hoge + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Sid": "SSMBucketPermissionsCheck", + "Effect": "Allow", + "Principal": { + "Service": "ssm.amazonaws.com" + }, + "Action": "s3:GetBucketAcl", + "Resource": "arn:aws:s3:::ssm-resourcedatasync-cnjbekjbsjcgfwlwfewfw" + }, + { + "Sid": " SSMBucketDelivery", + "Effect": "Allow", + "Principal": { + "Service": "ssm.amazonaws.com" + }, + "Action": "s3:PutObject", + "Resource": ["arn:aws:s3:::ssm-resourcedatasync-cnjbekjbsjcgfwlwfewfw/*"], + "Condition": { + "StringEquals": { + "s3:x-amz-acl": "bucket-owner-full-control" + } + } + } + ] + } + region: us-west-1 diff --git a/examples/ssoadmin/v1beta2/customermanagedpolicyattachment.yaml b/examples/ssoadmin/v1beta2/customermanagedpolicyattachment.yaml new file mode 100644 index 0000000000..6ffa3e6878 --- /dev/null +++ b/examples/ssoadmin/v1beta2/customermanagedpolicyattachment.yaml @@ -0,0 +1,74 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ssoadmin.aws.upbound.io/v1beta2 +kind: CustomerManagedPolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: ssoadmin/v1beta2/customermanagedpolicyattachment + upjet.upbound.io/manual-intervention: This resource requires a valid instanceArn(The + Amazon Resource Name (ARN) of the SSO Instance under which the operation will + be executed). + labels: + testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment + name: ssoadmin-customer-managed-policy-attachment +spec: + deletionPolicy: Delete + forProvider: + customerManagedPolicyReference: + path: / + policyNameSelector: + matchLabels: + testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment + instanceArn: ARN of a manually created SSO instance in the same region specified + below + permissionSetArnSelector: + matchLabels: + testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment + region: us-east-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: ssoadmin/v1beta2/customermanagedpolicyattachment + labels: + testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment + name: ssoadmin-customer-managed-policy-attachment +spec: + forProvider: + description: My test policy + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Action": "ec2:Describe*", + "Resource": "*" + } + ] + } + +--- + +apiVersion: ssoadmin.aws.upbound.io/v1beta1 +kind: PermissionSet +metadata: + annotations: + meta.upbound.io/example-id: ssoadmin/v1beta2/customermanagedpolicyattachment + upjet.upbound.io/manual-intervention: This resource requires a valid instanceArn(The + Amazon Resource Name (ARN) of the SSO Instance under which the operation will + be executed). + labels: + testing.upbound.io/example-name: ssoadmin-customer-managed-policy-attachment + name: ssoadmin-customer-managed-policy-attachment +spec: + forProvider: + instanceArn: ARN of a manually created SSO instance in the same region specified + below + name: example-cmpa + region: us-east-1 diff --git a/examples/ssoadmin/v1beta2/permissionsboundaryattachment.yaml b/examples/ssoadmin/v1beta2/permissionsboundaryattachment.yaml new file mode 100644 index 0000000000..bc271aaaff --- /dev/null +++ b/examples/ssoadmin/v1beta2/permissionsboundaryattachment.yaml @@ -0,0 +1,74 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: ssoadmin.aws.upbound.io/v1beta2 +kind: PermissionsBoundaryAttachment +metadata: + annotations: + meta.upbound.io/example-id: ssoadmin/v1beta2/permissionsboundaryattachment + upjet.upbound.io/manual-intervention: This resource requires a valid instanceArn(The + Amazon Resource Name (ARN) of the SSO Instance under which the operation will + be executed). + labels: + testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment + name: ssoadmin-permissions-boundary-attachment +spec: + forProvider: + instanceArn: ARN of a manually created SSO instance in the same region specified + below + permissionSetArnSelector: + matchLabels: + testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment + permissionsBoundary: + customerManagedPolicyReference: + nameSelector: + matchLabels: + testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment + path: / + region: us-east-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: ssoadmin/v1beta2/permissionsboundaryattachment + labels: + testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment + name: ssoadmin-permissions-boundary-attachment +spec: + forProvider: + description: My test policy + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Action": "ec2:Describe*", + "Resource": "*" + } + ] + } + +--- + +apiVersion: ssoadmin.aws.upbound.io/v1beta1 +kind: PermissionSet +metadata: + annotations: + meta.upbound.io/example-id: ssoadmin/v1beta2/permissionsboundaryattachment + upjet.upbound.io/manual-intervention: This resource requires a valid instanceArn(The + Amazon Resource Name (ARN) of the SSO Instance under which the operation will + be executed). + labels: + testing.upbound.io/example-name: ssoadmin-permissions-boundary-attachment + name: ssoadmin-permissions-boundary-attachment +spec: + forProvider: + instanceArn: ARN of a manually created SSO instance in the same region specified + below + name: example-pba + region: us-east-1 diff --git a/examples/timestreamwrite/v1beta2/table.yaml b/examples/timestreamwrite/v1beta2/table.yaml new file mode 100644 index 0000000000..f4c7d63a46 --- /dev/null +++ b/examples/timestreamwrite/v1beta2/table.yaml @@ -0,0 +1,33 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: timestreamwrite.aws.upbound.io/v1beta2 +kind: Table +metadata: + annotations: + meta.upbound.io/example-id: timestreamwrite/v1beta2/table + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + databaseNameSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-east-2 + tableName: example + +--- + +apiVersion: timestreamwrite.aws.upbound.io/v1beta1 +kind: Database +metadata: + annotations: + meta.upbound.io/example-id: timestreamwrite/v1beta2/table + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-east-2 diff --git a/examples/transcribe/v1beta2/languagemodel.yaml b/examples/transcribe/v1beta2/languagemodel.yaml new file mode 100644 index 0000000000..32b82c4688 --- /dev/null +++ b/examples/transcribe/v1beta2/languagemodel.yaml @@ -0,0 +1,133 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: transcribe.aws.upbound.io/v1beta2 +kind: LanguageModel +metadata: + annotations: + meta.upbound.io/example-id: transcribe/v1beta2/languagemodel + upjet.upbound.io/manual-intervention: It requires file to be uploaded manually + on s3. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + baseModelName: NarrowBand + inputDataConfig: + dataAccessRoleArnSelector: + matchLabels: + testing.upbound.io/example-name: example + s3Uri: s3://test-channel-bucket/transcribe/ + languageCode: en-US + region: us-east-1 + tags: + ENVIRONMENT: development + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + annotations: + meta.upbound.io/example-id: transcribe/v1beta2/languagemodel + labels: + testing.upbound.io/example-name: example + name: test-role +spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": "sts:AssumeRole", + "Principal": { + "Service": "transcribe.amazonaws.com" + }, + "Effect": "Allow", + "Sid": "" + } + ] + } + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Bucket +metadata: + annotations: + crossplane.io/external-name: test-channel-bucket + meta.upbound.io/example-id: transcribe/v1beta2/languagemodel + labels: + testing.upbound.io/example-name: example + name: test-channel-bucket +spec: + forProvider: + forceDestroy: true + region: us-east-1 + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Policy +metadata: + annotations: + meta.upbound.io/example-id: transcribe/v1beta2/languagemodel + labels: + testing.upbound.io/example-name: example + name: test-policy +spec: + forProvider: + policy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Action": [ + "s3:*" + ], + "Effect": "Allow", + "Resource": [ + "arn:aws:s3:::test-channel-bucket", + "arn:aws:s3:::test-channel-bucket/*" + ] + } + ] + } + +--- + +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + annotations: + meta.upbound.io/example-id: transcribe/v1beta2/languagemodel + labels: + testing.upbound.io/example-name: example + name: test-attach +spec: + forProvider: + policyArnRef: + name: test-policy + roleRef: + name: test-role + +--- + +apiVersion: s3.aws.upbound.io/v1beta2 +kind: Object +metadata: + annotations: + meta.upbound.io/example-id: transcribe/v1beta2/languagemodel + labels: + testing.upbound.io/example-name: object + name: object +spec: + forProvider: + bucketSelector: + matchLabels: + testing.upbound.io/example-name: example + key: transcribe/test1.txt + region: us-east-1 diff --git a/examples/transfer/v1beta2/server.yaml b/examples/transfer/v1beta2/server.yaml new file mode 100644 index 0000000000..04be93c1c7 --- /dev/null +++ b/examples/transfer/v1beta2/server.yaml @@ -0,0 +1,15 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: transfer.aws.upbound.io/v1beta2 +kind: Server +metadata: + annotations: + meta.upbound.io/example-id: transfer/v1beta2/server + name: example +spec: + forProvider: + region: us-west-1 + tags: + Name: Example diff --git a/examples/transfer/v1beta2/user.yaml b/examples/transfer/v1beta2/user.yaml new file mode 100644 index 0000000000..b81f7b8fe4 --- /dev/null +++ b/examples/transfer/v1beta2/user.yaml @@ -0,0 +1,21 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: transfer.aws.upbound.io/v1beta2 +kind: User +metadata: + annotations: + meta.upbound.io/example-id: transfer/v1beta2/user + name: example +spec: + forProvider: + homeDirectoryMappings: + - entry: /test.pdf + target: /bucket3/test-path/tftestuser.pdf + homeDirectoryType: LOGICAL + region: us-west-1 + roleRef: + name: example + serverIdRef: + name: example diff --git a/examples/transfer/v1beta2/workflow.yaml b/examples/transfer/v1beta2/workflow.yaml new file mode 100644 index 0000000000..ce7e5c5924 --- /dev/null +++ b/examples/transfer/v1beta2/workflow.yaml @@ -0,0 +1,21 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: transfer.aws.upbound.io/v1beta2 +kind: Workflow +metadata: + annotations: + meta.upbound.io/example-id: transfer/v1beta2/workflow + upjet.upbound.io/manual-intervention: This resource manual intervention due to + Uptest failed without any errors. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + region: us-west-1 + steps: + - deleteStepDetails: + name: example + type: DELETE diff --git a/examples/waf/v1beta2/bytematchset.yaml b/examples/waf/v1beta2/bytematchset.yaml new file mode 100644 index 0000000000..763202d86f --- /dev/null +++ b/examples/waf/v1beta2/bytematchset.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: waf.aws.upbound.io/v1beta2 +kind: ByteMatchSet +metadata: + annotations: + meta.upbound.io/example-id: waf/v1beta2/bytematchset + labels: + testing.upbound.io/example-name: byte_set + name: byte-set +spec: + forProvider: + byteMatchTuples: + - fieldToMatch: + data: referer + type: HEADER + positionalConstraint: CONTAINS + targetString: badrefer1 + textTransformation: NONE + name: tf_waf_byte_match_set + region: us-west-1 diff --git a/examples/waf/v1beta2/regexmatchset.yaml b/examples/waf/v1beta2/regexmatchset.yaml new file mode 100644 index 0000000000..001ff1f962 --- /dev/null +++ b/examples/waf/v1beta2/regexmatchset.yaml @@ -0,0 +1,42 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: waf.aws.upbound.io/v1beta2 +kind: RegexMatchSet +metadata: + annotations: + meta.upbound.io/example-id: waf/v1beta2/regexmatchset + labels: + testing.upbound.io/example-name: regex_match_set + name: regex-match-set +spec: + forProvider: + name: regex_match_set + regexMatchTuple: + - fieldToMatch: + data: User-Agent + type: HEADER + regexPatternSetIdSelector: + matchLabels: + testing.upbound.io/example-name: regex_pattern_set + textTransformation: NONE + region: us-west-1 + +--- + +apiVersion: waf.aws.upbound.io/v1beta1 +kind: RegexPatternSet +metadata: + annotations: + meta.upbound.io/example-id: waf/v1beta2/regexmatchset + labels: + testing.upbound.io/example-name: regex_pattern_set + name: regex-pattern-set +spec: + forProvider: + name: tf_waf_regex_pattern_set + regexPatternStrings: + - one + - two + region: us-west-1 diff --git a/examples/waf/v1beta2/sizeconstraintset.yaml b/examples/waf/v1beta2/sizeconstraintset.yaml new file mode 100644 index 0000000000..fc64f7c903 --- /dev/null +++ b/examples/waf/v1beta2/sizeconstraintset.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: waf.aws.upbound.io/v1beta2 +kind: SizeConstraintSet +metadata: + annotations: + meta.upbound.io/example-id: waf/v1beta2/sizeconstraintset + labels: + testing.upbound.io/example-name: size_constraint_set + name: size-constraint-set +spec: + forProvider: + name: tfsize_constraints + region: us-west-1 + sizeConstraints: + - comparisonOperator: EQ + fieldToMatch: + type: BODY + size: 4096 + textTransformation: NONE diff --git a/examples/waf/v1beta2/sqlinjectionmatchset.yaml b/examples/waf/v1beta2/sqlinjectionmatchset.yaml new file mode 100644 index 0000000000..5f01e99f11 --- /dev/null +++ b/examples/waf/v1beta2/sqlinjectionmatchset.yaml @@ -0,0 +1,20 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: waf.aws.upbound.io/v1beta2 +kind: SQLInjectionMatchSet +metadata: + annotations: + meta.upbound.io/example-id: waf/v1beta2/sqlinjectionmatchset + labels: + testing.upbound.io/example-name: sql_injection_match_set + name: sql-injection-match-set +spec: + forProvider: + name: tf-sql_injection_match_set + region: us-west-1 + sqlInjectionMatchTuples: + - fieldToMatch: + type: QUERY_STRING + textTransformation: URL_DECODE diff --git a/examples/waf/v1beta2/webacl.yaml b/examples/waf/v1beta2/webacl.yaml new file mode 100644 index 0000000000..89b387c2ee --- /dev/null +++ b/examples/waf/v1beta2/webacl.yaml @@ -0,0 +1,67 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: waf.aws.upbound.io/v1beta2 +kind: WebACL +metadata: + annotations: + meta.upbound.io/example-id: waf/v1beta2/webacl + labels: + testing.upbound.io/example-name: waf_acl + name: waf-acl +spec: + forProvider: + defaultAction: + type: ALLOW + metricName: tfWebACL + name: tfWebACL + region: us-west-1 + rules: + - action: + type: BLOCK + priority: 1 + ruleIdSelector: + matchLabels: + testing.upbound.io/example-name: wafrule + type: REGULAR + +--- + +apiVersion: waf.aws.upbound.io/v1beta1 +kind: IPSet +metadata: + annotations: + meta.upbound.io/example-id: waf/v1beta2/webacl + labels: + testing.upbound.io/example-name: ipset + name: ipset +spec: + forProvider: + ipSetDescriptors: + - type: IPV4 + value: 192.0.2.44/32 + name: tfIPSet + region: us-west-1 + +--- + +apiVersion: waf.aws.upbound.io/v1beta1 +kind: Rule +metadata: + annotations: + meta.upbound.io/example-id: waf/v1beta2/webacl + labels: + testing.upbound.io/example-name: wafrule + name: wafrule +spec: + forProvider: + metricName: tfWAFRule + name: tfWAFRule + predicates: + - dataIdSelector: + matchLabels: + testing.upbound.io/example-name: ipset + negated: false + type: IPMatch + region: us-west-1 diff --git a/examples/waf/v1beta2/xssmatchset.yaml b/examples/waf/v1beta2/xssmatchset.yaml new file mode 100644 index 0000000000..90000058eb --- /dev/null +++ b/examples/waf/v1beta2/xssmatchset.