From 782b91654764bf594c239ed8dc952a1cd1042e58 Mon Sep 17 00:00:00 2001 From: Christian Artin Date: Thu, 30 May 2024 17:09:04 -0400 Subject: [PATCH 1/4] Replace gopkg.in/alecthomas/kingpin.v2 by github.com/alecthomas/kingpin/v2 Signed-off-by: Christian Artin --- cmd/generator/main.go | 2 +- cmd/provider/alertsmanagement/zz_main.go | 2 +- cmd/provider/analysisservices/zz_main.go | 2 +- cmd/provider/apimanagement/zz_main.go | 2 +- cmd/provider/appconfiguration/zz_main.go | 2 +- cmd/provider/appplatform/zz_main.go | 2 +- cmd/provider/attestation/zz_main.go | 2 +- cmd/provider/authorization/zz_main.go | 2 +- cmd/provider/automation/zz_main.go | 2 +- cmd/provider/azure/zz_main.go | 2 +- cmd/provider/azurestackhci/zz_main.go | 2 +- cmd/provider/botservice/zz_main.go | 2 +- cmd/provider/cache/zz_main.go | 2 +- cmd/provider/cdn/zz_main.go | 2 +- .../certificateregistration/zz_main.go | 2 +- cmd/provider/cognitiveservices/zz_main.go | 2 +- cmd/provider/communication/zz_main.go | 2 +- cmd/provider/compute/zz_main.go | 2 +- cmd/provider/confidentialledger/zz_main.go | 2 +- cmd/provider/config/zz_main.go | 2 +- cmd/provider/consumption/zz_main.go | 2 +- cmd/provider/containerapp/zz_main.go | 2 +- cmd/provider/containerregistry/zz_main.go | 2 +- cmd/provider/containerservice/zz_main.go | 2 +- cmd/provider/cosmosdb/zz_main.go | 2 +- cmd/provider/costmanagement/zz_main.go | 2 +- cmd/provider/customproviders/zz_main.go | 2 +- cmd/provider/databoxedge/zz_main.go | 2 +- cmd/provider/databricks/zz_main.go | 2 +- cmd/provider/datafactory/zz_main.go | 2 +- cmd/provider/datamigration/zz_main.go | 2 +- cmd/provider/dataprotection/zz_main.go | 2 +- cmd/provider/datashare/zz_main.go | 2 +- cmd/provider/dbformariadb/zz_main.go | 2 +- cmd/provider/dbformysql/zz_main.go | 2 +- cmd/provider/dbforpostgresql/zz_main.go | 2 +- cmd/provider/devices/zz_main.go | 2 +- cmd/provider/deviceupdate/zz_main.go | 2 +- cmd/provider/devtestlab/zz_main.go | 2 +- cmd/provider/digitaltwins/zz_main.go | 2 +- cmd/provider/elastic/zz_main.go | 2 +- cmd/provider/eventgrid/zz_main.go | 2 +- cmd/provider/eventhub/zz_main.go | 2 +- cmd/provider/fluidrelay/zz_main.go | 2 +- cmd/provider/guestconfiguration/zz_main.go | 2 +- cmd/provider/hdinsight/zz_main.go | 2 +- cmd/provider/healthbot/zz_main.go | 2 +- cmd/provider/healthcareapis/zz_main.go | 2 +- cmd/provider/insights/zz_main.go | 2 +- cmd/provider/iotcentral/zz_main.go | 2 +- cmd/provider/keyvault/zz_main.go | 2 +- cmd/provider/kusto/zz_main.go | 2 +- cmd/provider/labservices/zz_main.go | 2 +- cmd/provider/loadtestservice/zz_main.go | 2 +- cmd/provider/logic/zz_main.go | 2 +- cmd/provider/logz/zz_main.go | 2 +- .../machinelearningservices/zz_main.go | 2 +- cmd/provider/maintenance/zz_main.go | 2 +- cmd/provider/managedidentity/zz_main.go | 2 +- cmd/provider/management/zz_main.go | 2 +- cmd/provider/maps/zz_main.go | 2 +- cmd/provider/marketplaceordering/zz_main.go | 2 +- cmd/provider/media/zz_main.go | 2 +- cmd/provider/mixedreality/zz_main.go | 2 +- cmd/provider/monolith/zz_main.go | 2 +- cmd/provider/netapp/zz_main.go | 2 +- cmd/provider/network/zz_main.go | 2 +- cmd/provider/notificationhubs/zz_main.go | 2 +- cmd/provider/operationalinsights/zz_main.go | 2 +- cmd/provider/operationsmanagement/zz_main.go | 2 +- cmd/provider/orbital/zz_main.go | 2 +- cmd/provider/policyinsights/zz_main.go | 2 +- cmd/provider/portal/zz_main.go | 2 +- cmd/provider/powerbidedicated/zz_main.go | 2 +- cmd/provider/purview/zz_main.go | 2 +- cmd/provider/recoveryservices/zz_main.go | 2 +- cmd/provider/relay/zz_main.go | 2 +- cmd/provider/resources/zz_main.go | 2 +- cmd/provider/search/zz_main.go | 2 +- cmd/provider/security/zz_main.go | 2 +- cmd/provider/securityinsights/zz_main.go | 2 +- cmd/provider/servicebus/zz_main.go | 2 +- cmd/provider/servicefabric/zz_main.go | 2 +- cmd/provider/servicelinker/zz_main.go | 2 +- cmd/provider/signalrservice/zz_main.go | 2 +- cmd/provider/solutions/zz_main.go | 2 +- cmd/provider/spring/zz_main.go | 2 +- cmd/provider/sql/zz_main.go | 2 +- cmd/provider/storage/zz_main.go | 2 +- cmd/provider/storagecache/zz_main.go | 2 +- cmd/provider/storagepool/zz_main.go | 2 +- cmd/provider/storagesync/zz_main.go | 2 +- cmd/provider/streamanalytics/zz_main.go | 2 +- cmd/provider/synapse/zz_main.go | 2 +- cmd/provider/timeseriesinsights/zz_main.go | 2 +- cmd/provider/web/zz_main.go | 2 +- go.mod | 12 ++++++----- go.sum | 20 +++++++++++-------- hack/main.go.tmpl | 2 +- 99 files changed, 116 insertions(+), 110 deletions(-) diff --git a/cmd/generator/main.go b/cmd/generator/main.go index 6913875d3..60648aadd 100644 --- a/cmd/generator/main.go +++ b/cmd/generator/main.go @@ -13,9 +13,9 @@ import ( "sort" "strings" + "github.com/alecthomas/kingpin/v2" ujconfig "github.com/crossplane/upjet/pkg/config" "github.com/crossplane/upjet/pkg/pipeline" - "gopkg.in/alecthomas/kingpin.v2" "github.com/upbound/provider-azure/config" ) diff --git a/cmd/provider/alertsmanagement/zz_main.go b/cmd/provider/alertsmanagement/zz_main.go index dd5690c89..ac513d978 100644 --- a/cmd/provider/alertsmanagement/zz_main.go +++ b/cmd/provider/alertsmanagement/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/analysisservices/zz_main.go b/cmd/provider/analysisservices/zz_main.go index ff4f3959a..18e7d95e1 100644 --- a/cmd/provider/analysisservices/zz_main.go +++ b/cmd/provider/analysisservices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/apimanagement/zz_main.go b/cmd/provider/apimanagement/zz_main.go index 17cc26237..7601a25f5 100644 --- a/cmd/provider/apimanagement/zz_main.go +++ b/cmd/provider/apimanagement/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/appconfiguration/zz_main.go b/cmd/provider/appconfiguration/zz_main.go index 1ec58c1b8..538106a0a 100644 --- a/cmd/provider/appconfiguration/zz_main.go +++ b/cmd/provider/appconfiguration/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/appplatform/zz_main.go b/cmd/provider/appplatform/zz_main.go index 9e68e142e..4273c62d9 100644 --- a/cmd/provider/appplatform/zz_main.go +++ b/cmd/provider/appplatform/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/attestation/zz_main.go b/cmd/provider/attestation/zz_main.go index c0f7b8ae0..430944721 100644 --- a/cmd/provider/attestation/zz_main.go +++ b/cmd/provider/attestation/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/authorization/zz_main.go b/cmd/provider/authorization/zz_main.go index 17a5bb78b..ba35133cb 100644 --- a/cmd/provider/authorization/zz_main.go +++ b/cmd/provider/authorization/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/automation/zz_main.go b/cmd/provider/automation/zz_main.go index 605abee4f..0dc1b2c99 100644 --- a/cmd/provider/automation/zz_main.go +++ b/cmd/provider/automation/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/azure/zz_main.go b/cmd/provider/azure/zz_main.go index 31c2a55b8..f0134a90c 100644 --- a/cmd/provider/azure/zz_main.go +++ b/cmd/provider/azure/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/azurestackhci/zz_main.go b/cmd/provider/azurestackhci/zz_main.go index d7bfe44da..f949d6d80 100644 --- a/cmd/provider/azurestackhci/zz_main.go +++ b/cmd/provider/azurestackhci/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/botservice/zz_main.go b/cmd/provider/botservice/zz_main.go index cbf8793ca..2156c356e 100644 --- a/cmd/provider/botservice/zz_main.go +++ b/cmd/provider/botservice/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cache/zz_main.go b/cmd/provider/cache/zz_main.go index 67a7f0c4e..b12148a2b 100644 --- a/cmd/provider/cache/zz_main.go +++ b/cmd/provider/cache/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cdn/zz_main.go b/cmd/provider/cdn/zz_main.go index ff150e320..6a5cb964a 100644 --- a/cmd/provider/cdn/zz_main.go +++ b/cmd/provider/cdn/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/certificateregistration/zz_main.go b/cmd/provider/certificateregistration/zz_main.go index eb8c9377e..46ce17e9c 100644 --- a/cmd/provider/certificateregistration/zz_main.go +++ b/cmd/provider/certificateregistration/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cognitiveservices/zz_main.go b/cmd/provider/cognitiveservices/zz_main.go index a01dbefa3..abfe4e3d5 100644 --- a/cmd/provider/cognitiveservices/zz_main.go +++ b/cmd/provider/cognitiveservices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/communication/zz_main.go b/cmd/provider/communication/zz_main.go index d1af16665..9c33139fd 100644 --- a/cmd/provider/communication/zz_main.go +++ b/cmd/provider/communication/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/compute/zz_main.go b/cmd/provider/compute/zz_main.go index d42557002..f28f910af 100644 --- a/cmd/provider/compute/zz_main.go +++ b/cmd/provider/compute/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/confidentialledger/zz_main.go b/cmd/provider/confidentialledger/zz_main.go index 71308fd03..485a282a1 100644 --- a/cmd/provider/confidentialledger/zz_main.go +++ b/cmd/provider/confidentialledger/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/config/zz_main.go b/cmd/provider/config/zz_main.go index 7e43a46bc..32e4e07b9 100644 --- a/cmd/provider/config/zz_main.go +++ b/cmd/provider/config/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/consumption/zz_main.go b/cmd/provider/consumption/zz_main.go index 3aa326ad6..b9bb2ac7d 100644 --- a/cmd/provider/consumption/zz_main.go +++ b/cmd/provider/consumption/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/containerapp/zz_main.go b/cmd/provider/containerapp/zz_main.go index a855069aa..c2bfe899d 100644 --- a/cmd/provider/containerapp/zz_main.go +++ b/cmd/provider/containerapp/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/containerregistry/zz_main.go b/cmd/provider/containerregistry/zz_main.go index 21f6248e5..11cf9f353 100644 --- a/cmd/provider/containerregistry/zz_main.go +++ b/cmd/provider/containerregistry/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/containerservice/zz_main.go b/cmd/provider/containerservice/zz_main.go index 93f6de924..ba85ad517 100644 --- a/cmd/provider/containerservice/zz_main.go +++ b/cmd/provider/containerservice/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cosmosdb/zz_main.go b/cmd/provider/cosmosdb/zz_main.go index 121d168fc..e1448e7c2 100644 --- a/cmd/provider/cosmosdb/zz_main.go +++ b/cmd/provider/cosmosdb/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/costmanagement/zz_main.go b/cmd/provider/costmanagement/zz_main.go index 16ee9302f..9d398bd74 100644 --- a/cmd/provider/costmanagement/zz_main.go +++ b/cmd/provider/costmanagement/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/customproviders/zz_main.go b/cmd/provider/customproviders/zz_main.go index e03ab07b3..56e366872 100644 --- a/cmd/provider/customproviders/zz_main.go +++ b/cmd/provider/customproviders/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/databoxedge/zz_main.go b/cmd/provider/databoxedge/zz_main.go index ff9638d6f..6f85633f9 100644 --- a/cmd/provider/databoxedge/zz_main.go +++ b/cmd/provider/databoxedge/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/databricks/zz_main.go b/cmd/provider/databricks/zz_main.go index 56a4dcaad..53b0dea6d 100644 --- a/cmd/provider/databricks/zz_main.go +++ b/cmd/provider/databricks/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/datafactory/zz_main.go b/cmd/provider/datafactory/zz_main.go index d2c357901..32c6ae161 100644 --- a/cmd/provider/datafactory/zz_main.go +++ b/cmd/provider/datafactory/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/datamigration/zz_main.go b/cmd/provider/datamigration/zz_main.go index 44ea4fb5c..a1943d0ad 100644 --- a/cmd/provider/datamigration/zz_main.go +++ b/cmd/provider/datamigration/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dataprotection/zz_main.go b/cmd/provider/dataprotection/zz_main.go index 085e0408a..0a6af2cee 100644 --- a/cmd/provider/dataprotection/zz_main.go +++ b/cmd/provider/dataprotection/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/datashare/zz_main.go b/cmd/provider/datashare/zz_main.go index 4d72c2533..de1b1eaf8 100644 --- a/cmd/provider/datashare/zz_main.go +++ b/cmd/provider/datashare/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dbformariadb/zz_main.go b/cmd/provider/dbformariadb/zz_main.go index a58b84310..86725a8ae 100644 --- a/cmd/provider/dbformariadb/zz_main.go +++ b/cmd/provider/dbformariadb/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dbformysql/zz_main.go b/cmd/provider/dbformysql/zz_main.go index a07056585..d9668f1d9 100644 --- a/cmd/provider/dbformysql/zz_main.go +++ b/cmd/provider/dbformysql/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dbforpostgresql/zz_main.go b/cmd/provider/dbforpostgresql/zz_main.go index 5b06b88c5..e788b11e2 100644 --- a/cmd/provider/dbforpostgresql/zz_main.go +++ b/cmd/provider/dbforpostgresql/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/devices/zz_main.go b/cmd/provider/devices/zz_main.go index efef64985..d1e5edd78 100644 --- a/cmd/provider/devices/zz_main.go +++ b/cmd/provider/devices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/deviceupdate/zz_main.go b/cmd/provider/deviceupdate/zz_main.go index 907359685..dd8600023 100644 --- a/cmd/provider/deviceupdate/zz_main.go +++ b/cmd/provider/deviceupdate/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/devtestlab/zz_main.go b/cmd/provider/devtestlab/zz_main.go index f80b3e90c..21cb82757 100644 --- a/cmd/provider/devtestlab/zz_main.go +++ b/cmd/provider/devtestlab/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/digitaltwins/zz_main.go b/cmd/provider/digitaltwins/zz_main.go index 7280a9e0c..601dd07d4 100644 --- a/cmd/provider/digitaltwins/zz_main.go +++ b/cmd/provider/digitaltwins/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/elastic/zz_main.go b/cmd/provider/elastic/zz_main.go index ee85400f2..5e9fac609 100644 --- a/cmd/provider/elastic/zz_main.go +++ b/cmd/provider/elastic/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/eventgrid/zz_main.go b/cmd/provider/eventgrid/zz_main.go index 402d7a4ee..6398f12e3 100644 --- a/cmd/provider/eventgrid/zz_main.go +++ b/cmd/provider/eventgrid/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/eventhub/zz_main.go b/cmd/provider/eventhub/zz_main.go index 737bbaa46..bef3eb4ee 100644 --- a/cmd/provider/eventhub/zz_main.go +++ b/cmd/provider/eventhub/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/fluidrelay/zz_main.go b/cmd/provider/fluidrelay/zz_main.go index d0c22beb9..4c78ab9b1 100644 --- a/cmd/provider/fluidrelay/zz_main.go +++ b/cmd/provider/fluidrelay/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/guestconfiguration/zz_main.go b/cmd/provider/guestconfiguration/zz_main.go index de5bd7f1b..326748a40 100644 --- a/cmd/provider/guestconfiguration/zz_main.go +++ b/cmd/provider/guestconfiguration/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/hdinsight/zz_main.go b/cmd/provider/hdinsight/zz_main.go index 9c383ab9c..ad717c82b 100644 --- a/cmd/provider/hdinsight/zz_main.go +++ b/cmd/provider/hdinsight/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/healthbot/zz_main.go b/cmd/provider/healthbot/zz_main.go index 2cf40e2b6..b3a8fb9d1 100644 --- a/cmd/provider/healthbot/zz_main.go +++ b/cmd/provider/healthbot/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/healthcareapis/zz_main.go b/cmd/provider/healthcareapis/zz_main.go index e02f72e5d..2b8cb555b 100644 --- a/cmd/provider/healthcareapis/zz_main.go +++ b/cmd/provider/healthcareapis/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/insights/zz_main.go b/cmd/provider/insights/zz_main.go index 8f1e50a9d..444259f4c 100644 --- a/cmd/provider/insights/zz_main.go +++ b/cmd/provider/insights/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/iotcentral/zz_main.go b/cmd/provider/iotcentral/zz_main.go index 9f0e50178..194532a9f 100644 --- a/cmd/provider/iotcentral/zz_main.go +++ b/cmd/provider/iotcentral/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/keyvault/zz_main.go b/cmd/provider/keyvault/zz_main.go index 317cbd7a3..6811bdade 100644 --- a/cmd/provider/keyvault/zz_main.go +++ b/cmd/provider/keyvault/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/kusto/zz_main.go b/cmd/provider/kusto/zz_main.go index e48d591fd..d393e3be4 100644 --- a/cmd/provider/kusto/zz_main.go +++ b/cmd/provider/kusto/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/labservices/zz_main.go b/cmd/provider/labservices/zz_main.go index 8a54380dc..bc38f253a 100644 --- a/cmd/provider/labservices/zz_main.go +++ b/cmd/provider/labservices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/loadtestservice/zz_main.go b/cmd/provider/loadtestservice/zz_main.go index e1283172a..506d0db4b 100644 --- a/cmd/provider/loadtestservice/zz_main.go +++ b/cmd/provider/loadtestservice/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/logic/zz_main.go b/cmd/provider/logic/zz_main.go index 3ecba1b18..9b706cf25 100644 --- a/cmd/provider/logic/zz_main.go +++ b/cmd/provider/logic/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/logz/zz_main.go b/cmd/provider/logz/zz_main.go index 9c5d6d55c..2fdadcf95 100644 --- a/cmd/provider/logz/zz_main.go +++ b/cmd/provider/logz/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/machinelearningservices/zz_main.go b/cmd/provider/machinelearningservices/zz_main.go index 5146947b8..7778952be 100644 --- a/cmd/provider/machinelearningservices/zz_main.go +++ b/cmd/provider/machinelearningservices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/maintenance/zz_main.go