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: waf.aws.upbound.io/v1beta2 +kind: XSSMatchSet +metadata: + annotations: + meta.upbound.io/example-id: waf/v1beta2/xssmatchset + labels: + testing.upbound.io/example-name: xss_match_set + name: xss-match-set +spec: + forProvider: + name: xss_match_set + region: us-west-1 + xssMatchTuples: + - fieldToMatch: + type: URI + textTransformation: NONE + - fieldToMatch: + type: QUERY_STRING + textTransformation: NONE diff --git a/examples/wafregional/v1beta2/bytematchset.yaml b/examples/wafregional/v1beta2/bytematchset.yaml new file mode 100644 index 0000000000..49043aa9f7 --- /dev/null +++ b/examples/wafregional/v1beta2/bytematchset.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: wafregional.aws.upbound.io/v1beta2 +kind: ByteMatchSet +metadata: + annotations: + meta.upbound.io/example-id: wafregional/v1beta2/bytematchset + labels: + testing.upbound.io/example-name: byte_set + name: byte-set +spec: + forProvider: + byteMatchTuples: + - fieldToMatch: + data: referer + type: HEADER + positionalConstraint: CONTAINS + targetString: badrefer1 + textTransformation: NONE + name: tf_waf_byte_match_set + region: us-west-1 diff --git a/examples/wafregional/v1beta2/regexmatchset.yaml b/examples/wafregional/v1beta2/regexmatchset.yaml new file mode 100644 index 0000000000..606ebc8978 --- /dev/null +++ b/examples/wafregional/v1beta2/regexmatchset.yaml @@ -0,0 +1,42 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: wafregional.aws.upbound.io/v1beta2 +kind: RegexMatchSet +metadata: + annotations: + meta.upbound.io/example-id: wafregional/v1beta2/regexmatchset + labels: + testing.upbound.io/example-name: regex_match_set + name: regex-match-set +spec: + forProvider: + name: regex-match-set + regexMatchTuple: + - fieldToMatch: + data: User-Agent + type: HEADER + regexPatternSetIdSelector: + matchLabels: + testing.upbound.io/example-name: regex_pattern_set + textTransformation: NONE + region: us-west-1 + +--- + +apiVersion: wafregional.aws.upbound.io/v1beta1 +kind: RegexPatternSet +metadata: + annotations: + meta.upbound.io/example-id: wafregional/v1beta2/regexmatchset + labels: + testing.upbound.io/example-name: regex_pattern_set + name: regex-pattern-set +spec: + forProvider: + name: regex-pattern-set + regexPatternStrings: + - one + - two + region: us-west-1 diff --git a/examples/wafregional/v1beta2/sizeconstraintset.yaml b/examples/wafregional/v1beta2/sizeconstraintset.yaml new file mode 100644 index 0000000000..f802e349af --- /dev/null +++ b/examples/wafregional/v1beta2/sizeconstraintset.yaml @@ -0,0 +1,22 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: wafregional.aws.upbound.io/v1beta2 +kind: SizeConstraintSet +metadata: + annotations: + meta.upbound.io/example-id: wafregional/v1beta2/sizeconstraintset + labels: + testing.upbound.io/example-name: size_constraint_set + name: size-constraint-set +spec: + forProvider: + name: tfsize_constraints + region: us-west-1 + sizeConstraints: + - comparisonOperator: EQ + fieldToMatch: + type: BODY + size: 4096 + textTransformation: NONE diff --git a/examples/wafregional/v1beta2/sqlinjectionmatchset.yaml b/examples/wafregional/v1beta2/sqlinjectionmatchset.yaml new file mode 100644 index 0000000000..f27a55aa95 --- /dev/null +++ b/examples/wafregional/v1beta2/sqlinjectionmatchset.yaml @@ -0,0 +1,20 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: wafregional.aws.upbound.io/v1beta2 +kind: SQLInjectionMatchSet +metadata: + annotations: + meta.upbound.io/example-id: wafregional/v1beta2/sqlinjectionmatchset + labels: + testing.upbound.io/example-name: sql_injection_match_set + name: sql-injection-match-set +spec: + forProvider: + name: tf-sql_injection_match_set + region: us-west-1 + sqlInjectionMatchTuple: + - fieldToMatch: + type: QUERY_STRING + textTransformation: URL_DECODE diff --git a/examples/wafregional/v1beta2/webacl.yaml b/examples/wafregional/v1beta2/webacl.yaml new file