b/cmd/provider/maintenance/zz_main.go index 5f4be6588..0ea16ed33 100644 --- a/cmd/provider/maintenance/zz_main.go +++ b/cmd/provider/maintenance/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/managedidentity/zz_main.go b/cmd/provider/managedidentity/zz_main.go index f40e8bb70..12873182c 100644 --- a/cmd/provider/managedidentity/zz_main.go +++ b/cmd/provider/managedidentity/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/management/zz_main.go b/cmd/provider/management/zz_main.go index 4dbe04f56..19bc595de 100644 --- a/cmd/provider/management/zz_main.go +++ b/cmd/provider/management/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/maps/zz_main.go b/cmd/provider/maps/zz_main.go index 110e5830c..23eed5b55 100644 --- a/cmd/provider/maps/zz_main.go +++ b/cmd/provider/maps/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/marketplaceordering/zz_main.go b/cmd/provider/marketplaceordering/zz_main.go index f3259ae62..f416a34c1 100644 --- a/cmd/provider/marketplaceordering/zz_main.go +++ b/cmd/provider/marketplaceordering/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/media/zz_main.go b/cmd/provider/media/zz_main.go index b31bb77d5..75ab23d95 100644 --- a/cmd/provider/media/zz_main.go +++ b/cmd/provider/media/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/mixedreality/zz_main.go b/cmd/provider/mixedreality/zz_main.go index b184cf9ba..195311e68 100644 --- a/cmd/provider/mixedreality/zz_main.go +++ b/cmd/provider/mixedreality/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/monolith/zz_main.go b/cmd/provider/monolith/zz_main.go index 7cdb983ca..a541ee6fe 100644 --- a/cmd/provider/monolith/zz_main.go +++ b/cmd/provider/monolith/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/netapp/zz_main.go b/cmd/provider/netapp/zz_main.go index 7a0a084b5..8452aa07e 100644 --- a/cmd/provider/netapp/zz_main.go +++ b/cmd/provider/netapp/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/network/zz_main.go b/cmd/provider/network/zz_main.go index 8c71249ae..467f5f78c 100644 --- a/cmd/provider/network/zz_main.go +++ b/cmd/provider/network/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/notificationhubs/zz_main.go b/cmd/provider/notificationhubs/zz_main.go index 4eefda174..451dcdd9e 100644 --- a/cmd/provider/notificationhubs/zz_main.go +++ b/cmd/provider/notificationhubs/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/operationalinsights/zz_main.go b/cmd/provider/operationalinsights/zz_main.go index fa5d93e1a..dbc82b47b 100644 --- a/cmd/provider/operationalinsights/zz_main.go +++ b/cmd/provider/operationalinsights/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/operationsmanagement/zz_main.go b/cmd/provider/operationsmanagement/zz_main.go index a80ce8a93..5ddbb85af 100644 --- a/cmd/provider/operationsmanagement/zz_main.go +++ b/cmd/provider/operationsmanagement/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/orbital/zz_main.go b/cmd/provider/orbital/zz_main.go index aed4405df..322bb3e5b 100644 --- a/cmd/provider/orbital/zz_main.go +++ b/cmd/provider/orbital/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/policyinsights/zz_main.go b/cmd/provider/policyinsights/zz_main.go index 5052893e4..835fcc3ac 100644 --- a/cmd/provider/policyinsights/zz_main.go +++ b/cmd/provider/policyinsights/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/portal/zz_main.go b/cmd/provider/portal/zz_main.go index a17a39dcf..fcf515435 100644 --- a/cmd/provider/portal/zz_main.go +++ b/cmd/provider/portal/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/powerbidedicated/zz_main.go b/cmd/provider/powerbidedicated/zz_main.go index fcd29950e..21822877e 100644 --- a/cmd/provider/powerbidedicated/zz_main.go +++ b/cmd/provider/powerbidedicated/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/purview/zz_main.go b/cmd/provider/purview/zz_main.go index c095ca931..58eabca91 100644 --- a/cmd/provider/purview/zz_main.go +++ b/cmd/provider/purview/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/recoveryservices/zz_main.go b/cmd/provider/recoveryservices/zz_main.go index 9b73c9c58..9b87d73ff 100644 --- a/cmd/provider/recoveryservices/zz_main.go +++ b/cmd/provider/recoveryservices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/relay/zz_main.go b/cmd/provider/relay/zz_main.go index 52b92dfb6..3cb19d3ff 100644 --- a/cmd/provider/relay/zz_main.go +++ b/cmd/provider/relay/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/resources/zz_main.go b/cmd/provider/resources/zz_main.go index 601435914..5a8b60135 100644 --- a/cmd/provider/resources/zz_main.go +++ b/cmd/provider/resources/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/search/zz_main.go b/cmd/provider/search/zz_main.go index f038162e4..537a3a453 100644 --- a/cmd/provider/search/zz_main.go +++ b/cmd/provider/search/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/security/zz_main.go b/cmd/provider/security/zz_main.go index fa47a6788..ef97613a1 100644 --- a/cmd/provider/security/zz_main.go +++ b/cmd/provider/security/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/securityinsights/zz_main.go b/cmd/provider/securityinsights/zz_main.go index ffa0397a4..10310f07c 100644 --- a/cmd/provider/securityinsights/zz_main.go +++ b/cmd/provider/securityinsights/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/servicebus/zz_main.go b/cmd/provider/servicebus/zz_main.go index a5a860a2d..0393a7ed2 100644 --- a/cmd/provider/servicebus/zz_main.go +++ b/cmd/provider/servicebus/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/servicefabric/zz_main.go b/cmd/provider/servicefabric/zz_main.go index 6528c94c2..89693d67c 100644 --- a/cmd/provider/servicefabric/zz_main.go +++ b/cmd/provider/servicefabric/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/servicelinker/zz_main.go b/cmd/provider/servicelinker/zz_main.go index 7138d3dfb..cf1d30b25 100644 --- a/cmd/provider/servicelinker/zz_main.go +++ b/cmd/provider/servicelinker/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/signalrservice/zz_main.go b/cmd/provider/signalrservice/zz_main.go index 5cfb4ee0d..0830d47df 100644 --- a/cmd/provider/signalrservice/zz_main.go +++ b/cmd/provider/signalrservice/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/solutions/zz_main.go b/cmd/provider/solutions/zz_main.go index 05a9c1914..edec82f94 100644 --- a/cmd/provider/solutions/zz_main.go +++ b/cmd/provider/solutions/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/spring/zz_main.go b/cmd/provider/spring/zz_main.go index a8dea0f34..7f8c8225b 100644 --- a/cmd/provider/spring/zz_main.go +++ b/cmd/provider/spring/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/sql/zz_main.go b/cmd/provider/sql/zz_main.go index 980a9b4ef..5bbb32c59 100644 --- a/cmd/provider/sql/zz_main.go +++ b/cmd/provider/sql/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storage/zz_main.go b/cmd/provider/storage/zz_main.go index b9c674eb2..fb74d196e 100644 --- a/cmd/provider/storage/zz_main.go +++ b/cmd/provider/storage/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storagecache/zz_main.go b/cmd/provider/storagecache/zz_main.go index 0bc3a333a..e01f7f9de 100644 --- a/cmd/provider/storagecache/zz_main.go +++ b/cmd/provider/storagecache/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storagepool/zz_main.go b/cmd/provider/storagepool/zz_main.go index 7c4a0569d..88805ce77 100644 --- a/cmd/provider/storagepool/zz_main.go +++ b/cmd/provider/storagepool/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storagesync/zz_main.go b/cmd/provider/storagesync/zz_main.go index 823c1d5fb..bdfb66bf6 100644 --- a/cmd/provider/storagesync/zz_main.go +++ b/cmd/provider/storagesync/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/streamanalytics/zz_main.go b/cmd/provider/streamanalytics/zz_main.go index 5f637c838..62faa5367 100644 --- a/cmd/provider/streamanalytics/zz_main.go +++ b/cmd/provider/streamanalytics/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/synapse/zz_main.go b/cmd/provider/synapse/zz_main.go index 0a3cf7208..3b5af9d0c 100644 --- a/cmd/provider/synapse/zz_main.go +++ b/cmd/provider/synapse/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/timeseriesinsights/zz_main.go b/cmd/provider/timeseriesinsights/zz_main.go index 7d050b482..97c77e108 100644 --- a/cmd/provider/timeseriesinsights/zz_main.go +++ b/cmd/provider/timeseriesinsights/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/web/zz_main.go b/cmd/provider/web/zz_main.go index fea2ea293..6ee8299d7 100644 --- a/cmd/provider/web/zz_main.go +++ b/cmd/provider/web/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/go.mod b/go.mod index dfc20b8fd..57d7e2b01 100644 --- a/go.mod +++ b/go.mod @@ -8,15 +8,15 @@ go 1.21 require ( dario.cat/mergo v1.0.0 - github.com/crossplane/crossplane-runtime v1.16.0-rc.2.0.20240510094504-3f697876fa57 - github.com/crossplane/crossplane-tools v0.0.0-20230925130601-628280f8bf79 - github.com/crossplane/upjet v1.4.0-rc.0.0.20240515193317-92d1af84d242 + github.com/alecthomas/kingpin/v2 v2.4.0 + github.com/crossplane/crossplane-runtime v1.16.0 + github.com/crossplane/crossplane-tools v0.0.0-20240522174801-1ad3d4c87f21 + github.com/crossplane/upjet v1.4.0 github.com/google/go-cmp v0.6.0 github.com/hashicorp/terraform-json v0.17.1 github.com/hashicorp/terraform-plugin-sdk/v2 v2.30.0 github.com/hashicorp/terraform-provider-azurerm v1.44.1-0.20230519070112-155958d2cb08 github.com/pkg/errors v0.9.1 - gopkg.in/alecthomas/kingpin.v2 v2.2.6 k8s.io/api v0.29.4 k8s.io/apimachinery v0.29.4 k8s.io/client-go v0.29.4 @@ -51,7 +51,7 @@ require ( github.com/btubbs/datetime v0.1.1 // indirect github.com/cespare/xxhash/v2 v2.2.0 // indirect github.com/cloudflare/circl v1.3.7 // indirect - github.com/dave/jennifer v1.6.0 // indirect + github.com/dave/jennifer v1.7.0 // indirect github.com/davecgh/go-spew v1.1.1 // indirect github.com/emicklei/go-restful/v3 v3.11.0 // indirect github.com/evanphx/json-patch v5.6.0+incompatible // indirect @@ -131,6 +131,7 @@ require ( github.com/tombuildsstuff/giovanni v0.20.0 // indirect github.com/tombuildsstuff/kermit v0.20240122.1123108 // indirect github.com/vmihailenco/msgpack v4.0.4+incompatible // indirect + github.com/xhit/go-str2duration/v2 v2.1.0 // indirect github.com/yuin/goldmark v1.4.13 // indirect github.com/zclconf/go-cty v1.14.1 // indirect github.com/zclconf/go-cty-yaml v1.0.3 // indirect @@ -151,6 +152,7 @@ require ( google.golang.org/genproto/googleapis/rpc v0.0.0-20231120223509-83a465c0220f // indirect google.golang.org/grpc v1.61.0 // indirect google.golang.org/protobuf v1.33.0 // indirect + gopkg.in/alecthomas/kingpin.v2 v2.2.6 // indirect gopkg.in/inf.v0 v0.9.1 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect gopkg.in/yaml.v3 v3.0.1 // indirect diff --git a/go.sum b/go.sum index 23046f96d..481579523 100644 --- a/go.sum +++ b/go.sum @@ -44,6 +44,8 @@ github.com/acomagu/bufpipe v1.0.4/go.mod h1:mxdxdup/WdsKVreO5GpW4+M/1CE2sMG4jeGJ github.com/agext/levenshtein v1.2.1/go.mod h1:JEDfjyjHDjOF/1e4FlBE/PkbqA9OfWu2ki2W0IB5558= github.com/agext/levenshtein v1.2.3 h1:YB2fHEn0UJagG8T1rrWknE3ZQzWM06O8AMAatNn7lmo= github.com/agext/levenshtein v1.2.3/go.mod h1:JEDfjyjHDjOF/1e4FlBE/PkbqA9OfWu2ki2W0IB5558= +github.com/alecthomas/kingpin/v2 v2.4.0 h1:f48lwail6p8zpO1bC4TxtqACaGqHYA22qkHjHpqDjYY= +github.com/alecthomas/kingpin/v2 v2.4.0/go.mod h1:0gyi0zQnjuFk8xrkNKamJoyUo382HRL7ATRpFZCw6tE= github.com/alecthomas/kong v0.2.16/go.mod h1:kQOmtJgV+Lb4aj+I2LEn40cbtawdWJ9Y8QLq+lElKxE= github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751 h1:JYp7IbQjafoB+tBA3gMyHYHrpOtNuDiK/uB5uXxq5wM= github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc= @@ -75,16 +77,16 @@ github.com/cloudflare/circl v1.3.7 h1:qlCDlTPz2n9fu58M0Nh1J/JzcFpfgkFHHX3O35r5vc github.com/cloudflare/circl v1.3.7/go.mod h1:sRTcRWXGLrKw6yIGJ+l7amYJFfAXbZG0kBSc8r4zxgA= github.com/cpuguy83/go-md2man/v2 v2.0.3/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o= github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E= -github.com/crossplane/crossplane-runtime v1.16.0-rc.2.0.20240510094504-3f697876fa57 h1:728dBhd/xm0Wv3g/BtoT90tMTvV6aY45QVRnNCCWJ/g= -github.com/crossplane/crossplane-runtime v1.16.0-rc.2.0.20240510094504-3f697876fa57/go.mod h1:Pz2tdGVMF6KDGzHZOkvKro0nKc8EzK0sb/nSA7pH4Dc= -github.com/crossplane/crossplane-tools v0.0.0-20230925130601-628280f8bf79 h1:HigXs5tEQxWz0fcj8hzbU2UAZgEM7wPe0XRFOsrtF8Y= -github.com/crossplane/crossplane-tools v0.0.0-20230925130601-628280f8bf79/go.mod h1:+e4OaFlOcmr0JvINHl/yvEYBrZawzTgj6pQumOH1SS0= -github.com/crossplane/upjet v1.4.0-rc.0.0.20240515193317-92d1af84d242 h1:ylmj67qVNh+AIDK+CH8BiXu41PlGSKBzAwMZApDEOds= -github.com/crossplane/upjet v1.4.0-rc.0.0.20240515193317-92d1af84d242/go.mod h1:3pDVtCgyBc5f2Zx4K5HEPxxhjndmOc5CHCJNpIivK/g= +github.com/crossplane/crossplane-runtime v1.16.0 h1:lz+l0wEB3qowdTmN7t0PZkfuNSvfOoEhQrEYFbYqMow= +github.com/crossplane/crossplane-runtime v1.16.0/go.mod h1:Pz2tdGVMF6KDGzHZOkvKro0nKc8EzK0sb/nSA7pH4Dc= +github.com/crossplane/crossplane-tools v0.0.0-20240522174801-1ad3d4c87f21 h1:8wb7/zCbVPkeX68WbVESWJmSWQE5SZKzz0g9X4FlXRw= +github.com/crossplane/crossplane-tools v0.0.0-20240522174801-1ad3d4c87f21/go.mod h1:cN0Y7PFGQMM8mcagXVCbeQoKtipmFWQTPZYyziCPBUI= +github.com/crossplane/upjet v1.4.0 h1:twKCU8omU7VAA7E5fpbQkqDHjVnoTb8EXqmB805Q37o= +github.com/crossplane/upjet v1.4.0/go.mod h1:3pDVtCgyBc5f2Zx4K5HEPxxhjndmOc5CHCJNpIivK/g= github.com/cyphar/filepath-securejoin v0.2.4 h1:Ugdm7cg7i6ZK6x3xDF1oEu1nfkyfH53EtKeQYTC3kyg= github.com/cyphar/filepath-securejoin v0.2.4/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4= -github.com/dave/jennifer v1.6.0 h1:MQ/6emI2xM7wt0tJzJzyUik2Q3Tcn2eE0vtYgh4GPVI= -github.com/dave/jennifer v1.6.0/go.mod h1:AxTG893FiZKqxy3FP1kL80VMshSMuz2G+EgvszgGRnk= +github.com/dave/jennifer v1.7.0 h1:uRbSBH9UTS64yXbh4FrMHfgfY762RD+C7bUPKODpSJE= +github.com/dave/jennifer v1.7.0/go.mod h1:nXbxhEmQfOZhWml3D1cDK5M1FLnMSozpbFN/m3RmGZc= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= @@ -371,6 +373,8 @@ github.com/vmihailenco/tagparser/v2 v2.0.0 h1:y09buUbR+b5aycVFQs/g70pqKVZNBmxwAh github.com/vmihailenco/tagparser/v2 v2.0.0/go.mod h1:Wri+At7QHww0WTrCBeu4J6bNtoV6mEfg5OIWRZA9qds= github.com/xanzy/ssh-agent v0.3.3 h1:+/15pJfg/RsTxqYcX6fHqOXZwwMP+2VyYWJeWM2qQFM= github.com/xanzy/ssh-agent v0.3.3/go.mod h1:6dzNDKs0J9rVPHPhaGCukekBHKqfl+L3KghI1Bc68Uw= +github.com/xhit/go-str2duration/v2 v2.1.0 h1:lxklc02Drh6ynqX+DdPyp5pCKLUQpRT8bp8Ydu2Bstc= +github.com/xhit/go-str2duration/v2 v2.1.0/go.mod h1:ohY8p+0f07DiV6Em5LKB0s2YpLtXVyJfNt1+BlmyAsU= github.com/yuin/goldmark v1.1.27/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= github.com/yuin/goldmark v1.2.1/go.mod h1:3hX8gzYuyVAZsxl0MRgGTJEmQBFcNTphYh9decYSb74= github.com/yuin/goldmark v1.3.5/go.mod h1:mwnBkeHKe2W/ZEtQ+71ViKU8L12m81fl3OWwC1Zlc8k= diff --git a/hack/main.go.tmpl b/hack/main.go.tmpl index 32b913e05..77f6537fd 100644 --- a/hack/main.go.tmpl +++ b/hack/main.go.tmpl @@ -24,7 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "gopkg.in/alecthomas/kingpin.v2" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" From 3a6efdee98ea8beacf74696fce57a801b44ac18a Mon Sep 17 00:00:00 2001 From: Christian Artin Date: Thu, 30 May 2024 18:05:55 -0400 Subject: [PATCH 2/4] Upgrade upjet Signed-off-by: Christian Artin --- go.mod | 4 +--- go.sum | 8 ++------ 2 files changed, 3 insertions(+), 9 deletions(-) diff --git a/go.mod b/go.mod index 57d7e2b01..e724f84e5 100644 --- a/go.mod +++ b/go.mod @@ -11,7 +11,7 @@ require ( github.com/alecthomas/kingpin/v2 v2.4.0 github.com/crossplane/crossplane-runtime v1.16.0 github.com/crossplane/crossplane-tools v0.0.0-20240522174801-1ad3d4c87f21 - github.com/crossplane/upjet v1.4.0 + github.com/crossplane/upjet v1.4.1-0.20240530140005-40733472e6d2 github.com/google/go-cmp v0.6.0 github.com/hashicorp/terraform-json v0.17.1 github.com/hashicorp/terraform-plugin-sdk/v2 v2.30.0 @@ -41,7 +41,6 @@ require ( github.com/Azure/go-autorest/tracing v0.6.0 // indirect github.com/ProtonMail/go-crypto v0.0.0-20230828082145-3c4c8a2d2371 // indirect github.com/agext/levenshtein v1.2.3 // indirect - github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751 // indirect github.com/alecthomas/units v0.0.0-20211218093645-b94a6e3cc137 // indirect github.com/antchfx/htmlquery v1.2.4 // indirect github.com/antchfx/xpath v1.2.0 // indirect @@ -152,7 +151,6 @@ require ( google.golang.org/genproto/googleapis/rpc v0.0.0-20231120223509-83a465c0220f // indirect google.golang.org/grpc v1.61.0 // indirect google.golang.org/protobuf v1.33.0 // indirect - gopkg.in/alecthomas/kingpin.v2 v2.2.6 // indirect gopkg.in/inf.v0 v0.9.1 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect gopkg.in/yaml.v3 v3.0.1 // indirect diff --git a/go.sum b/go.sum index 481579523..853aecf0c 100644 --- a/go.sum +++ b/go.sum @@ -47,8 +47,6 @@ github.com/agext/levenshtein v1.2.3/go.mod h1:JEDfjyjHDjOF/1e4FlBE/PkbqA9OfWu2ki github.com/alecthomas/kingpin/v2 v2.4.0 h1:f48lwail6p8zpO1bC4TxtqACaGqHYA22qkHjHpqDjYY= github.com/alecthomas/kingpin/v2 v2.4.0/go.mod h1:0gyi0zQnjuFk8xrkNKamJoyUo382HRL7ATRpFZCw6tE= github.com/alecthomas/kong v0.2.16/go.mod h1:kQOmtJgV+Lb4aj+I2LEn40cbtawdWJ9Y8QLq+lElKxE= -github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751 h1:JYp7IbQjafoB+tBA3gMyHYHrpOtNuDiK/uB5uXxq5wM= -github.com/alecthomas/template v0.0.0-20190718012654-fb15b899a751/go.mod h1:LOuyumcjzFXgccqObfd/Ljyb9UuFJ6TxHnclSeseNhc= github.com/alecthomas/units