mode 100644 index 0000000000..abbf00e7e6 --- /dev/null +++ b/examples/wafregional/v1beta2/webacl.yaml @@ -0,0 +1,67 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: wafregional.aws.upbound.io/v1beta2 +kind: WebACL +metadata: + annotations: + meta.upbound.io/example-id: wafregional/v1beta2/webacl + labels: + testing.upbound.io/example-name: wafacl + name: wafacl +spec: + forProvider: + defaultAction: + type: ALLOW + metricName: tfWebACL + name: tfWebACL + region: us-west-1 + rule: + - action: + type: BLOCK + priority: 1 + ruleIdSelector: + matchLabels: + testing.upbound.io/example-name: wafrule + type: REGULAR + +--- + +apiVersion: wafregional.aws.upbound.io/v1beta1 +kind: IPSet +metadata: + annotations: + meta.upbound.io/example-id: wafregional/v1beta2/webacl + labels: + testing.upbound.io/example-name: ipset + name: ipset +spec: + forProvider: + ipSetDescriptor: + - type: IPV4 + value: 192.0.2.44/32 + name: tfIPSet + region: us-west-1 + +--- + +apiVersion: wafregional.aws.upbound.io/v1beta1 +kind: Rule +metadata: + annotations: + meta.upbound.io/example-id: wafregional/v1beta2/webacl + labels: + testing.upbound.io/example-name: wafrule + name: wafrule +spec: + forProvider: + metricName: tfWAFRule + name: tfWAFRule + predicate: + - dataIdSelector: + matchLabels: + testing.upbound.io/example-name: ipset + negated: false + type: IPMatch + region: us-west-1 diff --git a/examples/wafregional/v1beta2/xssmatchset.yaml b/examples/wafregional/v1beta2/xssmatchset.yaml new file mode 100644 index 0000000000..c6ef80302d --- /dev/null +++ b/examples/wafregional/v1beta2/xssmatchset.yaml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: wafregional.aws.upbound.io/v1beta2 +kind: XSSMatchSet +metadata: + annotations: + meta.upbound.io/example-id: wafregional/v1beta2/xssmatchset + labels: + testing.upbound.io/example-name: xss_match_set + name: xss-match-set +spec: + forProvider: + name: xss_match_set + region: us-west-1 + xssMatchTuple: + - fieldToMatch: + type: URI + textTransformation: NONE + - fieldToMatch: + type: QUERY_STRING + textTransformation: NONE diff --git a/examples/workspaces/v1beta2/directory.yaml b/examples/workspaces/v1beta2/directory.yaml new file mode 100644 index 0000000000..e6848bc2ae --- /dev/null +++ b/examples/workspaces/v1beta2/directory.yaml @@ -0,0 +1,196 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: workspaces.aws.upbound.io/v1beta2 +kind: Directory +metadata: + annotations: + meta.upbound.io/example-id: workspaces/v1beta2/directory + upjet.upbound.io/manual-intervention: Requires IAM role with name workspaces_DefaultRole + to operate normally. We could not create role with name workspaces_DefaultRole + automatically, this name is not meet regex. + uptest.upbound.io/timeout: "3600" + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + directoryIdSelector: + matchLabels: + testing.upbound.io/example-name: example + region: us-east-1 + selfServicePermissions: + changeComputeType: true + increaseVolumeSize: true + rebuildWorkspace: true + restartWorkspace: true + switchRunningMode: true + subnetIdRefs: + - name: example-c + - name: example-d + workspaceAccessProperties: + deviceTypeAndroid: ALLOW + deviceTypeChromeos: ALLOW + deviceTypeIos: ALLOW + deviceTypeLinux: DENY + deviceTypeWeb: DENY + deviceTypeZeroclient: DENY + workspaceCreationProperties: + enableInternetAccess: true + enableMaintenanceMode: true + userEnabledAsLocalAdministrator: true + +--- + +apiVersion: ds.aws.upbound.io/v1beta2 +kind: Directory +metadata: + annotations: + meta.upbound.io/example-id: workspaces/v1beta2/directory + upjet.upbound.io/manual-intervention: Requires IAM role with name workspaces_DefaultRole + to operate normally. We could not create role with name workspaces_DefaultRole + automatically, this name is not meet regex. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + name: corp.example.com + passwordSecretRef: + key: example-key + name: example-secret + namespace: upbound-system + region: us-east-1 + size: Small + vpcSettings: + subnetIdsRefs: + - name: example-a + - name: example-b + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: workspaces/v1beta2/directory + upjet.upbound.io/manual-intervention: Requires IAM role with name workspaces_DefaultRole + to operate normally. We could not create role with name workspaces_DefaultRole + automatically, this name is not meet regex. + labels: + testing.upbound.io/example-name: example_a + name: example-a +spec: + forProvider: + availabilityZone: us-east-1a + cidrBlock: 10.0.0.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: workspaces/v1beta2/directory + upjet.upbound.io/manual-intervention: Requires IAM role with name workspaces_DefaultRole + to operate normally. We could not create role with name workspaces_DefaultRole + automatically, this name is not meet regex. + labels: + testing.upbound.io/example-name: example_b + name: example-b +spec: + forProvider: + availabilityZone: us-east-1b + cidrBlock: 10.0.1.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: workspaces/v1beta2/directory + upjet.upbound.io/manual-intervention: Requires IAM role with name workspaces_DefaultRole + to operate normally. We could not create role with name workspaces_DefaultRole + automatically, this name is not meet regex. + labels: + testing.upbound.io/example-name: example_c + name: example-c +spec: + forProvider: + availabilityZone: us-east-1a + cidrBlock: 10.0.2.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + annotations: + meta.upbound.io/example-id: workspaces/v1beta2/directory + upjet.upbound.io/manual-intervention: Requires IAM role with name workspaces_DefaultRole + to operate normally. We could not create role with name workspaces_DefaultRole + automatically, this name is not meet regex. + labels: + testing.upbound.io/example-name: example_d + name: example-d +spec: + forProvider: + availabilityZone: us-east-1b + cidrBlock: 10.0.3.0/24 + region: us-east-1 + vpcIdSelector: + matchLabels: + testing.upbound.io/example-name: example + +--- + +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + annotations: + meta.upbound.io/example-id: workspaces/v1beta2/directory + upjet.upbound.io/manual-intervention: Requires IAM role with name workspaces_DefaultRole + to operate normally. We could not create role with name workspaces_DefaultRole + automatically, this name is not meet regex. + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + cidrBlock: 10.0.0.0/16 + region: us-east-1 + +--- + +apiVersion: v1 +kind: Secret +metadata: + annotations: + meta.upbound.io/example-id: workspaces/v1beta1/directory + upjet.upbound.io/manual-intervention: Requires IAM role with name workspaces_DefaultRole + to operate normally. We could not create role with name workspaces_DefaultRole + automatically, this name is not meet regex. + labels: + testing.upbound.io/example-name: secret-version + name: example-secret + namespace: upbound-system +stringData: + example-key: P@ssw0rd +type: Opaque diff --git a/examples/xray/v1beta2/group.yaml b/examples/xray/v1beta2/group.yaml new file mode 100644 index 0000000000..d1a9ae65ee --- /dev/null +++ b/examples/xray/v1beta2/group.yaml @@ -0,0 +1,20 @@ +# SPDX-FileCopyrightText: 2024 The Crossplane Authors +# +# SPDX-License-Identifier: Apache-2.0 + +apiVersion: xray.aws.upbound.io/v1beta2 +kind: Group +metadata: + annotations: + meta.upbound.io/example-id: xray/v1beta2/group + labels: + testing.upbound.io/example-name: example + name: example +spec: + forProvider: + filterExpression: responsetime > 5 + groupName: example + insightsConfiguration: + insightsEnabled: true + notificationsEnabled: true + region: us-west-1