v0.0.0-20211218093645-b94a6e3cc137 h1:s6gZFSlWYmbqAuRjVTiNNhvNRfY2Wxp9nhfyel4rklc= github.com/alecthomas/units v0.0.0-20211218093645-b94a6e3cc137/go.mod h1:OMCwj8VM1Kc9e19TLln2VL61YJF0x1XFtfdL4JdbSyE= github.com/antchfx/htmlquery v1.2.4 h1:qLteofCMe/KGovBI6SQgmou2QNyedFUW+pE+BpeZ494= @@ -81,8 +79,8 @@ github.com/crossplane/crossplane-runtime v1.16.0 h1:lz+l0wEB3qowdTmN7t0PZkfuNSvf github.com/crossplane/crossplane-runtime v1.16.0/go.mod h1:Pz2tdGVMF6KDGzHZOkvKro0nKc8EzK0sb/nSA7pH4Dc= github.com/crossplane/crossplane-tools v0.0.0-20240522174801-1ad3d4c87f21 h1:8wb7/zCbVPkeX68WbVESWJmSWQE5SZKzz0g9X4FlXRw= github.com/crossplane/crossplane-tools v0.0.0-20240522174801-1ad3d4c87f21/go.mod h1:cN0Y7PFGQMM8mcagXVCbeQoKtipmFWQTPZYyziCPBUI= -github.com/crossplane/upjet v1.4.0 h1:twKCU8omU7VAA7E5fpbQkqDHjVnoTb8EXqmB805Q37o= -github.com/crossplane/upjet v1.4.0/go.mod h1:3pDVtCgyBc5f2Zx4K5HEPxxhjndmOc5CHCJNpIivK/g= +github.com/crossplane/upjet v1.4.1-0.20240530140005-40733472e6d2 h1:guszl72/hu6u12Lm6Zf3ix5hEjBCMIfEbE61g6v3ovE= +github.com/crossplane/upjet v1.4.1-0.20240530140005-40733472e6d2/go.mod h1:wkdZf/Cvhr6PI30VdHIOjg4dX39Z5uijqnLWFk5PbGM= github.com/cyphar/filepath-securejoin v0.2.4 h1:Ugdm7cg7i6ZK6x3xDF1oEu1nfkyfH53EtKeQYTC3kyg= github.com/cyphar/filepath-securejoin v0.2.4/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4= github.com/dave/jennifer v1.7.0 h1:uRbSBH9UTS64yXbh4FrMHfgfY762RD+C7bUPKODpSJE= @@ -518,8 +516,6 @@ google.golang.org/protobuf v1.26.0-rc.1/go.mod h1:jlhhOSvTdKEhbULTjvd4ARK9grFBp0 google.golang.org/protobuf v1.26.0/go.mod h1:9q0QmTI4eRPtz6boOQmLYwt+qCgq0jsYwAQnmE0givc= google.golang.org/protobuf v1.33.0 h1:uNO2rsAINq/JlFpSdYEKIZ0uKD/R9cpdv0T+yoGwGmI= google.golang.org/protobuf v1.33.0/go.mod h1:c6P6GXX6sHbq/GpV6MGZEdwhWPcYBgnhAHhKbcUYpos= -gopkg.in/alecthomas/kingpin.v2 v2.2.6 h1:jMFz6MfLP0/4fUyZle81rXUoxOBFi19VUFKVDOQfozc= -gopkg.in/alecthomas/kingpin.v2 v2.2.6/go.mod h1:FMv+mEhP44yOT+4EoQTLFTRgOQ1FBLkstjWtayDeSgw= gopkg.in/check.v1 v0.0.0-20161208181325-20d25e280405/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20180628173108-788fd7840127/go.mod h1:Co6ibVJAznAaIkqp8huTwlJQCZ016jof/cbN4VW5Yz0= gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c h1:Hei/4ADfdWqJk1ZMxUNpqntNwaWcugrBjAiHlqqRiVk= From cf5973c15ebcb81a940654973436b318dbe83470 Mon Sep 17 00:00:00 2001 From: Christian Artin Date: Fri, 31 May 2024 18:36:24 -0400 Subject: [PATCH 3/4] Make generate Signed-off-by: Christian Artin --- .../v1beta1/zz_generated.deepcopy.go | 5 + .../v1beta1/zz_server_terraformed.go | 2 +- .../v1beta1/zz_server_types.go | 3 + .../zz_authorizationserver_terraformed.go | 2 +- .../v1beta1/zz_authorizationserver_types.go | 6 + .../v1beta1/zz_certificate_terraformed.go | 2 +- .../v1beta1/zz_certificate_types.go | 6 + .../v1beta1/zz_customdomain_terraformed.go | 2 +- .../v1beta1/zz_customdomain_types.go | 30 ++ .../v1beta1/zz_generated.deepcopy.go | 94 +++++ .../zz_identityprovideraad_terraformed.go | 2 +- .../v1beta1/zz_identityprovideraad_types.go | 3 + ...zz_identityproviderfacebook_terraformed.go | 2 +- .../zz_identityproviderfacebook_types.go | 3 + .../zz_identityprovidergoogle_terraformed.go | 2 +- .../zz_identityprovidergoogle_types.go | 3 + ...z_identityprovidermicrosoft_terraformed.go | 2 +- .../zz_identityprovidermicrosoft_types.go | 3 + .../zz_identityprovidertwitter_terraformed.go | 2 +- .../zz_identityprovidertwitter_types.go | 6 + .../zz_openidconnectprovider_terraformed.go | 2 +- .../v1beta1/zz_openidconnectprovider_types.go | 6 + .../v1beta1/zz_rediscache_terraformed.go | 2 +- .../v1beta1/zz_rediscache_types.go | 3 + .../v1beta1/zz_subscription_terraformed.go | 2 +- .../v1beta1/zz_subscription_types.go | 6 + .../v1beta1/zz_user_terraformed.go | 2 +- apis/apimanagement/v1beta1/zz_user_types.go | 3 + .../v1beta2/zz_backend_terraformed.go | 2 +- .../apimanagement/v1beta2/zz_backend_types.go | 3 + .../v1beta2/zz_generated.deepcopy.go | 27 ++ .../v1beta2/zz_logger_terraformed.go | 2 +- apis/apimanagement/v1beta2/zz_logger_types.go | 8 +- .../v1beta2/zz_management_terraformed.go | 2 +- .../v1beta2/zz_management_types.go | 11 +- .../v1beta2/zz_namedvalue_terraformed.go | 2 +- .../v1beta2/zz_namedvalue_types.go | 3 + .../v1beta1/zz_generated.deepcopy.go | 11 + ...ingcloudappmysqlassociation_terraformed.go | 2 +- ...zz_springcloudappmysqlassociation_types.go | 3 + ...ngcloudconfigurationservice_terraformed.go | 2 +- ...z_springcloudconfigurationservice_types.go | 6 + .../v1beta2/zz_generated.deepcopy.go | 38 ++ ...gcloudcustomizedaccelerator_terraformed.go | 2 +- ..._springcloudcustomizedaccelerator_types.go | 13 +- .../zz_springcloudgateway_terraformed.go | 2 +- .../v1beta2/zz_springcloudgateway_types.go | 2 + .../zz_springcloudservice_terraformed.go | 2 +- .../v1beta2/zz_springcloudservice_types.go | 31 +- .../v1beta1/zz_credential_terraformed.go | 2 +- .../automation/v1beta1/zz_credential_types.go | 3 + .../v1beta1/zz_generated.deepcopy.go | 6 + .../v1beta1/zz_webhook_terraformed.go | 2 +- apis/automation/v1beta1/zz_webhook_types.go | 3 + .../v1beta1/zz_botchannelline_terraformed.go | 2 +- .../v1beta1/zz_botchannelline_types.go | 10 +- .../v1beta1/zz_botchannelslack_terraformed.go | 2 +- .../v1beta1/zz_botchannelslack_types.go | 9 + .../v1beta1/zz_botchannelsms_terraformed.go | 2 +- .../v1beta1/zz_botchannelsms_types.go | 3 + .../zz_botchannelsregistration_terraformed.go | 2 +- .../zz_botchannelsregistration_types.go | 3 + .../v1beta1/zz_botconnection_terraformed.go | 2 +- .../v1beta1/zz_botconnection_types.go | 3 + .../v1beta1/zz_botwebapp_terraformed.go | 2 +- apis/botservice/v1beta1/zz_botwebapp_types.go | 6 + .../v1beta1/zz_generated.deepcopy.go | 26 ++ apis/cache/v1beta2/zz_generated.deepcopy.go | 15 + .../v1beta2/zz_rediscache_terraformed.go | 2 +- apis/cache/v1beta2/zz_rediscache_types.go | 9 + .../v1beta2/zz_account_terraformed.go | 2 +- .../v1beta2/zz_account_types.go | 3 + .../v1beta2/zz_generated.deepcopy.go | 5 + apis/compute/v1beta2/zz_generated.deepcopy.go | 114 ++++- .../zz_linuxvirtualmachine_terraformed.go | 2 +- .../v1beta2/zz_linuxvirtualmachine_types.go | 6 + ...linuxvirtualmachinescaleset_terraformed.go | 2 +- .../zz_linuxvirtualmachinescaleset_types.go | 9 + ...ratedvirtualmachinescaleset_terraformed.go | 2 +- ...rchestratedvirtualmachinescaleset_types.go | 22 +- .../zz_virtualmachineextension_terraformed.go | 2 +- .../zz_virtualmachineextension_types.go | 3 + ...zz_virtualmachineruncommand_terraformed.go | 2 +- .../zz_virtualmachineruncommand_types.go | 31 +- .../zz_windowsvirtualmachine_terraformed.go | 2 +- .../v1beta2/zz_windowsvirtualmachine_types.go | 11 +- ...ndowsvirtualmachinescaleset_terraformed.go | 2 +- .../zz_windowsvirtualmachinescaleset_types.go | 14 +- .../v1beta1/zz_environment_terraformed.go | 2 +- .../v1beta1/zz_environment_types.go | 4 + .../v1beta1/zz_generated.deepcopy.go | 5 + .../v1beta2/zz_containerapp_terraformed.go | 2 +- .../v1beta2/zz_containerapp_types.go | 12 +- .../v1beta2/zz_generated.deepcopy.go | 2 + .../v1beta2/zz_generated.deepcopy.go | 16 + .../zz_kubernetescluster_terraformed.go | 2 +- .../v1beta2/zz_kubernetescluster_types.go | 14 +- .../zz_cassandracluster_terraformed.go | 2 +- .../v1beta2/zz_cassandracluster_types.go | 3 + .../cosmosdb/v1beta2/zz_generated.deepcopy.go | 1 + .../v1beta1/zz_generated.deepcopy.go | 27 ++ ...kedserviceazuretablestorage_terraformed.go | 2 +- ...zz_linkedserviceazuretablestorage_types.go | 3 + .../zz_linkedservicecosmosdb_terraformed.go | 2 +- .../v1beta1/zz_linkedservicecosmosdb_types.go | 6 + ...nkedservicecosmosdbmongoapi_terraformed.go | 2 +- .../zz_linkedservicecosmosdbmongoapi_types.go | 3 + .../zz_linkedservicekusto_terraformed.go | 2 +- .../v1beta1/zz_linkedservicekusto_types.go | 3 + .../zz_linkedservicesftp_terraformed.go | 2 +- .../v1beta1/zz_linkedservicesftp_types.go | 3 + .../zz_linkedserviceweb_terraformed.go | 2 +- .../v1beta1/zz_linkedserviceweb_types.go | 3 + .../v1beta2/zz_generated.deepcopy.go | 55 +++ ...integrationruntimeazuressis_terraformed.go | 2 +- .../zz_integrationruntimeazuressis_types.go | 14 +- ...z_integrationruntimemanaged_terraformed.go | 2 +- .../zz_integrationruntimemanaged_types.go | 8 +- ...nkedserviceazureblobstorage_terraformed.go | 2 +- .../zz_linkedserviceazureblobstorage_types.go | 9 + ...inkedserviceazuredatabricks_terraformed.go | 2 +- .../zz_linkedserviceazuredatabricks_types.go | 3 + ...nkedserviceazurefilestorage_terraformed.go | 2 +- .../zz_linkedserviceazurefilestorage_types.go | 6 + ..._linkedserviceazurefunction_terraformed.go | 2 +- .../zz_linkedserviceazurefunction_types.go | 3 + .../zz_linkedserviceodata_terraformed.go | 2 +- .../v1beta2/zz_linkedserviceodata_types.go | 5 +- .../zz_linkedserviceodbc_terraformed.go | 2 +- .../v1beta2/zz_linkedserviceodbc_types.go | 5 +- .../v1beta1/zz_generated.deepcopy.go | 5 + .../v1beta1/zz_server_terraformed.go | 2 +- apis/dbformariadb/v1beta1/zz_server_types.go | 3 + .../v1beta2/zz_flexibleserver_terraformed.go | 2 +- .../v1beta2/zz_flexibleserver_types.go | 3 + .../v1beta2/zz_generated.deepcopy.go | 15 + .../v1beta2/zz_server_terraformed.go | 2 +- apis/dbformysql/v1beta2/zz_server_types.go | 6 + .../v1beta2/zz_flexibleserver_terraformed.go | 2 +- .../v1beta2/zz_flexibleserver_types.go | 4 + .../v1beta2/zz_generated.deepcopy.go | 15 + .../v1beta2/zz_server_terraformed.go | 2 +- .../v1beta2/zz_server_types.go | 6 + apis/devices/v1beta1/zz_generated.deepcopy.go | 22 + .../zz_iothubcertificate_terraformed.go | 2 +- .../v1beta1/zz_iothubcertificate_types.go | 3 + .../zz_iothubdpscertificate_terraformed.go | 2 +- .../v1beta1/zz_iothubdpscertificate_types.go | 3 + .../zz_iothubendpointeventhub_terraformed.go | 2 +- .../zz_iothubendpointeventhub_types.go | 3 + ...thubendpointservicebusqueue_terraformed.go | 2 +- .../zz_iothubendpointservicebusqueue_types.go | 3 + ...thubendpointservicebustopic_terraformed.go | 2 +- .../zz_iothubendpointservicebustopic_types.go | 3 + ...hubendpointstoragecontainer_terraformed.go | 2 +- ...zz_iothubendpointstoragecontainer_types.go | 3 + apis/devices/v1beta2/zz_generated.deepcopy.go | 2 + apis/devices/v1beta2/zz_iothub_terraformed.go | 2 +- apis/devices/v1beta2/zz_iothub_types.go | 5 +- .../v1beta2/zz_iothubdps_terraformed.go | 2 +- apis/devices/v1beta2/zz_iothubdps_types.go | 5 +- .../v1beta2/zz_generated.deepcopy.go | 1 + ..._iothubdeviceupdateinstance_terraformed.go | 2 +- .../zz_iothubdeviceupdateinstance_types.go | 5 +- .../v1beta2/zz_generated.deepcopy.go | 6 + .../zz_linuxvirtualmachine_terraformed.go | 2 +- .../v1beta2/zz_linuxvirtualmachine_types.go | 3 + .../zz_windowsvirtualmachine_terraformed.go | 2 +- .../v1beta2/zz_windowsvirtualmachine_types.go | 3 + .../zz_eventsubscription_terraformed.go | 2 +- .../v1beta2/zz_eventsubscription_types.go | 3 + .../v1beta2/zz_generated.deepcopy.go | 5 + .../v1beta2/zz_generated.deepcopy.go | 120 ++++++ .../v1beta2/zz_hadoopcluster_terraformed.go | 2 +- .../v1beta2/zz_hadoopcluster_types.go | 49 ++- .../v1beta2/zz_hbasecluster_terraformed.go | 2 +- .../v1beta2/zz_hbasecluster_types.go | 49 ++- .../zz_interactivequerycluster_terraformed.go | 2 +- .../zz_interactivequerycluster_types.go | 49 ++- .../v1beta2/zz_kafkacluster_terraformed.go | 2 +- .../v1beta2/zz_kafkacluster_types.go | 52 ++- .../v1beta2/zz_sparkcluster_terraformed.go | 2 +- .../v1beta2/zz_sparkcluster_types.go | 49 ++- .../zz_certificateissuer_terraformed.go | 2 +- .../v1beta1/zz_certificateissuer_types.go | 3 + .../keyvault/v1beta1/zz_generated.deepcopy.go | 6 + .../keyvault/v1beta1/zz_secret_terraformed.go | 2 +- apis/keyvault/v1beta1/zz_secret_types.go | 3 + .../v1beta2/zz_certificate_terraformed.go | 2 +- apis/keyvault/v1beta2/zz_certificate_types.go | 8 +- .../keyvault/v1beta2/zz_generated.deepcopy.go | 8 +- .../v1beta2/zz_generated.deepcopy.go | 2 + .../v1beta2/zz_labservicelab_terraformed.go | 2 +- .../v1beta2/zz_labservicelab_types.go | 10 +- .../zz_contentkeypolicy_terraformed.go | 2 +- .../v1beta2/zz_contentkeypolicy_types.go | 36 ++ apis/media/v1beta2/zz_generated.deepcopy.go | 64 ++- apis/netapp/v1beta2/zz_account_terraformed.go | 2 +- apis/netapp/v1beta2/zz_account_types.go | 5 +- apis/netapp/v1beta2/zz_generated.deepcopy.go | 1 + ...pressroutecircuitconnection_terraformed.go | 2 +- .../zz_expressroutecircuitconnection_types.go | 3 + apis/network/v1beta1/zz_generated.deepcopy.go | 5 + .../zz_applicationgateway_terraformed.go | 2 +- .../v1beta2/zz_applicationgateway_types.go | 19 +- .../zz_expressroutecircuit_terraformed.go | 2 +- .../v1beta2/zz_expressroutecircuit_types.go | 3 + ..._expressroutecircuitpeering_terraformed.go | 2 +- .../zz_expressroutecircuitpeering_types.go | 3 + apis/network/v1beta2/zz_generated.deepcopy.go | 39 ++ .../zz_virtualnetworkgateway_terraformed.go | 2 +- .../v1beta2/zz_virtualnetworkgateway_types.go | 5 +- ...ualnetworkgatewayconnection_terraformed.go | 2 +- ...z_virtualnetworkgatewayconnection_types.go | 6 + .../zz_vpnserverconfiguration_terraformed.go | 2 +- .../zz_vpnserverconfiguration_types.go | 5 +- .../v1beta2/zz_generated.deepcopy.go | 2 + .../v1beta2/zz_notificationhub_terraformed.go | 2 +- .../v1beta2/zz_notificationhub_types.go | 10 +- .../v1beta2/zz_generated.deepcopy.go | 12 + ...rcedeploymentscriptazurecli_terraformed.go | 2 +- ..._resourcedeploymentscriptazurecli_types.go | 8 +- ...oymentscriptazurepowershell_terraformed.go | 2 +- ...cedeploymentscriptazurepowershell_types.go | 8 +- .../v1beta2/zz_generated.deepcopy.go | 5 + .../v1beta2/zz_managedcluster_terraformed.go | 2 +- .../v1beta2/zz_managedcluster_types.go | 3 + .../v1beta2/zz_generated.deepcopy.go | 10 + .../zz_springcloudconnection_terraformed.go | 2 +- .../v1beta2/zz_springcloudconnection_types.go | 6 + apis/sql/v1beta1/zz_generated.deepcopy.go | 21 + ...abaseextendedauditingpolicy_terraformed.go | 2 +- ...sqldatabaseextendedauditingpolicy_types.go | 3 + .../zz_mssqljobcredential_terraformed.go | 2 +- .../v1beta1/zz_mssqljobcredential_types.go | 3 + ...rosoftsupportauditingpolicy_terraformed.go | 2 +- ...vermicrosoftsupportauditingpolicy_types.go | 6 + ...qlserversecurityalertpolicy_terraformed.go | 2 +- ...zz_mssqlserversecurityalertpolicy_types.go | 3 + apis/sql/v1beta2/zz_generated.deepcopy.go | 33 ++ .../v1beta2/zz_mssqldatabase_terraformed.go | 2 +- apis/sql/v1beta2/zz_mssqldatabase_types.go | 13 +- .../zz_mssqlmanagedinstance_terraformed.go | 2 +- .../v1beta2/zz_mssqlmanagedinstance_types.go | 3 + ...ancevulnerabilityassessment_terraformed.go | 2 +- ...edinstancevulnerabilityassessment_types.go | 6 + .../sql/v1beta2/zz_mssqlserver_terraformed.go | 2 +- apis/sql/v1beta2/zz_mssqlserver_types.go | 3 + ...rvervulnerabilityassessment_terraformed.go | 2 +- ...ssqlservervulnerabilityassessment_types.go | 6 + .../v1beta2/zz_generated.deepcopy.go | 2 + .../v1beta2/zz_hpccache_terraformed.go | 2 +- .../storagecache/v1beta2/zz_hpccache_types.go | 10 +- .../v1beta1/zz_generated.deepcopy.go | 9 + .../v1beta1/zz_outputfunction_terraformed.go | 2 +- .../v1beta1/zz_outputfunction_types.go | 3 + .../v1beta1/zz_outputmssql_terraformed.go | 2 +- .../v1beta1/zz_outputmssql_types.go | 3 + .../v1beta1/zz_outputsynapse_terraformed.go | 2 +- .../v1beta1/zz_outputsynapse_types.go | 3 + .../v1beta1/zz_outputtable_terraformed.go | 2 +- .../v1beta1/zz_outputtable_types.go | 3 + .../zz_referenceinputmssql_terraformed.go | 2 +- .../v1beta1/zz_referenceinputmssql_types.go | 3 + .../v1beta2/zz_generated.deepcopy.go | 33 ++ .../v1beta2/zz_job_terraformed.go | 2 +- apis/streamanalytics/v1beta2/zz_job_types.go | 5 +- .../v1beta2/zz_outputblob_terraformed.go | 2 +- .../v1beta2/zz_outputblob_types.go | 3 + .../v1beta2/zz_outputeventhub_terraformed.go | 2 +- .../v1beta2/zz_outputeventhub_types.go | 3 + .../zz_outputservicebusqueue_terraformed.go | 2 +- .../v1beta2/zz_outputservicebusqueue_types.go | 3 + .../zz_outputservicebustopic_terraformed.go | 2 +- .../v1beta2/zz_outputservicebustopic_types.go | 3 + .../zz_referenceinputblob_terraformed.go | 2 +- .../v1beta2/zz_referenceinputblob_types.go | 3 + .../v1beta2/zz_streaminputblob_terraformed.go | 2 +- .../v1beta2/zz_streaminputblob_types.go | 3 + .../zz_streaminputeventhub_terraformed.go | 2 +- .../v1beta2/zz_streaminputeventhub_types.go | 3 + .../zz_streaminputiothub_terraformed.go | 2 +- .../v1beta2/zz_streaminputiothub_types.go | 3 + apis/synapse/v1beta1/zz_generated.deepcopy.go | 20 + ...lpoolextendedauditingpolicy_terraformed.go | 2 +- .../zz_sqlpoolextendedauditingpolicy_types.go | 3 + ..._sqlpoolsecurityalertpolicy_terraformed.go | 2 +- .../zz_sqlpoolsecurityalertpolicy_types.go | 3 + ...spaceextendedauditingpolicy_terraformed.go | 2 +- ...z_workspaceextendedauditingpolicy_types.go | 3 + ...orkspacesecurityalertpolicy_terraformed.go | 2 +- .../zz_workspacesecurityalertpolicy_types.go | 3 + apis/synapse/v1beta2/zz_generated.deepcopy.go | 15 + .../v1beta2/zz_workspace_terraformed.go | 2 +- apis/synapse/v1beta2/zz_workspace_types.go | 3 + ...pacevulnerabilityassessment_terraformed.go | 2 +- ..._workspacevulnerabilityassessment_types.go | 6 + .../zz_eventsourceeventhub_terraformed.go | 2 +- .../v1beta1/zz_eventsourceeventhub_types.go | 3 + .../zz_eventsourceiothub_terraformed.go | 2 +- .../v1beta1/zz_eventsourceiothub_types.go | 3 + .../v1beta1/zz_generated.deepcopy.go | 2 + .../v1beta2/zz_gen2environment_terraformed.go | 2 +- .../v1beta2/zz_gen2environment_types.go | 5 +- .../v1beta2/zz_generated.deepcopy.go | 1 + apis/web/v1beta1/zz_generated.deepcopy.go | 6 + .../zz_sourcecontroltoken_terraformed.go | 2 +- .../v1beta1/zz_sourcecontroltoken_types.go | 6 + .../web/v1beta2/zz_functionapp_terraformed.go | 2 +- apis/web/v1beta2/zz_functionapp_types.go | 31 +- .../v1beta2/zz_functionappslot_terraformed.go | 2 +- apis/web/v1beta2/zz_functionappslot_types.go | 31 +- apis/web/v1beta2/zz_generated.deepcopy.go | 390 ++++++++++++++++++ .../zz_linuxfunctionapp_terraformed.go | 2 +- apis/web/v1beta2/zz_linuxfunctionapp_types.go | 61 ++- .../zz_linuxfunctionappslot_terraformed.go | 2 +- .../v1beta2/zz_linuxfunctionappslot_types.go | 61 ++- .../web/v1beta2/zz_linuxwebapp_terraformed.go | 2 +- apis/web/v1beta2/zz_linuxwebapp_types.go | 49 ++- .../v1beta2/zz_linuxwebappslot_terraformed.go | 2 +- apis/web/v1beta2/zz_linuxwebappslot_types.go | 49 ++- .../zz_windowsfunctionapp_terraformed.go | 2 +- .../v1beta2/zz_windowsfunctionapp_types.go | 53 ++- .../zz_windowsfunctionappslot_terraformed.go | 2 +- .../zz_windowsfunctionappslot_types.go | 53 ++- .../v1beta2/zz_windowswebapp_terraformed.go | 2 +- apis/web/v1beta2/zz_windowswebapp_types.go | 49 ++- .../zz_windowswebappslot_terraformed.go | 2 +- .../web/v1beta2/zz_windowswebappslot_types.go | 49 ++- cmd/provider/alertsmanagement/zz_main.go | 2 +- cmd/provider/analysisservices/zz_main.go | 2 +- cmd/provider/apimanagement/zz_main.go | 2 +- cmd/provider/appconfiguration/zz_main.go | 2 +- cmd/provider/appplatform/zz_main.go | 2 +- cmd/provider/attestation/zz_main.go | 2 +- cmd/provider/authorization/zz_main.go | 2 +- cmd/provider/automation/zz_main.go | 2 +- cmd/provider/azure/zz_main.go | 2 +- cmd/provider/azurestackhci/zz_main.go | 2 +- cmd/provider/botservice/zz_main.go | 2 +- cmd/provider/cache/zz_main.go | 2 +- cmd/provider/cdn/zz_main.go | 2 +- .../certificateregistration/zz_main.go | 2 +- cmd/provider/cognitiveservices/zz_main.go | 2 +- cmd/provider/communication/zz_main.go | 2 +- cmd/provider/compute/zz_main.go | 2 +- cmd/provider/confidentialledger/zz_main.go | 2 +- cmd/provider/config/zz_main.go | 2 +- cmd/provider/consumption/zz_main.go | 2 +- cmd/provider/containerapp/zz_main.go | 2 +- cmd/provider/containerregistry/zz_main.go | 2 +- cmd/provider/containerservice/zz_main.go | 2 +- cmd/provider/cosmosdb/zz_main.go | 2 +- cmd/provider/costmanagement/zz_main.go | 2 +- cmd/provider/customproviders/zz_main.go | 2 +- cmd/provider/databoxedge/zz_main.go | 2 +- cmd/provider/databricks/zz_main.go | 2 +- cmd/provider/datafactory/zz_main.go | 2 +- cmd/provider/datamigration/zz_main.go | 2 +- cmd/provider/dataprotection/zz_main.go | 2 +- cmd/provider/datashare/zz_main.go | 2 +- cmd/provider/dbformariadb/zz_main.go | 2 +- cmd/provider/dbformysql/zz_main.go | 2 +- cmd/provider/dbforpostgresql/zz_main.go | 2 +- cmd/provider/devices/zz_main.go | 2 +- cmd/provider/deviceupdate/zz_main.go | 2 +- cmd/provider/devtestlab/zz_main.go | 2 +- cmd/provider/digitaltwins/zz_main.go | 2 +- cmd/provider/elastic/zz_main.go | 2 +- cmd/provider/eventgrid/zz_main.go | 2 +- cmd/provider/eventhub/zz_main.go | 2 +- cmd/provider/fluidrelay/zz_main.go | 2 +- cmd/provider/guestconfiguration/zz_main.go | 2 +- cmd/provider/hdinsight/zz_main.go | 2 +- cmd/provider/healthbot/zz_main.go | 2 +- cmd/provider/healthcareapis/zz_main.go | 2 +- cmd/provider/insights/zz_main.go | 2 +- cmd/provider/iotcentral/zz_main.go | 2 +- cmd/provider/keyvault/zz_main.go | 2 +- cmd/provider/kusto/zz_main.go | 2 +- cmd/provider/labservices/zz_main.go | 2 +- cmd/provider/loadtestservice/zz_main.go | 2 +- cmd/provider/logic/zz_main.go | 2 +- cmd/provider/logz/zz_main.go | 2 +- .../machinelearningservices/zz_main.go | 2 +- cmd/provider/maintenance/zz_main.go | 2 +- cmd/provider/managedidentity/zz_main.go | 2 +- cmd/provider/management/zz_main.go | 2 +- cmd/provider/maps/zz_main.go | 2 +- cmd/provider/marketplaceordering/zz_main.go | 2 +- cmd/provider/media/zz_main.go | 2 +- cmd/provider/mixedreality/zz_main.go | 2 +- cmd/provider/monolith/zz_main.go | 2 +- cmd/provider/netapp/zz_main.go | 2 +- cmd/provider/network/zz_main.go | 2 +- cmd/provider/notificationhubs/zz_main.go | 2 +- cmd/provider/operationalinsights/zz_main.go | 2 +- cmd/provider/operationsmanagement/zz_main.go | 2 +- cmd/provider/orbital/zz_main.go | 2 +- cmd/provider/policyinsights/zz_main.go | 2 +- cmd/provider/portal/zz_main.go | 2 +- cmd/provider/powerbidedicated/zz_main.go | 2 +- cmd/provider/purview/zz_main.go | 2 +- cmd/provider/recoveryservices/zz_main.go | 2 +- cmd/provider/relay/zz_main.go | 2 +- cmd/provider/resources/zz_main.go | 2 +- cmd/provider/search/zz_main.go | 2 +- cmd/provider/security/zz_main.go | 2 +- cmd/provider/securityinsights/zz_main.go | 2 +- cmd/provider/servicebus/zz_main.go | 2 +- cmd/provider/servicefabric/zz_main.go | 2 +- cmd/provider/servicelinker/zz_main.go | 2 +- cmd/provider/signalrservice/zz_main.go | 2 +- cmd/provider/solutions/zz_main.go | 2 +- cmd/provider/spring/zz_main.go | 2 +- cmd/provider/sql/zz_main.go | 2 +- cmd/provider/storage/zz_main.go | 2 +- cmd/provider/storagecache/zz_main.go | 2 +- cmd/provider/storagepool/zz_main.go | 2 +- cmd/provider/storagesync/zz_main.go | 2 +- cmd/provider/streamanalytics/zz_main.go | 2 +- cmd/provider/synapse/zz_main.go | 2 +- cmd/provider/timeseriesinsights/zz_main.go | 2 +- cmd/provider/web/zz_main.go | 2 +- ...ysisservices.azure.upbound.io_servers.yaml | 17 + ...azure.upbound.io_authorizationservers.yaml | 35 ++ ...imanagement.azure.upbound.io_backends.yaml | 17 + ...agement.azure.upbound.io_certificates.yaml | 35 ++ ...gement.azure.upbound.io_customdomains.yaml | 180 ++++++++ ...azure.upbound.io_identityprovideraads.yaml | 20 + ....upbound.io_identityproviderfacebooks.yaml | 19 + ...re.upbound.io_identityprovidergoogles.yaml | 19 + ...upbound.io_identityprovidermicrosofts.yaml | 19 + ...e.upbound.io_identityprovidertwitters.yaml | 37 ++ ...pimanagement.azure.upbound.io_loggers.yaml | 42 +- ...nagement.azure.upbound.io_managements.yaml | 57 ++- ...nagement.azure.upbound.io_namedvalues.yaml | 17 + ...ure.upbound.io_openidconnectproviders.yaml | 37 ++ ...nagement.azure.upbound.io_rediscaches.yaml | 19 + ...gement.azure.upbound.io_subscriptions.yaml | 34 ++ .../apimanagement.azure.upbound.io_users.yaml | 17 + ...nd.io_springcloudappmysqlassociations.yaml | 20 + ...d.io_springcloudconfigurationservices.yaml | 35 ++ ....io_springcloudcustomizedaccelerators.yaml | 62 ++- ....azure.upbound.io_springcloudgateways.yaml | 4 + ....azure.upbound.io_springcloudservices.yaml | 150 ++++++- ...tomation.azure.upbound.io_credentials.yaml | 19 + .../automation.azure.upbound.io_webhooks.yaml | 20 + ...vice.azure.upbound.io_botchannellines.yaml | 46 ++- ...ice.azure.upbound.io_botchannelslacks.yaml | 57 +++ ...ervice.azure.upbound.io_botchannelsms.yaml | 19 + ...e.upbound.io_botchannelsregistrations.yaml | 18 + ...rvice.azure.upbound.io_botconnections.yaml | 20 + ...otservice.azure.upbound.io_botwebapps.yaml | 35 ++ .../cache.azure.upbound.io_rediscaches.yaml | 54 +++ ...iveservices.azure.upbound.io_accounts.yaml | 18 + ...azure.upbound.io_linuxvirtualmachines.yaml | 38 ++ ...bound.io_linuxvirtualmachinescalesets.yaml | 55 +++ ...o_orchestratedvirtualmachinescalesets.yaml | 120 +++++- ...e.upbound.io_virtualmachineextensions.yaml | 18 + ....upbound.io_virtualmachineruncommands.yaml | 167 +++++++- ...ure.upbound.io_windowsvirtualmachines.yaml | 63 ++- ...und.io_windowsvirtualmachinescalesets.yaml | 80 +++- ...nerapp.azure.upbound.io_containerapps.yaml | 48 ++- ...inerapp.azure.upbound.io_environments.yaml | 19 + ...e.azure.upbound.io_kubernetesclusters.yaml | 75 +++- ...db.azure.upbound.io_cassandraclusters.yaml | 20 + ...pbound.io_integrationruntimeazuressis.yaml | 74 +++- ...upbound.io_integrationruntimemanageds.yaml | 40 +- ...und.io_linkedserviceazureblobstorages.yaml | 54 +++ ...bound.io_linkedserviceazuredatabricks.yaml | 17 + ...und.io_linkedserviceazurefilestorages.yaml | 36 ++ ...pbound.io_linkedserviceazurefunctions.yaml | 18 + ...nd.io_linkedserviceazuretablestorages.yaml | 19 + ...und.io_linkedservicecosmosdbmongoapis.yaml | 17 + ...ure.upbound.io_linkedservicecosmosdbs.yaml | 36 ++ ...azure.upbound.io_linkedservicekustoes.yaml | 18 + ...y.azure.upbound.io_linkedserviceodata.yaml | 22 +- ...y.azure.upbound.io_linkedserviceodbcs.yaml | 22 +- ...y.azure.upbound.io_linkedservicesftps.yaml | 19 + ...ry.azure.upbound.io_linkedservicewebs.yaml | 18 + ...dbformariadb.azure.upbound.io_servers.yaml | 18 + ...ysql.azure.upbound.io_flexibleservers.yaml | 19 + .../dbformysql.azure.upbound.io_servers.yaml | 36 ++ ...esql.azure.upbound.io_flexibleservers.yaml | 19 + ...orpostgresql.azure.upbound.io_servers.yaml | 36 ++ ...s.azure.upbound.io_iothubcertificates.yaml | 20 + .../devices.azure.upbound.io_iothubdps.yaml | 22 +- ...zure.upbound.io_iothubdpscertificates.yaml | 20 + ...re.upbound.io_iothubendpointeventhubs.yaml | 19 + ...und.io_iothubendpointservicebusqueues.yaml | 19 + ...und.io_iothubendpointservicebustopics.yaml | 19 + ...nd.io_iothubendpointstoragecontainers.yaml | 19 + .../devices.azure.upbound.io_iothubs.yaml | 22 +- ...pbound.io_iothubdeviceupdateinstances.yaml | 21 +- ...azure.upbound.io_linuxvirtualmachines.yaml | 19 + ...ure.upbound.io_windowsvirtualmachines.yaml | 21 + ...d.azure.upbound.io_eventsubscriptions.yaml | 18 + ...sight.azure.upbound.io_hadoopclusters.yaml | 235 ++++++++++- ...nsight.azure.upbound.io_hbaseclusters.yaml | 235 ++++++++++- ...e.upbound.io_interactivequeryclusters.yaml | 235 ++++++++++- ...nsight.azure.upbound.io_kafkaclusters.yaml | 254 +++++++++++- ...nsight.azure.upbound.io_sparkclusters.yaml | 235 ++++++++++- ...t.azure.upbound.io_certificateissuers.yaml | 19 + ...eyvault.azure.upbound.io_certificates.yaml | 41 +- .../keyvault.azure.upbound.io_secrets.yaml | 20 + ...vices.azure.upbound.io_labservicelabs.yaml | 42 +- ...a.azure.upbound.io_contentkeypolicies.yaml | 214 ++++++++++ .../netapp.azure.upbound.io_accounts.yaml | 21 +- ....azure.upbound.io_applicationgateways.yaml | 98 ++++- ...und.io_expressroutecircuitconnections.yaml | 18 + ...pbound.io_expressroutecircuitpeerings.yaml | 17 + ...azure.upbound.io_expressroutecircuits.yaml | 19 + ...d.io_virtualnetworkgatewayconnections.yaml | 37 ++ ...ure.upbound.io_virtualnetworkgateways.yaml | 22 +- ...re.upbound.io_vpnserverconfigurations.yaml | 22 +- ...ubs.azure.upbound.io_notificationhubs.yaml | 49 ++- ...o_resourcedeploymentscriptazureclicli.yaml | 39 +- ...ourcedeploymentscriptazurepowershells.yaml | 39 +- ...bric.azure.upbound.io_managedclusters.yaml | 18 + ...ure.upbound.io_springcloudconnections.yaml | 37 ++ ...mssqldatabaseextendedauditingpolicies.yaml | 17 + .../sql.azure.upbound.io_mssqldatabases.yaml | 58 ++- ....azure.upbound.io_mssqljobcredentials.yaml | 19 + ...zure.upbound.io_mssqlmanagedinstances.yaml | 20 + ...nagedinstancevulnerabilityassessments.yaml | 39 ++ ...ervermicrosoftsupportauditingpolicies.yaml | 35 ++ .../sql.azure.upbound.io_mssqlservers.yaml | 20 + ...d.io_mssqlserversecurityalertpolicies.yaml | 19 + ...o_mssqlservervulnerabilityassessments.yaml | 39 ++ ...oragecache.azure.upbound.io_hpccaches.yaml | 43 +- ...streamanalytics.azure.upbound.io_jobs.yaml | 21 +- ...nalytics.azure.upbound.io_outputblobs.yaml | 18 + ...tics.azure.upbound.io_outputeventhubs.yaml | 18 + ...tics.azure.upbound.io_outputfunctions.yaml | 19 + ...alytics.azure.upbound.io_outputmssqls.yaml | 19 + ...ure.upbound.io_outputservicebusqueues.yaml | 18 + ...ure.upbound.io_outputservicebustopics.yaml | 18 + ...ytics.azure.upbound.io_outputsynapses.yaml | 20 + ...alytics.azure.upbound.io_outputtables.yaml | 20 + ....azure.upbound.io_referenceinputblobs.yaml | 18 + ...azure.upbound.io_referenceinputmssqls.yaml | 19 + ...ics.azure.upbound.io_streaminputblobs.yaml | 20 + ...azure.upbound.io_streaminputeventhubs.yaml | 18 + ...s.azure.upbound.io_streaminputiothubs.yaml | 20 + ...nd.io_sqlpoolextendedauditingpolicies.yaml | 17 + ...bound.io_sqlpoolsecurityalertpolicies.yaml | 18 + ....io_workspaceextendedauditingpolicies.yaml | 17 + .../synapse.azure.upbound.io_workspaces.yaml | 19 + ...und.io_workspacesecurityalertpolicies.yaml | 18 + ....io_workspacevulnerabilityassessments.yaml | 39 ++ ...azure.upbound.io_eventsourceeventhubs.yaml | 21 + ...s.azure.upbound.io_eventsourceiothubs.yaml | 21 + ...hts.azure.upbound.io_gen2environments.yaml | 22 +- .../web.azure.upbound.io_functionapps.yaml | 147 ++++++- ...web.azure.upbound.io_functionappslots.yaml | 147 ++++++- ...eb.azure.upbound.io_linuxfunctionapps.yaml | 276 ++++++++++++- ...zure.upbound.io_linuxfunctionappslots.yaml | 276 ++++++++++++- .../web.azure.upbound.io_linuxwebapps.yaml | 221 +++++++++- ...web.azure.upbound.io_linuxwebappslots.yaml | 221 +++++++++- ....azure.upbound.io_sourcecontroltokens.yaml | 36 ++ ....azure.upbound.io_windowsfunctionapps.yaml | 238 ++++++++++- ...re.upbound.io_windowsfunctionappslots.yaml | 238 ++++++++++- .../web.azure.upbound.io_windowswebapps.yaml | 221 +++++++++- ...b.azure.upbound.io_windowswebappslots.yaml | 221 +++++++++- 565 files changed, 10324 insertions(+), 621 deletions(-) diff --git a/apis/analysisservices/v1beta1/zz_generated.deepcopy.go b/apis/analysisservices/v1beta1/zz_generated.deepcopy.go index 3280b1e55..b7eea6862 100644 --- a/apis/analysisservices/v1beta1/zz_generated.deepcopy.go +++ b/apis/analysisservices/v1beta1/zz_generated.deepcopy.go @@ -144,6 +144,11 @@ func (in *ServerInitParameters) DeepCopyInto(out *ServerInitParameters) { } } } + if in.BackupBlobContainerURISecretRef != nil { + in, out := &in.BackupBlobContainerURISecretRef, &out.BackupBlobContainerURISecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.EnablePowerBiService != nil { in, out := &in.EnablePowerBiService, &out.EnablePowerBiService *out = new(bool) diff --git a/apis/analysisservices/v1beta1/zz_server_terraformed.go b/apis/analysisservices/v1beta1/zz_server_terraformed.go index b003bff0e..9f86ebc52 100755 --- a/apis/analysisservices/v1beta1/zz_server_terraformed.go +++ b/apis/analysisservices/v1beta1/zz_server_terraformed.go @@ -21,7 +21,7 @@ func (mg *Server) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Server func (tr *Server) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"backup_blob_container_uri": "spec.forProvider.backupBlobContainerUriSecretRef"} + return map[string]string{"backup_blob_container_uri": "backupBlobContainerUriSecretRef"} } // GetObservation of this Server diff --git a/apis/analysisservices/v1beta1/zz_server_types.go b/apis/analysisservices/v1beta1/zz_server_types.go index 668f42a49..217dc068a 100755 --- a/apis/analysisservices/v1beta1/zz_server_types.go +++ b/apis/analysisservices/v1beta1/zz_server_types.go @@ -58,6 +58,9 @@ type ServerInitParameters struct { // +listType=set AdminUsers []*string `json:"adminUsers,omitempty" tf:"admin_users,omitempty"` + // URI and SAS token for a blob container to store backups. + BackupBlobContainerURISecretRef *v1.SecretKeySelector `json:"backupBlobContainerUriSecretRef,omitempty" tf:"-"` + // Indicates if the Power BI service is allowed to access or not. EnablePowerBiService *bool `json:"enablePowerBiService,omitempty" tf:"enable_power_bi_service,omitempty"` diff --git a/apis/apimanagement/v1beta1/zz_authorizationserver_terraformed.go b/apis/apimanagement/v1beta1/zz_authorizationserver_terraformed.go index 238783240..d6705f1d5 100755 --- a/apis/apimanagement/v1beta1/zz_authorizationserver_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_authorizationserver_terraformed.go @@ -21,7 +21,7 @@ func (mg *AuthorizationServer) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this AuthorizationServer func (tr *AuthorizationServer) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"client_secret": "spec.forProvider.clientSecretSecretRef", "resource_owner_password": "spec.forProvider.resourceOwnerPasswordSecretRef"} + return map[string]string{"client_secret": "clientSecretSecretRef", "resource_owner_password": "resourceOwnerPasswordSecretRef"} } // GetObservation of this AuthorizationServer diff --git a/apis/apimanagement/v1beta1/zz_authorizationserver_types.go b/apis/apimanagement/v1beta1/zz_authorizationserver_types.go index 02de11767..2c843031f 100755 --- a/apis/apimanagement/v1beta1/zz_authorizationserver_types.go +++ b/apis/apimanagement/v1beta1/zz_authorizationserver_types.go @@ -36,6 +36,9 @@ type AuthorizationServerInitParameters struct { // The URI of page where Client/App Registration is performed for this Authorization Server. ClientRegistrationEndpoint *string `json:"clientRegistrationEndpoint,omitempty" tf:"client_registration_endpoint,omitempty"` + // The Client/App Secret registered with this Authorization Server. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The Default Scope used when requesting an Access Token, specified as a string containing space-delimited values. DefaultScope *string `json:"defaultScope,omitempty" tf:"default_scope,omitempty"` @@ -49,6 +52,9 @@ type AuthorizationServerInitParameters struct { // +listType=set GrantTypes []*string `json:"grantTypes,omitempty" tf:"grant_types,omitempty"` + // The password associated with the Resource Owner. + ResourceOwnerPasswordSecretRef *v1.SecretKeySelector `json:"resourceOwnerPasswordSecretRef,omitempty" tf:"-"` + // The username associated with the Resource Owner. ResourceOwnerUsername *string `json:"resourceOwnerUsername,omitempty" tf:"resource_owner_username,omitempty"` diff --git a/apis/apimanagement/v1beta1/zz_certificate_terraformed.go b/apis/apimanagement/v1beta1/zz_certificate_terraformed.go index 8fa442166..1599356c1 100755 --- a/apis/apimanagement/v1beta1/zz_certificate_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_certificate_terraformed.go @@ -21,7 +21,7 @@ func (mg *Certificate) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Certificate func (tr *Certificate) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"data": "spec.forProvider.dataSecretRef", "password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"data": "dataSecretRef", "password": "passwordSecretRef"} } // GetObservation of this Certificate diff --git a/apis/apimanagement/v1beta1/zz_certificate_types.go b/apis/apimanagement/v1beta1/zz_certificate_types.go index 968810d5a..c3eeefefe 100755 --- a/apis/apimanagement/v1beta1/zz_certificate_types.go +++ b/apis/apimanagement/v1beta1/zz_certificate_types.go @@ -15,6 +15,9 @@ import ( type CertificateInitParameters_2 struct { + // The base-64 encoded certificate data, which must be a PFX file. + DataSecretRef *v1.SecretKeySelector `json:"dataSecretRef,omitempty" tf:"-"` + // The Client ID of the User Assigned Managed Identity to use for retrieving certificate. KeyVaultIdentityClientID *string `json:"keyVaultIdentityClientId,omitempty" tf:"key_vault_identity_client_id,omitempty"` @@ -30,6 +33,9 @@ type CertificateInitParameters_2 struct { // Selector for a Certificate in keyvault to populate keyVaultSecretId. // +kubebuilder:validation:Optional KeyVaultSecretIDSelector *v1.Selector `json:"keyVaultSecretIdSelector,omitempty" tf:"-"` + + // The password used for this certificate. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` } type CertificateObservation_2 struct { diff --git a/apis/apimanagement/v1beta1/zz_customdomain_terraformed.go b/apis/apimanagement/v1beta1/zz_customdomain_terraformed.go index 545b6ebf8..5ab9da0e8 100755 --- a/apis/apimanagement/v1beta1/zz_customdomain_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_customdomain_terraformed.go @@ -21,7 +21,7 @@ func (mg *CustomDomain) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this CustomDomain func (tr *CustomDomain) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"developer_portal[*].certificate": "spec.forProvider.developerPortal[*].certificateSecretRef", "developer_portal[*].certificate_password": "spec.forProvider.developerPortal[*].certificatePasswordSecretRef", "gateway[*].certificate": "spec.forProvider.gateway[*].certificateSecretRef", "gateway[*].certificate_password": "spec.forProvider.gateway[*].certificatePasswordSecretRef", "management[*].certificate": "spec.forProvider.management[*].certificateSecretRef", "management[*].certificate_password": "spec.forProvider.management[*].certificatePasswordSecretRef", "portal[*].certificate": "spec.forProvider.portal[*].certificateSecretRef", "portal[*].certificate_password": "spec.forProvider.portal[*].certificatePasswordSecretRef", "scm[*].certificate": "spec.forProvider.scm[*].certificateSecretRef", "scm[*].certificate_password": "spec.forProvider.scm[*].certificatePasswordSecretRef"} + return map[string]string{"developer_portal[*].certificate": "developerPortal[*].certificateSecretRef", "developer_portal[*].certificate_password": "developerPortal[*].certificatePasswordSecretRef", "gateway[*].certificate": "gateway[*].certificateSecretRef", "gateway[*].certificate_password": "gateway[*].certificatePasswordSecretRef", "management[*].certificate": "management[*].certificateSecretRef", "management[*].certificate_password": "management[*].certificatePasswordSecretRef", "portal[*].certificate": "portal[*].certificateSecretRef", "portal[*].certificate_password": "portal[*].certificatePasswordSecretRef", "scm[*].certificate": "scm[*].certificateSecretRef", "scm[*].certificate_password": "scm[*].certificatePasswordSecretRef"} } // GetObservation of this CustomDomain diff --git a/apis/apimanagement/v1beta1/zz_customdomain_types.go b/apis/apimanagement/v1beta1/zz_customdomain_types.go index 7539c1e6c..ff7ee70a7 100755 --- a/apis/apimanagement/v1beta1/zz_customdomain_types.go +++ b/apis/apimanagement/v1beta1/zz_customdomain_types.go @@ -15,6 +15,12 @@ import ( type CustomDomainDeveloperPortalInitParameters struct { + // The password associated with the certificate provided above. + CertificatePasswordSecretRef *v1.SecretKeySelector `json:"certificatePasswordSecretRef,omitempty" tf:"-"` + + // The Base64 Encoded Certificate. (Mutually exclusive with key_vault_id.) + CertificateSecretRef *v1.SecretKeySelector `json:"certificateSecretRef,omitempty" tf:"-"` + // The Hostname to use for the corresponding endpoint. HostName *string `json:"hostName,omitempty" tf:"host_name,omitempty"` @@ -119,6 +125,12 @@ type CustomDomainInitParameters struct { type CustomDomainManagementInitParameters struct { + // The password associated with the certificate provided above. + CertificatePasswordSecretRef *v1.SecretKeySelector `json:"certificatePasswordSecretRef,omitempty" tf:"-"` + + // The Base64 Encoded Certificate. (Mutually exclusive with key_vault_id.) + CertificateSecretRef *v1.SecretKeySelector `json:"certificateSecretRef,omitempty" tf:"-"` + // The Hostname to use for the API Proxy Endpoint. HostName *string `json:"hostName,omitempty" tf:"host_name,omitempty"` @@ -246,6 +258,12 @@ type CustomDomainParameters struct { type CustomDomainPortalInitParameters struct { + // The password associated with the certificate provided above. + CertificatePasswordSecretRef *v1.SecretKeySelector `json:"certificatePasswordSecretRef,omitempty" tf:"-"` + + // The Base64 Encoded Certificate. (Mutually exclusive with key_vault_id.) + CertificateSecretRef *v1.SecretKeySelector `json:"certificateSecretRef,omitempty" tf:"-"` + // The Hostname to use for the API Proxy Endpoint. HostName *string `json:"hostName,omitempty" tf:"host_name,omitempty"` @@ -312,6 +330,12 @@ type CustomDomainPortalParameters struct { type CustomDomainScmInitParameters struct { + // The password associated with the certificate provided above. + CertificatePasswordSecretRef *v1.SecretKeySelector `json:"certificatePasswordSecretRef,omitempty" tf:"-"` + + // The Base64 Encoded Certificate. (Mutually exclusive with key_vault_id.) + CertificateSecretRef *v1.SecretKeySelector `json:"certificateSecretRef,omitempty" tf:"-"` + // The Hostname to use for the API Proxy Endpoint. HostName *string `json:"hostName,omitempty" tf:"host_name,omitempty"` @@ -378,6 +402,12 @@ type CustomDomainScmParameters struct { type GatewayInitParameters struct { + // The password associated with the certificate provided above. + CertificatePasswordSecretRef *v1.SecretKeySelector `json:"certificatePasswordSecretRef,omitempty" tf:"-"` + + // The Base64 Encoded Certificate. (Mutually exclusive with key_vault_id.) + CertificateSecretRef *v1.SecretKeySelector `json:"certificateSecretRef,omitempty" tf:"-"` + // Is the certificate associated with this Hostname the Default SSL Certificate? This is used when an SNI header isn't specified by a client. Defaults to false. DefaultSSLBinding *bool `json:"defaultSslBinding,omitempty" tf:"default_ssl_binding,omitempty"` diff --git a/apis/apimanagement/v1beta1/zz_generated.deepcopy.go b/apis/apimanagement/v1beta1/zz_generated.deepcopy.go index 07d0b620a..b3cc493b2 100644 --- a/apis/apimanagement/v1beta1/zz_generated.deepcopy.go +++ b/apis/apimanagement/v1beta1/zz_generated.deepcopy.go @@ -3229,6 +3229,11 @@ func (in *AuthorizationServerInitParameters) DeepCopyInto(out *AuthorizationServ *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DefaultScope != nil { in, out := &in.DefaultScope, &out.DefaultScope *out = new(string) @@ -3255,6 +3260,11 @@ func (in *AuthorizationServerInitParameters) DeepCopyInto(out *AuthorizationServ } } } + if in.ResourceOwnerPasswordSecretRef != nil { + in, out := &in.ResourceOwnerPasswordSecretRef, &out.ResourceOwnerPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ResourceOwnerUsername != nil { in, out := &in.ResourceOwnerUsername, &out.ResourceOwnerUsername *out = new(string) @@ -4808,6 +4818,11 @@ func (in *CertificateInitParameters) DeepCopy() *CertificateInitParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *CertificateInitParameters_2) DeepCopyInto(out *CertificateInitParameters_2) { *out = *in + if in.DataSecretRef != nil { + in, out := &in.DataSecretRef, &out.DataSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.KeyVaultIdentityClientID != nil { in, out := &in.KeyVaultIdentityClientID, &out.KeyVaultIdentityClientID *out = new(string) @@ -4828,6 +4843,11 @@ func (in *CertificateInitParameters_2) DeepCopyInto(out *CertificateInitParamete *out = new(v1.Selector) (*in).DeepCopyInto(*out) } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CertificateInitParameters_2. @@ -5413,6 +5433,16 @@ func (in *CustomDomain) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *CustomDomainDeveloperPortalInitParameters) DeepCopyInto(out *CustomDomainDeveloperPortalInitParameters) { *out = *in + if in.CertificatePasswordSecretRef != nil { + in, out := &in.CertificatePasswordSecretRef, &out.CertificatePasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.CertificateSecretRef != nil { + in, out := &in.CertificateSecretRef, &out.CertificateSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.HostName != nil { in, out := &in.HostName, &out.HostName *out = new(string) @@ -5655,6 +5685,16 @@ func (in *CustomDomainList) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *CustomDomainManagementInitParameters) DeepCopyInto(out *CustomDomainManagementInitParameters) { *out = *in + if in.CertificatePasswordSecretRef != nil { + in, out := &in.CertificatePasswordSecretRef, &out.CertificatePasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.CertificateSecretRef != nil { + in, out := &in.CertificateSecretRef, &out.CertificateSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.HostName != nil { in, out := &in.HostName, &out.HostName *out = new(string) @@ -5920,6 +5960,16 @@ func (in *CustomDomainParameters) DeepCopy() *CustomDomainParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *CustomDomainPortalInitParameters) DeepCopyInto(out *CustomDomainPortalInitParameters) { *out = *in + if in.CertificatePasswordSecretRef != nil { + in, out := &in.CertificatePasswordSecretRef, &out.CertificatePasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.CertificateSecretRef != nil { + in, out := &in.CertificateSecretRef, &out.CertificateSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.HostName != nil { in, out := &in.HostName, &out.HostName *out = new(string) @@ -6060,6 +6110,16 @@ func (in *CustomDomainPortalParameters) DeepCopy() *CustomDomainPortalParameters // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *CustomDomainScmInitParameters) DeepCopyInto(out *CustomDomainScmInitParameters) { *out = *in + if in.CertificatePasswordSecretRef != nil { + in, out := &in.CertificatePasswordSecretRef, &out.CertificatePasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.CertificateSecretRef != nil { + in, out := &in.CertificateSecretRef, &out.CertificateSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.HostName != nil { in, out := &in.HostName, &out.HostName *out = new(string) @@ -9783,6 +9843,16 @@ func (in *GatewayAPIStatus) DeepCopy() *GatewayAPIStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *GatewayInitParameters) DeepCopyInto(out *GatewayInitParameters) { *out = *in + if in.CertificatePasswordSecretRef != nil { + in, out := &in.CertificatePasswordSecretRef, &out.CertificatePasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.CertificateSecretRef != nil { + in, out := &in.CertificateSecretRef, &out.CertificateSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DefaultSSLBinding != nil { in, out := &in.DefaultSSLBinding, &out.DefaultSSLBinding *out = new(bool) @@ -11090,6 +11160,7 @@ func (in *IdentityProviderAADInitParameters) DeepCopyInto(out *IdentityProviderA *out = new(string) **out = **in } + out.ClientSecretSecretRef = in.ClientSecretSecretRef if in.SigninTenant != nil { in, out := &in.SigninTenant, &out.SigninTenant *out = new(string) @@ -11342,6 +11413,7 @@ func (in *IdentityProviderFacebookInitParameters) DeepCopyInto(out *IdentityProv *out = new(string) **out = **in } + out.AppSecretSecretRef = in.AppSecretSecretRef if in.ResourceGroupName != nil { in, out := &in.ResourceGroupName, &out.ResourceGroupName *out = new(string) @@ -11572,6 +11644,7 @@ func (in *IdentityProviderGoogleInitParameters) DeepCopyInto(out *IdentityProvid *out = new(string) **out = **in } + out.ClientSecretSecretRef = in.ClientSecretSecretRef if in.ResourceGroupName != nil { in, out := &in.ResourceGroupName, &out.ResourceGroupName *out = new(string) @@ -11802,6 +11875,7 @@ func (in *IdentityProviderMicrosoftInitParameters) DeepCopyInto(out *IdentityPro *out = new(string) **out = **in } + out.ClientSecretSecretRef = in.ClientSecretSecretRef if in.ResourceGroupName != nil { in, out := &in.ResourceGroupName, &out.ResourceGroupName *out = new(string) @@ -12012,6 +12086,7 @@ func (in *IdentityProviderTwitter) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *IdentityProviderTwitterInitParameters) DeepCopyInto(out *IdentityProviderTwitterInitParameters) { *out = *in + out.APIKeySecretRef = in.APIKeySecretRef if in.APIManagementName != nil { in, out := &in.APIManagementName, &out.APIManagementName *out = new(string) @@ -12027,6 +12102,7 @@ func (in *IdentityProviderTwitterInitParameters) DeepCopyInto(out *IdentityProvi *out = new(v1.Selector) (*in).DeepCopyInto(*out) } + out.APISecretKeySecretRef = in.APISecretKeySecretRef if in.ResourceGroupName != nil { in, out := &in.ResourceGroupName, &out.ResourceGroupName *out = new(string) @@ -14423,6 +14499,8 @@ func (in *OpenIDConnectProvider) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *OpenIDConnectProviderInitParameters) DeepCopyInto(out *OpenIDConnectProviderInitParameters) { *out = *in + out.ClientIDSecretRef = in.ClientIDSecretRef + out.ClientSecretSecretRef = in.ClientSecretSecretRef if in.Description != nil { in, out := &in.Description, &out.Description *out = new(string) @@ -16603,6 +16681,7 @@ func (in *RedisCacheInitParameters) DeepCopyInto(out *RedisCacheInitParameters) *out = new(string) **out = **in } + out.ConnectionStringSecretRef = in.ConnectionStringSecretRef if in.Description != nil { in, out := &in.Description, &out.Description *out = new(string) @@ -18893,6 +18972,11 @@ func (in *SubscriptionInitParameters) DeepCopyInto(out *SubscriptionInitParamete *out = new(bool) **out = **in } + if in.PrimaryKeySecretRef != nil { + in, out := &in.PrimaryKeySecretRef, &out.PrimaryKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ProductID != nil { in, out := &in.ProductID, &out.ProductID *out = new(string) @@ -18908,6 +18992,11 @@ func (in *SubscriptionInitParameters) DeepCopyInto(out *SubscriptionInitParamete *out = new(v1.Selector) (*in).DeepCopyInto(*out) } + if in.SecondaryKeySecretRef != nil { + in, out := &in.SecondaryKeySecretRef, &out.SecondaryKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.State != nil { in, out := &in.State, &out.State *out = new(string) @@ -20115,6 +20204,11 @@ func (in *UserInitParameters) DeepCopyInto(out *UserInitParameters) { *out = new(string) **out = **in } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.State != nil { in, out := &in.State, &out.State *out = new(string) diff --git a/apis/apimanagement/v1beta1/zz_identityprovideraad_terraformed.go b/apis/apimanagement/v1beta1/zz_identityprovideraad_terraformed.go index 87d3a9841..d9a4b0911 100755 --- a/apis/apimanagement/v1beta1/zz_identityprovideraad_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_identityprovideraad_terraformed.go @@ -21,7 +21,7 @@ func (mg *IdentityProviderAAD) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IdentityProviderAAD func (tr *IdentityProviderAAD) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"client_secret": "spec.forProvider.clientSecretSecretRef"} + return map[string]string{"client_secret": "clientSecretSecretRef"} } // GetObservation of this IdentityProviderAAD diff --git a/apis/apimanagement/v1beta1/zz_identityprovideraad_types.go b/apis/apimanagement/v1beta1/zz_identityprovideraad_types.go index 3718bfbbc..c5cd4007b 100755 --- a/apis/apimanagement/v1beta1/zz_identityprovideraad_types.go +++ b/apis/apimanagement/v1beta1/zz_identityprovideraad_types.go @@ -21,6 +21,9 @@ type IdentityProviderAADInitParameters struct { // Client Id of the Application in the AAD Identity Provider. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // Client secret of the Application in the AAD Identity Provider. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` + // The AAD Tenant to use instead of Common when logging into Active Directory SigninTenant *string `json:"signinTenant,omitempty" tf:"signin_tenant,omitempty"` } diff --git a/apis/apimanagement/v1beta1/zz_identityproviderfacebook_terraformed.go b/apis/apimanagement/v1beta1/zz_identityproviderfacebook_terraformed.go index 6209b59f9..151fedcd7 100755 --- a/apis/apimanagement/v1beta1/zz_identityproviderfacebook_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_identityproviderfacebook_terraformed.go @@ -21,7 +21,7 @@ func (mg *IdentityProviderFacebook) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IdentityProviderFacebook func (tr *IdentityProviderFacebook) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"app_secret": "spec.forProvider.appSecretSecretRef"} + return map[string]string{"app_secret": "appSecretSecretRef"} } // GetObservation of this IdentityProviderFacebook diff --git a/apis/apimanagement/v1beta1/zz_identityproviderfacebook_types.go b/apis/apimanagement/v1beta1/zz_identityproviderfacebook_types.go index dc8d6b508..99a95827d 100755 --- a/apis/apimanagement/v1beta1/zz_identityproviderfacebook_types.go +++ b/apis/apimanagement/v1beta1/zz_identityproviderfacebook_types.go @@ -30,6 +30,9 @@ type IdentityProviderFacebookInitParameters struct { // App ID for Facebook. AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // App Secret for Facebook. + AppSecretSecretRef v1.SecretKeySelector `json:"appSecretSecretRef" tf:"-"` + // The Name of the Resource Group where the API Management Service exists. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/azure/v1beta1.ResourceGroup ResourceGroupName *string `json:"resourceGroupName,omitempty" tf:"resource_group_name,omitempty"` diff --git a/apis/apimanagement/v1beta1/zz_identityprovidergoogle_terraformed.go b/apis/apimanagement/v1beta1/zz_identityprovidergoogle_terraformed.go index e7167a07d..2b5607ec7 100755 --- a/apis/apimanagement/v1beta1/zz_identityprovidergoogle_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_identityprovidergoogle_terraformed.go @@ -21,7 +21,7 @@ func (mg *IdentityProviderGoogle) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IdentityProviderGoogle func (tr *IdentityProviderGoogle) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"client_secret": "spec.forProvider.clientSecretSecretRef"} + return map[string]string{"client_secret": "clientSecretSecretRef"} } // GetObservation of this IdentityProviderGoogle diff --git a/apis/apimanagement/v1beta1/zz_identityprovidergoogle_types.go b/apis/apimanagement/v1beta1/zz_identityprovidergoogle_types.go index 15067c6dd..53bb143a8 100755 --- a/apis/apimanagement/v1beta1/zz_identityprovidergoogle_types.go +++ b/apis/apimanagement/v1beta1/zz_identityprovidergoogle_types.go @@ -30,6 +30,9 @@ type IdentityProviderGoogleInitParameters struct { // Client Id for Google Sign-in. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // Client secret for Google Sign-in. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` + // The Name of the Resource Group where the API Management Service exists. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/azure/v1beta1.ResourceGroup ResourceGroupName *string `json:"resourceGroupName,omitempty" tf:"resource_group_name,omitempty"` diff --git a/apis/apimanagement/v1beta1/zz_identityprovidermicrosoft_terraformed.go b/apis/apimanagement/v1beta1/zz_identityprovidermicrosoft_terraformed.go index 873d5e37a..2c3840a7e 100755 --- a/apis/apimanagement/v1beta1/zz_identityprovidermicrosoft_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_identityprovidermicrosoft_terraformed.go @@ -21,7 +21,7 @@ func (mg *IdentityProviderMicrosoft) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IdentityProviderMicrosoft func (tr *IdentityProviderMicrosoft) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"client_secret": "spec.forProvider.clientSecretSecretRef"} + return map[string]string{"client_secret": "clientSecretSecretRef"} } // GetObservation of this IdentityProviderMicrosoft diff --git a/apis/apimanagement/v1beta1/zz_identityprovidermicrosoft_types.go b/apis/apimanagement/v1beta1/zz_identityprovidermicrosoft_types.go index 1e806b9bf..f81be8e1e 100755 --- a/apis/apimanagement/v1beta1/zz_identityprovidermicrosoft_types.go +++ b/apis/apimanagement/v1beta1/zz_identityprovidermicrosoft_types.go @@ -30,6 +30,9 @@ type IdentityProviderMicrosoftInitParameters struct { // Client Id of the Azure AD Application. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // Client secret of the Azure AD Application. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` + // The Name of the Resource Group where the API Management Service exists. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/azure/v1beta1.ResourceGroup ResourceGroupName *string `json:"resourceGroupName,omitempty" tf:"resource_group_name,omitempty"` diff --git a/apis/apimanagement/v1beta1/zz_identityprovidertwitter_terraformed.go b/apis/apimanagement/v1beta1/zz_identityprovidertwitter_terraformed.go index bea848bae..846a90c79 100755 --- a/apis/apimanagement/v1beta1/zz_identityprovidertwitter_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_identityprovidertwitter_terraformed.go @@ -21,7 +21,7 @@ func (mg *IdentityProviderTwitter) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IdentityProviderTwitter func (tr *IdentityProviderTwitter) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"api_key": "spec.forProvider.apiKeySecretRef", "api_secret_key": "spec.forProvider.apiSecretKeySecretRef"} + return map[string]string{"api_key": "apiKeySecretRef", "api_secret_key": "apiSecretKeySecretRef"} } // GetObservation of this IdentityProviderTwitter diff --git a/apis/apimanagement/v1beta1/zz_identityprovidertwitter_types.go b/apis/apimanagement/v1beta1/zz_identityprovidertwitter_types.go index 4d2d37993..ae84c03e3 100755 --- a/apis/apimanagement/v1beta1/zz_identityprovidertwitter_types.go +++ b/apis/apimanagement/v1beta1/zz_identityprovidertwitter_types.go @@ -15,6 +15,9 @@ import ( type IdentityProviderTwitterInitParameters struct { + // App Consumer API key for Twitter. + APIKeySecretRef v1.SecretKeySelector `json:"apiKeySecretRef" tf:"-"` + // The Name of the API Management Service where this Twitter Identity Provider should be created. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/apimanagement/v1beta2.Management APIManagementName *string `json:"apiManagementName,omitempty" tf:"api_management_name,omitempty"` @@ -27,6 +30,9 @@ type IdentityProviderTwitterInitParameters struct { // +kubebuilder:validation:Optional APIManagementNameSelector *v1.Selector `json:"apiManagementNameSelector,omitempty" tf:"-"` + // App Consumer API secret key for Twitter. + APISecretKeySecretRef v1.SecretKeySelector `json:"apiSecretKeySecretRef" tf:"-"` + // The Name of the Resource Group where the API Management Service exists. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/azure/v1beta1.ResourceGroup ResourceGroupName *string `json:"resourceGroupName,omitempty" tf:"resource_group_name,omitempty"` diff --git a/apis/apimanagement/v1beta1/zz_openidconnectprovider_terraformed.go b/apis/apimanagement/v1beta1/zz_openidconnectprovider_terraformed.go index 33e086b8f..d92b49b3b 100755 --- a/apis/apimanagement/v1beta1/zz_openidconnectprovider_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_openidconnectprovider_terraformed.go @@ -21,7 +21,7 @@ func (mg *OpenIDConnectProvider) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this OpenIDConnectProvider func (tr *OpenIDConnectProvider) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"client_id": "spec.forProvider.clientIdSecretRef", "client_secret": "spec.forProvider.clientSecretSecretRef"} + return map[string]string{"client_id": "clientIdSecretRef", "client_secret": "clientSecretSecretRef"} } // GetObservation of this OpenIDConnectProvider diff --git a/apis/apimanagement/v1beta1/zz_openidconnectprovider_types.go b/apis/apimanagement/v1beta1/zz_openidconnectprovider_types.go index 1f8afe7da..fac44c048 100755 --- a/apis/apimanagement/v1beta1/zz_openidconnectprovider_types.go +++ b/apis/apimanagement/v1beta1/zz_openidconnectprovider_types.go @@ -15,6 +15,12 @@ import ( type OpenIDConnectProviderInitParameters struct { + // The Client ID used for the Client Application. + ClientIDSecretRef v1.SecretKeySelector `json:"clientIdSecretRef" tf:"-"` + + // The Client Secret used for the Client Application. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` + // A description of this OpenID Connect Provider. Description *string `json:"description,omitempty" tf:"description,omitempty"` diff --git a/apis/apimanagement/v1beta1/zz_rediscache_terraformed.go b/apis/apimanagement/v1beta1/zz_rediscache_terraformed.go index f3d0088f6..be3ba3896 100755 --- a/apis/apimanagement/v1beta1/zz_rediscache_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_rediscache_terraformed.go @@ -21,7 +21,7 @@ func (mg *RedisCache) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this RedisCache func (tr *RedisCache) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"connection_string": "spec.forProvider.connectionStringSecretRef"} + return map[string]string{"connection_string": "connectionStringSecretRef"} } // GetObservation of this RedisCache diff --git a/apis/apimanagement/v1beta1/zz_rediscache_types.go b/apis/apimanagement/v1beta1/zz_rediscache_types.go index 4361f1b79..b8fdb1c09 100755 --- a/apis/apimanagement/v1beta1/zz_rediscache_types.go +++ b/apis/apimanagement/v1beta1/zz_rediscache_types.go @@ -18,6 +18,9 @@ type RedisCacheInitParameters struct { // The location where to use cache from. Possible values are default and valid Azure regions. Defaults to default. CacheLocation *string `json:"cacheLocation,omitempty" tf:"cache_location,omitempty"` + // The connection string to the Cache for Redis. + ConnectionStringSecretRef v1.SecretKeySelector `json:"connectionStringSecretRef" tf:"-"` + // The description of the API Management Redis Cache. Description *string `json:"description,omitempty" tf:"description,omitempty"` diff --git a/apis/apimanagement/v1beta1/zz_subscription_terraformed.go b/apis/apimanagement/v1beta1/zz_subscription_terraformed.go index 4f19e5052..d04f23868 100755 --- a/apis/apimanagement/v1beta1/zz_subscription_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_subscription_terraformed.go @@ -21,7 +21,7 @@ func (mg *Subscription) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Subscription func (tr *Subscription) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"primary_key": "spec.forProvider.primaryKeySecretRef", "secondary_key": "spec.forProvider.secondaryKeySecretRef"} + return map[string]string{"primary_key": "primaryKeySecretRef", "secondary_key": "secondaryKeySecretRef"} } // GetObservation of this Subscription diff --git a/apis/apimanagement/v1beta1/zz_subscription_types.go b/apis/apimanagement/v1beta1/zz_subscription_types.go index 5bcefdf8e..b95a4db93 100755 --- a/apis/apimanagement/v1beta1/zz_subscription_types.go +++ b/apis/apimanagement/v1beta1/zz_subscription_types.go @@ -21,6 +21,9 @@ type SubscriptionInitParameters struct { // Determines whether tracing can be enabled. Defaults to true. AllowTracing *bool `json:"allowTracing,omitempty" tf:"allow_tracing,omitempty"` + // The primary subscription key to use for the subscription. + PrimaryKeySecretRef *v1.SecretKeySelector `json:"primaryKeySecretRef,omitempty" tf:"-"` + // The ID of the Product which should be assigned to this Subscription. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/apimanagement/v1beta1.Product // +crossplane:generate:reference:extractor=github.com/upbound/provider-azure/apis/rconfig.ExtractResourceID() @@ -34,6 +37,9 @@ type SubscriptionInitParameters struct { // +kubebuilder:validation:Optional ProductIDSelector *v1.Selector `json:"productIdSelector,omitempty" tf:"-"` + // The secondary subscription key to use for the subscription. + SecondaryKeySecretRef *v1.SecretKeySelector `json:"secondaryKeySecretRef,omitempty" tf:"-"` + // The state of this Subscription. Possible values are active, cancelled, expired, rejected, submitted and suspended. Defaults to submitted. State *string `json:"state,omitempty" tf:"state,omitempty"` diff --git a/apis/apimanagement/v1beta1/zz_user_terraformed.go b/apis/apimanagement/v1beta1/zz_user_terraformed.go index c7a49e272..eb431c422 100755 --- a/apis/apimanagement/v1beta1/zz_user_terraformed.go +++ b/apis/apimanagement/v1beta1/zz_user_terraformed.go @@ -21,7 +21,7 @@ func (mg *User) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this User func (tr *User) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this User diff --git a/apis/apimanagement/v1beta1/zz_user_types.go b/apis/apimanagement/v1beta1/zz_user_types.go index 6a1bdae30..77ad7c3ff 100755 --- a/apis/apimanagement/v1beta1/zz_user_types.go +++ b/apis/apimanagement/v1beta1/zz_user_types.go @@ -30,6 +30,9 @@ type UserInitParameters struct { // A note about this user. Note *string `json:"note,omitempty" tf:"note,omitempty"` + // The password associated with this user. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // The state of this user. Possible values are active, blocked and pending. State *string `json:"state,omitempty" tf:"state,omitempty"` } diff --git a/apis/apimanagement/v1beta2/zz_backend_terraformed.go b/apis/apimanagement/v1beta2/zz_backend_terraformed.go index b817d9ff0..34dc559ef 100755 --- a/apis/apimanagement/v1beta2/zz_backend_terraformed.go +++ b/apis/apimanagement/v1beta2/zz_backend_terraformed.go @@ -21,7 +21,7 @@ func (mg *Backend) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Backend func (tr *Backend) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"proxy[*].password": "spec.forProvider.proxy[*].passwordSecretRef"} + return map[string]string{"proxy[*].password": "proxy[*].passwordSecretRef"} } // GetObservation of this Backend diff --git a/apis/apimanagement/v1beta2/zz_backend_types.go b/apis/apimanagement/v1beta2/zz_backend_types.go index 0ba30ed86..961742b79 100755 --- a/apis/apimanagement/v1beta2/zz_backend_types.go +++ b/apis/apimanagement/v1beta2/zz_backend_types.go @@ -178,6 +178,9 @@ type BackendParameters struct { type BackendProxyInitParameters struct { + // The password to connect to the proxy server. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // The URL of the proxy server. URL *string `json:"url,omitempty" tf:"url,omitempty"` diff --git a/apis/apimanagement/v1beta2/zz_generated.deepcopy.go b/apis/apimanagement/v1beta2/zz_generated.deepcopy.go index c1c0546d8..932521fed 100644 --- a/apis/apimanagement/v1beta2/zz_generated.deepcopy.go +++ b/apis/apimanagement/v1beta2/zz_generated.deepcopy.go @@ -1428,6 +1428,7 @@ func (in *AdditionalLocationParameters) DeepCopy() *AdditionalLocationParameters // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *ApplicationInsightsInitParameters) DeepCopyInto(out *ApplicationInsightsInitParameters) { *out = *in + out.InstrumentationKeySecretRef = in.InstrumentationKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ApplicationInsightsInitParameters. @@ -1833,6 +1834,11 @@ func (in *BackendParameters) DeepCopy() *BackendParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *BackendProxyInitParameters) DeepCopyInto(out *BackendProxyInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.URL != nil { in, out := &in.URL, &out.URL *out = new(string) @@ -2638,6 +2644,12 @@ func (in *BackendStatus) DeepCopy() *BackendStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *CertificateInitParameters) DeepCopyInto(out *CertificateInitParameters) { *out = *in + if in.CertificatePasswordSecretRef != nil { + in, out := &in.CertificatePasswordSecretRef, &out.CertificatePasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + out.EncodedCertificateSecretRef = in.EncodedCertificateSecretRef if in.StoreName != nil { in, out := &in.StoreName, &out.StoreName *out = new(string) @@ -3250,6 +3262,11 @@ func (in *DelegationInitParameters) DeepCopyInto(out *DelegationInitParameters) *out = new(bool) **out = **in } + if in.ValidationKeySecretRef != nil { + in, out := &in.ValidationKeySecretRef, &out.ValidationKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new DelegationInitParameters. @@ -4782,6 +4799,11 @@ func (in *DiagnosticStatus) DeepCopy() *DiagnosticStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *EventHubInitParameters) DeepCopyInto(out *EventHubInitParameters) { *out = *in + if in.ConnectionStringSecretRef != nil { + in, out := &in.ConnectionStringSecretRef, &out.ConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.EndpointURI != nil { in, out := &in.EndpointURI, &out.EndpointURI *out = new(string) @@ -8218,6 +8240,11 @@ func (in *NamedValueInitParameters) DeepCopyInto(out *NamedValueInitParameters) *out = new(ValueFromKeyVaultInitParameters) (*in).DeepCopyInto(*out) } + if in.ValueSecretRef != nil { + in, out := &in.ValueSecretRef, &out.ValueSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new NamedValueInitParameters. diff --git a/apis/apimanagement/v1beta2/zz_logger_terraformed.go b/apis/apimanagement/v1beta2/zz_logger_terraformed.go index f7e33858e..ce3fa1f96 100755 --- a/apis/apimanagement/v1beta2/zz_logger_terraformed.go +++ b/apis/apimanagement/v1beta2/zz_logger_terraformed.go @@ -21,7 +21,7 @@ func (mg *Logger) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Logger func (tr *Logger) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"application_insights[*].instrumentation_key": "spec.forProvider.applicationInsights[*].instrumentationKeySecretRef", "eventhub[*].connection_string": "spec.forProvider.eventhub[*].connectionStringSecretRef"} + return map[string]string{"application_insights[*].instrumentation_key": "applicationInsights[*].instrumentationKeySecretRef", "eventhub[*].connection_string": "eventhub[*].connectionStringSecretRef"} } // GetObservation of this Logger diff --git a/apis/apimanagement/v1beta2/zz_logger_types.go b/apis/apimanagement/v1beta2/zz_logger_types.go index 0e58d52d4..23a4ee13f 100755 --- a/apis/apimanagement/v1beta2/zz_logger_types.go +++ b/apis/apimanagement/v1beta2/zz_logger_types.go @@ -14,6 +14,9 @@ import ( ) type ApplicationInsightsInitParameters struct { + + // The instrumentation key used to push data to Application Insights. + InstrumentationKeySecretRef v1.SecretKeySelector `json:"instrumentationKeySecretRef" tf:"-"` } type ApplicationInsightsObservation struct { @@ -22,12 +25,15 @@ type ApplicationInsightsObservation struct { type ApplicationInsightsParameters struct { // The instrumentation key used to push data to Application Insights. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional InstrumentationKeySecretRef v1.SecretKeySelector `json:"instrumentationKeySecretRef" tf:"-"` } type EventHubInitParameters struct { + // The connection string of an EventHub Namespace. + ConnectionStringSecretRef *v1.SecretKeySelector `json:"connectionStringSecretRef,omitempty" tf:"-"` + // The endpoint address of an EventHub Namespace. Required when client_id is set. EndpointURI *string `json:"endpointUri,omitempty" tf:"endpoint_uri,omitempty"` diff --git a/apis/apimanagement/v1beta2/zz_management_terraformed.go b/apis/apimanagement/v1beta2/zz_management_terraformed.go index 56ff32ecd..975450c6d 100755 --- a/apis/apimanagement/v1beta2/zz_management_terraformed.go +++ b/apis/apimanagement/v1beta2/zz_management_terraformed.go @@ -21,7 +21,7 @@ func (mg *Management) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Management func (tr *Management) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"certificate[*].certificate_password": "spec.forProvider.certificate[*].certificatePasswordSecretRef", "certificate[*].encoded_certificate": "spec.forProvider.certificate[*].encodedCertificateSecretRef", "delegation[*].validation_key": "spec.forProvider.delegation[*].validationKeySecretRef", "hostname_configuration[*].developer_portal[*].certificate": "status.atProvider.hostnameConfiguration[*].developerPortal[*].certificate", "hostname_configuration[*].developer_portal[*].certificate_password": "status.atProvider.hostnameConfiguration[*].developerPortal[*].certificatePassword", "hostname_configuration[*].management[*].certificate": "status.atProvider.hostnameConfiguration[*].management[*].certificate", "hostname_configuration[*].management[*].certificate_password": "status.atProvider.hostnameConfiguration[*].management[*].certificatePassword", "hostname_configuration[*].portal[*].certificate": "status.atProvider.hostnameConfiguration[*].portal[*].certificate", "hostname_configuration[*].portal[*].certificate_password": "status.atProvider.hostnameConfiguration[*].portal[*].certificatePassword", "hostname_configuration[*].proxy[*].certificate": "status.atProvider.hostnameConfiguration[*].proxy[*].certificate", "hostname_configuration[*].proxy[*].certificate_password": "status.atProvider.hostnameConfiguration[*].proxy[*].certificatePassword", "hostname_configuration[*].scm[*].certificate": "status.atProvider.hostnameConfiguration[*].scm[*].certificate", "hostname_configuration[*].scm[*].certificate_password": "status.atProvider.hostnameConfiguration[*].scm[*].certificatePassword", "tenant_access[*].primary_key": "status.atProvider.tenantAccess[*].primaryKey", "tenant_access[*].secondary_key": "status.atProvider.tenantAccess[*].secondaryKey"} + return map[string]string{"certificate[*].certificate_password": "certificate[*].certificatePasswordSecretRef", "certificate[*].encoded_certificate": "certificate[*].encodedCertificateSecretRef", "delegation[*].validation_key": "delegation[*].validationKeySecretRef", "hostname_configuration[*].developer_portal[*].certificate": "status.atProvider.hostnameConfiguration[*].developerPortal[*].certificate", "hostname_configuration[*].developer_portal[*].certificate_password": "status.atProvider.hostnameConfiguration[*].developerPortal[*].certificatePassword", "hostname_configuration[*].management[*].certificate": "status.atProvider.hostnameConfiguration[*].management[*].certificate", "hostname_configuration[*].management[*].certificate_password": "status.atProvider.hostnameConfiguration[*].management[*].certificatePassword", "hostname_configuration[*].portal[*].certificate": "status.atProvider.hostnameConfiguration[*].portal[*].certificate", "hostname_configuration[*].portal[*].certificate_password": "status.atProvider.hostnameConfiguration[*].portal[*].certificatePassword", "hostname_configuration[*].proxy[*].certificate": "status.atProvider.hostnameConfiguration[*].proxy[*].certificate", "hostname_configuration[*].proxy[*].certificate_password": "status.atProvider.hostnameConfiguration[*].proxy[*].certificatePassword", "hostname_configuration[*].scm[*].certificate": "status.atProvider.hostnameConfiguration[*].scm[*].certificate", "hostname_configuration[*].scm[*].certificate_password": "status.atProvider.hostnameConfiguration[*].scm[*].certificatePassword", "tenant_access[*].primary_key": "status.atProvider.tenantAccess[*].primaryKey", "tenant_access[*].secondary_key": "status.atProvider.tenantAccess[*].secondaryKey"} } // GetObservation of this Management diff --git a/apis/apimanagement/v1beta2/zz_management_types.go b/apis/apimanagement/v1beta2/zz_management_types.go index 3b527fde4..3c75034aa 100755 --- a/apis/apimanagement/v1beta2/zz_management_types.go +++ b/apis/apimanagement/v1beta2/zz_management_types.go @@ -96,6 +96,12 @@ type AdditionalLocationParameters struct { type CertificateInitParameters struct { + // The password for the certificate. + CertificatePasswordSecretRef *v1.SecretKeySelector `json:"certificatePasswordSecretRef,omitempty" tf:"-"` + + // The Base64 Encoded PFX or Base64 Encoded X.509 Certificate. + EncodedCertificateSecretRef v1.SecretKeySelector `json:"encodedCertificateSecretRef" tf:"-"` + // The name of the Certificate Store where this certificate should be stored. Possible values are CertificateAuthority and Root. StoreName *string `json:"storeName,omitempty" tf:"store_name,omitempty"` } @@ -122,7 +128,7 @@ type CertificateParameters struct { CertificatePasswordSecretRef *v1.SecretKeySelector `json:"certificatePasswordSecretRef,omitempty" tf:"-"` // The Base64 Encoded PFX or Base64 Encoded X.509 Certificate. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional EncodedCertificateSecretRef v1.SecretKeySelector `json:"encodedCertificateSecretRef" tf:"-"` // The name of the Certificate Store where this certificate should be stored. Possible values are CertificateAuthority and Root. @@ -140,6 +146,9 @@ type DelegationInitParameters struct { // Should user registration requests be delegated to an external url? Defaults to false. UserRegistrationEnabled *bool `json:"userRegistrationEnabled,omitempty" tf:"user_registration_enabled,omitempty"` + + // A base64-encoded validation key to validate, that a request is coming from Azure API Management. + ValidationKeySecretRef *v1.SecretKeySelector `json:"validationKeySecretRef,omitempty" tf:"-"` } type DelegationObservation struct { diff --git a/apis/apimanagement/v1beta2/zz_namedvalue_terraformed.go b/apis/apimanagement/v1beta2/zz_namedvalue_terraformed.go index 0d6444962..e975e903f 100755 --- a/apis/apimanagement/v1beta2/zz_namedvalue_terraformed.go +++ b/apis/apimanagement/v1beta2/zz_namedvalue_terraformed.go @@ -21,7 +21,7 @@ func (mg *NamedValue) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this NamedValue func (tr *NamedValue) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"value": "spec.forProvider.valueSecretRef"} + return map[string]string{"value": "valueSecretRef"} } // GetObservation of this NamedValue diff --git a/apis/apimanagement/v1beta2/zz_namedvalue_types.go b/apis/apimanagement/v1beta2/zz_namedvalue_types.go index 7aa7859bc..c004bef54 100755 --- a/apis/apimanagement/v1beta2/zz_namedvalue_types.go +++ b/apis/apimanagement/v1beta2/zz_namedvalue_types.go @@ -26,6 +26,9 @@ type NamedValueInitParameters struct { // A value_from_key_vault block as defined below. ValueFromKeyVault *ValueFromKeyVaultInitParameters `json:"valueFromKeyVault,omitempty" tf:"value_from_key_vault,omitempty"` + + // The value of this API Management Named Value. + ValueSecretRef *v1.SecretKeySelector `json:"valueSecretRef,omitempty" tf:"-"` } type NamedValueObservation struct { diff --git a/apis/appplatform/v1beta1/zz_generated.deepcopy.go b/apis/appplatform/v1beta1/zz_generated.deepcopy.go index 1cd6d07dc..08a0b0860 100644 --- a/apis/appplatform/v1beta1/zz_generated.deepcopy.go +++ b/apis/appplatform/v1beta1/zz_generated.deepcopy.go @@ -2663,6 +2663,11 @@ func (in *RepositoryInitParameters) DeepCopyInto(out *RepositoryInitParameters) *out = new(string) **out = **in } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Patterns != nil { in, out := &in.Patterns, &out.Patterns *out = make([]*string, len(*in)) @@ -2674,6 +2679,11 @@ func (in *RepositoryInitParameters) DeepCopyInto(out *RepositoryInitParameters) } } } + if in.PrivateKeySecretRef != nil { + in, out := &in.PrivateKeySecretRef, &out.PrivateKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SearchPaths != nil { in, out := &in.SearchPaths, &out.SearchPaths *out = make([]*string, len(*in)) @@ -4540,6 +4550,7 @@ func (in *SpringCloudAppMySQLAssociationInitParameters) DeepCopyInto(out *Spring *out = new(v1.Selector) (*in).DeepCopyInto(*out) } + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) diff --git a/apis/appplatform/v1beta1/zz_springcloudappmysqlassociation_terraformed.go b/apis/appplatform/v1beta1/zz_springcloudappmysqlassociation_terraformed.go index 8acc73a35..242f59773 100755 --- a/apis/appplatform/v1beta1/zz_springcloudappmysqlassociation_terraformed.go +++ b/apis/appplatform/v1beta1/zz_springcloudappmysqlassociation_terraformed.go @@ -21,7 +21,7 @@ func (mg *SpringCloudAppMySQLAssociation) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this SpringCloudAppMySQLAssociation func (tr *SpringCloudAppMySQLAssociation) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this SpringCloudAppMySQLAssociation diff --git a/apis/appplatform/v1beta1/zz_springcloudappmysqlassociation_types.go b/apis/appplatform/v1beta1/zz_springcloudappmysqlassociation_types.go index 730cecaf3..a3a17966b 100755 --- a/apis/appplatform/v1beta1/zz_springcloudappmysqlassociation_types.go +++ b/apis/appplatform/v1beta1/zz_springcloudappmysqlassociation_types.go @@ -40,6 +40,9 @@ type SpringCloudAppMySQLAssociationInitParameters struct { // +kubebuilder:validation:Optional MySQLServerIDSelector *v1.Selector `json:"mysqlServerIdSelector,omitempty" tf:"-"` + // Specifies the password which should be used when connecting to the MySQL Database from the Spring Cloud App. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // Specifies the username which should be used when connecting to the MySQL Database from the Spring Cloud App. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/dbformysql/v1beta2.Server // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("administrator_login",false) diff --git a/apis/appplatform/v1beta1/zz_springcloudconfigurationservice_terraformed.go b/apis/appplatform/v1beta1/zz_springcloudconfigurationservice_terraformed.go index c2a3a1b44..df659a125 100755 --- a/apis/appplatform/v1beta1/zz_springcloudconfigurationservice_terraformed.go +++ b/apis/appplatform/v1beta1/zz_springcloudconfigurationservice_terraformed.go @@ -21,7 +21,7 @@ func (mg *SpringCloudConfigurationService) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this SpringCloudConfigurationService func (tr *SpringCloudConfigurationService) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"repository[*].password": "spec.forProvider.repository[*].passwordSecretRef", "repository[*].private_key": "spec.forProvider.repository[*].privateKeySecretRef"} + return map[string]string{"repository[*].password": "repository[*].passwordSecretRef", "repository[*].private_key": "repository[*].privateKeySecretRef"} } // GetObservation of this SpringCloudConfigurationService diff --git a/apis/appplatform/v1beta1/zz_springcloudconfigurationservice_types.go b/apis/appplatform/v1beta1/zz_springcloudconfigurationservice_types.go index ec3344d00..97037ea38 100755 --- a/apis/appplatform/v1beta1/zz_springcloudconfigurationservice_types.go +++ b/apis/appplatform/v1beta1/zz_springcloudconfigurationservice_types.go @@ -30,10 +30,16 @@ type RepositoryInitParameters struct { // Specifies the name which should be used for this repository. Name *string `json:"name,omitempty" tf:"name,omitempty"` + // Specifies the password of git repository basic auth. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // Specifies the collection of patterns of the repository. // +listType=set Patterns []*string `json:"patterns,omitempty" tf:"patterns,omitempty"` + // Specifies the SSH private key of git repository. + PrivateKeySecretRef *v1.SecretKeySelector `json:"privateKeySecretRef,omitempty" tf:"-"` + // Specifies a list of searching path of the repository // +listType=set SearchPaths []*string `json:"searchPaths,omitempty" tf:"search_paths,omitempty"` diff --git a/apis/appplatform/v1beta2/zz_generated.deepcopy.go b/apis/appplatform/v1beta2/zz_generated.deepcopy.go index 12f584c16..3ca5c4b1c 100644 --- a/apis/appplatform/v1beta2/zz_generated.deepcopy.go +++ b/apis/appplatform/v1beta2/zz_generated.deepcopy.go @@ -136,6 +136,7 @@ func (in *APIMetadataParameters) DeepCopy() *APIMetadataParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *BasicAuthInitParameters) DeepCopyInto(out *BasicAuthInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -547,6 +548,12 @@ func (in *ConfigServerGitSettingSSHAuthInitParameters) DeepCopyInto(out *ConfigS *out = new(string) **out = **in } + if in.HostKeySecretRef != nil { + in, out := &in.HostKeySecretRef, &out.HostKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + out.PrivateKeySecretRef = in.PrivateKeySecretRef if in.StrictHostKeyCheckingEnabled != nil { in, out := &in.StrictHostKeyCheckingEnabled, &out.StrictHostKeyCheckingEnabled *out = new(bool) @@ -628,6 +635,7 @@ func (in *ContainerRegistryInitParameters) DeepCopyInto(out *ContainerRegistryIn *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -1332,6 +1340,7 @@ func (in *GitRepositoryParameters) DeepCopy() *GitRepositoryParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *HTTPBasicAuthInitParameters) DeepCopyInto(out *HTTPBasicAuthInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -2355,6 +2364,7 @@ func (in *QuotaParameters) DeepCopy() *QuotaParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *RepositoryHTTPBasicAuthInitParameters) DeepCopyInto(out *RepositoryHTTPBasicAuthInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -2607,6 +2617,12 @@ func (in *RepositorySSHAuthInitParameters) DeepCopyInto(out *RepositorySSHAuthIn *out = new(string) **out = **in } + if in.HostKeySecretRef != nil { + in, out := &in.HostKeySecretRef, &out.HostKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + out.PrivateKeySecretRef = in.PrivateKeySecretRef if in.StrictHostKeyCheckingEnabled != nil { in, out := &in.StrictHostKeyCheckingEnabled, &out.StrictHostKeyCheckingEnabled *out = new(bool) @@ -2770,6 +2786,12 @@ func (in *SSHAuthInitParameters) DeepCopyInto(out *SSHAuthInitParameters) { *out = new(string) **out = **in } + if in.HostKeySecretRef != nil { + in, out := &in.HostKeySecretRef, &out.HostKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + out.PrivateKeySecretRef = in.PrivateKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SSHAuthInitParameters. @@ -5431,6 +5453,22 @@ func (in *SpringCloudGatewayInitParameters) DeepCopyInto(out *SpringCloudGateway *out = new(SpringCloudGatewayQuotaInitParameters) (*in).DeepCopyInto(*out) } + if in.SensitiveEnvironmentVariables != nil { + in, out := &in.SensitiveEnvironmentVariables, &out.SensitiveEnvironmentVariables + *out = make(map[string]*string, len(*in)) + for key, val := range *in { + var outVal *string + if val == nil { + (*out)[key] = nil + } else { + inVal := (*in)[key] + in, out := &inVal, &outVal + *out = new(string) + **out = **in + } + (*out)[key] = outVal + } + } if in.Sso != nil { in, out := &in.Sso, &out.Sso *out = new(SpringCloudGatewaySsoInitParameters) diff --git a/apis/appplatform/v1beta2/zz_springcloudcustomizedaccelerator_terraformed.go b/apis/appplatform/v1beta2/zz_springcloudcustomizedaccelerator_terraformed.go index a29d46a15..fed03dd06 100755 --- a/apis/appplatform/v1beta2/zz_springcloudcustomizedaccelerator_terraformed.go +++ b/apis/appplatform/v1beta2/zz_springcloudcustomizedaccelerator_terraformed.go @@ -21,7 +21,7 @@ func (mg *SpringCloudCustomizedAccelerator) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this SpringCloudCustomizedAccelerator func (tr *SpringCloudCustomizedAccelerator) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"git_repository[*].basic_auth[*].password": "spec.forProvider.gitRepository[*].basicAuth[*].passwordSecretRef", "git_repository[*].ssh_auth[*].host_key": "spec.forProvider.gitRepository[*].sshAuth[*].hostKeySecretRef", "git_repository[*].ssh_auth[*].private_key": "spec.forProvider.gitRepository[*].sshAuth[*].privateKeySecretRef"} + return map[string]string{"git_repository[*].basic_auth[*].password": "gitRepository[*].basicAuth[*].passwordSecretRef", "git_repository[*].ssh_auth[*].host_key": "gitRepository[*].sshAuth[*].hostKeySecretRef", "git_repository[*].ssh_auth[*].private_key": "gitRepository[*].sshAuth[*].privateKeySecretRef"} } // GetObservation of this SpringCloudCustomizedAccelerator diff --git a/apis/appplatform/v1beta2/zz_springcloudcustomizedaccelerator_types.go b/apis/appplatform/v1beta2/zz_springcloudcustomizedaccelerator_types.go index f8ff86e00..316552994 100755 --- a/apis/appplatform/v1beta2/zz_springcloudcustomizedaccelerator_types.go +++ b/apis/appplatform/v1beta2/zz_springcloudcustomizedaccelerator_types.go @@ -15,6 +15,9 @@ import ( type BasicAuthInitParameters struct { + // Specifies the password of git repository basic auth. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // Specifies the username of git repository basic auth. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -28,7 +31,7 @@ type BasicAuthObservation struct { type BasicAuthParameters struct { // Specifies the password of git repository basic auth. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // Specifies the username of git repository basic auth. @@ -139,6 +142,12 @@ type SSHAuthInitParameters struct { // Specifies the SSH Key algorithm of git repository basic auth. HostKeyAlgorithm *string `json:"hostKeyAlgorithm,omitempty" tf:"host_key_algorithm,omitempty"` + + // Specifies the Public SSH Key of git repository basic auth. + HostKeySecretRef *v1.SecretKeySelector `json:"hostKeySecretRef,omitempty" tf:"-"` + + // Specifies the Private SSH Key of git repository basic auth. + PrivateKeySecretRef v1.SecretKeySelector `json:"privateKeySecretRef" tf:"-"` } type SSHAuthObservation struct { @@ -158,7 +167,7 @@ type SSHAuthParameters struct { HostKeySecretRef *v1.SecretKeySelector `json:"hostKeySecretRef,omitempty" tf:"-"` // Specifies the Private SSH Key of git repository basic auth. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrivateKeySecretRef v1.SecretKeySelector `json:"privateKeySecretRef" tf:"-"` } diff --git a/apis/appplatform/v1beta2/zz_springcloudgateway_terraformed.go b/apis/appplatform/v1beta2/zz_springcloudgateway_terraformed.go index e0e4f2194..32ff8df7f 100755 --- a/apis/appplatform/v1beta2/zz_springcloudgateway_terraformed.go +++ b/apis/appplatform/v1beta2/zz_springcloudgateway_terraformed.go @@ -21,7 +21,7 @@ func (mg *SpringCloudGateway) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this SpringCloudGateway func (tr *SpringCloudGateway) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"sensitive_environment_variables": "spec.forProvider.sensitiveEnvironmentVariablesSecretRef"} + return map[string]string{"sensitive_environment_variables": "sensitiveEnvironmentVariablesSecretRef"} } // GetObservation of this SpringCloudGateway diff --git a/apis/appplatform/v1beta2/zz_springcloudgateway_types.go b/apis/appplatform/v1beta2/zz_springcloudgateway_types.go index 4144e737b..fb579bc86 100755 --- a/apis/appplatform/v1beta2/zz_springcloudgateway_types.go +++ b/apis/appplatform/v1beta2/zz_springcloudgateway_types.go @@ -292,6 +292,8 @@ type SpringCloudGatewayInitParameters struct { // A quota block as defined below. Quota *SpringCloudGatewayQuotaInitParameters `json:"quota,omitempty" tf:"quota,omitempty"` + SensitiveEnvironmentVariables map[string]*string `json:"sensitiveEnvironmentVariablesSecretRef,omitempty" tf:"-"` + // A sso block as defined below. Sso *SpringCloudGatewaySsoInitParameters `json:"sso,omitempty" tf:"sso,omitempty"` } diff --git a/apis/appplatform/v1beta2/zz_springcloudservice_terraformed.go b/apis/appplatform/v1beta2/zz_springcloudservice_terraformed.go index 02e362555..37be8c68c 100755 --- a/apis/appplatform/v1beta2/zz_springcloudservice_terraformed.go +++ b/apis/appplatform/v1beta2/zz_springcloudservice_terraformed.go @@ -21,7 +21,7 @@ func (mg *SpringCloudService) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this SpringCloudService func (tr *SpringCloudService) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"config_server_git_setting[*].http_basic_auth[*].password": "spec.forProvider.configServerGitSetting[*].httpBasicAuth[*].passwordSecretRef", "config_server_git_setting[*].repository[*].http_basic_auth[*].password": "spec.forProvider.configServerGitSetting[*].repository[*].httpBasicAuth[*].passwordSecretRef", "config_server_git_setting[*].repository[*].ssh_auth[*].host_key": "spec.forProvider.configServerGitSetting[*].repository[*].sshAuth[*].hostKeySecretRef", "config_server_git_setting[*].repository[*].ssh_auth[*].private_key": "spec.forProvider.configServerGitSetting[*].repository[*].sshAuth[*].privateKeySecretRef", "config_server_git_setting[*].ssh_auth[*].host_key": "spec.forProvider.configServerGitSetting[*].sshAuth[*].hostKeySecretRef", "config_server_git_setting[*].ssh_auth[*].private_key": "spec.forProvider.configServerGitSetting[*].sshAuth[*].privateKeySecretRef", "container_registry[*].password": "spec.forProvider.containerRegistry[*].passwordSecretRef"} + return map[string]string{"config_server_git_setting[*].http_basic_auth[*].password": "configServerGitSetting[*].httpBasicAuth[*].passwordSecretRef", "config_server_git_setting[*].repository[*].http_basic_auth[*].password": "configServerGitSetting[*].repository[*].httpBasicAuth[*].passwordSecretRef", "config_server_git_setting[*].repository[*].ssh_auth[*].host_key": "configServerGitSetting[*].repository[*].sshAuth[*].hostKeySecretRef", "config_server_git_setting[*].repository[*].ssh_auth[*].private_key": "configServerGitSetting[*].repository[*].sshAuth[*].privateKeySecretRef", "config_server_git_setting[*].ssh_auth[*].host_key": "configServerGitSetting[*].sshAuth[*].hostKeySecretRef", "config_server_git_setting[*].ssh_auth[*].private_key": "configServerGitSetting[*].sshAuth[*].privateKeySecretRef", "container_registry[*].password": "containerRegistry[*].passwordSecretRef"} } // GetObservation of this SpringCloudService diff --git a/apis/appplatform/v1beta2/zz_springcloudservice_types.go b/apis/appplatform/v1beta2/zz_springcloudservice_types.go index 4cce973c4..3bcee0e53 100755 --- a/apis/appplatform/v1beta2/zz_springcloudservice_types.go +++ b/apis/appplatform/v1beta2/zz_springcloudservice_types.go @@ -87,6 +87,12 @@ type ConfigServerGitSettingSSHAuthInitParameters struct { // The host key algorithm, should be ssh-dss, ssh-rsa, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, or ecdsa-sha2-nistp521. Required only if host-key exists. HostKeyAlgorithm *string `json:"hostKeyAlgorithm,omitempty" tf:"host_key_algorithm,omitempty"` + // The host key of the Git repository server, should not include the algorithm prefix as covered by host-key-algorithm. + HostKeySecretRef *v1.SecretKeySelector `json:"hostKeySecretRef,omitempty" tf:"-"` + + // The SSH private key to access the Git repository, required when the URI starts with git@ or ssh://. + PrivateKeySecretRef v1.SecretKeySelector `json:"privateKeySecretRef" tf:"-"` + // Indicates whether the Config Server instance will fail to start if the host_key does not match. Defaults to true. StrictHostKeyCheckingEnabled *bool `json:"strictHostKeyCheckingEnabled,omitempty" tf:"strict_host_key_checking_enabled,omitempty"` } @@ -111,7 +117,7 @@ type ConfigServerGitSettingSSHAuthParameters struct { HostKeySecretRef *v1.SecretKeySelector `json:"hostKeySecretRef,omitempty" tf:"-"` // The SSH private key to access the Git repository, required when the URI starts with git@ or ssh://. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrivateKeySecretRef v1.SecretKeySelector `json:"privateKeySecretRef" tf:"-"` // Indicates whether the Config Server instance will fail to start if the host_key does not match. Defaults to true. @@ -124,6 +130,9 @@ type ContainerRegistryInitParameters struct { // Specifies the name of the container registry. Name *string `json:"name,omitempty" tf:"name,omitempty"` + // Specifies the password of the container registry. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // Specifies the login server of the container registry. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -150,7 +159,7 @@ type ContainerRegistryParameters struct { Name *string `json:"name" tf:"name,omitempty"` // Specifies the password of the container registry. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // Specifies the login server of the container registry. @@ -183,6 +192,9 @@ type DefaultBuildServiceParameters struct { type HTTPBasicAuthInitParameters struct { + // The password used to access the Git repository server, required when the Git repository server supports HTTP Basic Authentication. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username that's used to access the Git repository server, required when the Git repository server supports HTTP Basic Authentication. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -196,7 +208,7 @@ type HTTPBasicAuthObservation struct { type HTTPBasicAuthParameters struct { // The password used to access the Git repository server, required when the Git repository server supports HTTP Basic Authentication. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username that's used to access the Git repository server, required when the Git repository server supports HTTP Basic Authentication. @@ -364,6 +376,9 @@ type NetworkParameters struct { type RepositoryHTTPBasicAuthInitParameters struct { + // The password used to access the Git repository server, required when the Git repository server supports HTTP Basic Authentication. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username that's used to access the Git repository server, required when the Git repository server supports HTTP Basic Authentication. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -377,7 +392,7 @@ type RepositoryHTTPBasicAuthObservation struct { type RepositoryHTTPBasicAuthParameters struct { // The password used to access the Git repository server, required when the Git repository server supports HTTP Basic Authentication. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username that's used to access the Git repository server, required when the Git repository server supports HTTP Basic Authentication. @@ -469,6 +484,12 @@ type RepositorySSHAuthInitParameters struct { // The host key algorithm, should be ssh-dss, ssh-rsa, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, or ecdsa-sha2-nistp521. Required only if host-key exists. HostKeyAlgorithm *string `json:"hostKeyAlgorithm,omitempty" tf:"host_key_algorithm,omitempty"` + // The host key of the Git repository server, should not include the algorithm prefix as covered by host-key-algorithm. + HostKeySecretRef *v1.SecretKeySelector `json:"hostKeySecretRef,omitempty" tf:"-"` + + // The SSH private key to access the Git repository, required when the URI starts with git@ or ssh://. + PrivateKeySecretRef v1.SecretKeySelector `json:"privateKeySecretRef" tf:"-"` + // Indicates whether the Config Server instance will fail to start if the host_key does not match. Defaults to true. StrictHostKeyCheckingEnabled *bool `json:"strictHostKeyCheckingEnabled,omitempty" tf:"strict_host_key_checking_enabled,omitempty"` } @@ -493,7 +514,7 @@ type RepositorySSHAuthParameters struct { HostKeySecretRef *v1.SecretKeySelector `json:"hostKeySecretRef,omitempty" tf:"-"` // The SSH private key to access the Git repository, required when the URI starts with git@ or ssh://. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrivateKeySecretRef v1.SecretKeySelector `json:"privateKeySecretRef" tf:"-"` // Indicates whether the Config Server instance will fail to start if the host_key does not match. Defaults to true. diff --git a/apis/automation/v1beta1/zz_credential_terraformed.go b/apis/automation/v1beta1/zz_credential_terraformed.go index 497e7c3c6..f74f790a5 100755 --- a/apis/automation/v1beta1/zz_credential_terraformed.go +++ b/apis/automation/v1beta1/zz_credential_terraformed.go @@ -21,7 +21,7 @@ func (mg *Credential) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Credential func (tr *Credential) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this Credential diff --git a/apis/automation/v1beta1/zz_credential_types.go b/apis/automation/v1beta1/zz_credential_types.go index facf31116..8e59e070e 100755 --- a/apis/automation/v1beta1/zz_credential_types.go +++ b/apis/automation/v1beta1/zz_credential_types.go @@ -18,6 +18,9 @@ type CredentialInitParameters struct { // The description associated with this Automation Credential. Description *string `json:"description,omitempty" tf:"description,omitempty"` + // The password associated with this Automation Credential. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username associated with this Automation Credential. Username *string `json:"username,omitempty" tf:"username,omitempty"` } diff --git a/apis/automation/v1beta1/zz_generated.deepcopy.go b/apis/automation/v1beta1/zz_generated.deepcopy.go index 8d860a26b..42698bfef 100644 --- a/apis/automation/v1beta1/zz_generated.deepcopy.go +++ b/apis/automation/v1beta1/zz_generated.deepcopy.go @@ -1321,6 +1321,7 @@ func (in *CredentialInitParameters) DeepCopyInto(out *CredentialInitParameters) *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -4941,6 +4942,11 @@ func (in *WebhookInitParameters) DeepCopyInto(out *WebhookInitParameters) { *out = new(string) **out = **in } + if in.URISecretRef != nil { + in, out := &in.URISecretRef, &out.URISecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WebhookInitParameters. diff --git a/apis/automation/v1beta1/zz_webhook_terraformed.go b/apis/automation/v1beta1/zz_webhook_terraformed.go index 906ea0450..6f7dfc91d 100755 --- a/apis/automation/v1beta1/zz_webhook_terraformed.go +++ b/apis/automation/v1beta1/zz_webhook_terraformed.go @@ -21,7 +21,7 @@ func (mg *Webhook) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Webhook func (tr *Webhook) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"uri": "spec.forProvider.uriSecretRef"} + return map[string]string{"uri": "uriSecretRef"} } // GetObservation of this Webhook diff --git a/apis/automation/v1beta1/zz_webhook_types.go b/apis/automation/v1beta1/zz_webhook_types.go index fd192e09e..2644ca7c4 100755 --- a/apis/automation/v1beta1/zz_webhook_types.go +++ b/apis/automation/v1beta1/zz_webhook_types.go @@ -67,6 +67,9 @@ type WebhookInitParameters struct { // Name of the hybrid worker group the Webhook job will run on. RunOnWorkerGroup *string `json:"runOnWorkerGroup,omitempty" tf:"run_on_worker_group,omitempty"` + + // URI to initiate the webhook. Can be generated using Generate URI API. By default, new URI is generated on each new resource creation. Changing this forces a new resource to be created. + URISecretRef *v1.SecretKeySelector `json:"uriSecretRef,omitempty" tf:"-"` } type WebhookObservation struct { diff --git a/apis/botservice/v1beta1/zz_botchannelline_terraformed.go b/apis/botservice/v1beta1/zz_botchannelline_terraformed.go index 622f1388b..3dcf4507e 100755 --- a/apis/botservice/v1beta1/zz_botchannelline_terraformed.go +++ b/apis/botservice/v1beta1/zz_botchannelline_terraformed.go @@ -21,7 +21,7 @@ func (mg *BotChannelLine) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this BotChannelLine func (tr *BotChannelLine) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"line_channel[*].access_token": "spec.forProvider.lineChannel[*].accessTokenSecretRef", "line_channel[*].secret": "spec.forProvider.lineChannel[*].secretSecretRef"} + return map[string]string{"line_channel[*].access_token": "lineChannel[*].accessTokenSecretRef", "line_channel[*].secret": "lineChannel[*].secretSecretRef"} } // GetObservation of this BotChannelLine diff --git a/apis/botservice/v1beta1/zz_botchannelline_types.go b/apis/botservice/v1beta1/zz_botchannelline_types.go index f5a8d2600..7ecc99787 100755 --- a/apis/botservice/v1beta1/zz_botchannelline_types.go +++ b/apis/botservice/v1beta1/zz_botchannelline_types.go @@ -79,6 +79,12 @@ type BotChannelLineParameters struct { } type LineChannelInitParameters struct { + + // The access token which is used to call the Line Channel API. + AccessTokenSecretRef v1.SecretKeySelector `json:"accessTokenSecretRef" tf:"-"` + + // The secret which is used to access the Line Channel. + SecretSecretRef v1.SecretKeySelector `json:"secretSecretRef" tf:"-"` } type LineChannelObservation struct { @@ -87,11 +93,11 @@ type LineChannelObservation struct { type LineChannelParameters struct { // The access token which is used to call the Line Channel API. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AccessTokenSecretRef v1.SecretKeySelector `json:"accessTokenSecretRef" tf:"-"` // The secret which is used to access the Line Channel. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional SecretSecretRef v1.SecretKeySelector `json:"secretSecretRef" tf:"-"` } diff --git a/apis/botservice/v1beta1/zz_botchannelslack_terraformed.go b/apis/botservice/v1beta1/zz_botchannelslack_terraformed.go index 19538f4de..ba6dc5a94 100755 --- a/apis/botservice/v1beta1/zz_botchannelslack_terraformed.go +++ b/apis/botservice/v1beta1/zz_botchannelslack_terraformed.go @@ -21,7 +21,7 @@ func (mg *BotChannelSlack) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this BotChannelSlack func (tr *BotChannelSlack) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"client_secret": "spec.forProvider.clientSecretSecretRef", "signing_secret": "spec.forProvider.signingSecretSecretRef", "verification_token": "spec.forProvider.verificationTokenSecretRef"} + return map[string]string{"client_secret": "clientSecretSecretRef", "signing_secret": "signingSecretSecretRef", "verification_token": "verificationTokenSecretRef"} } // GetObservation of this BotChannelSlack diff --git a/apis/botservice/v1beta1/zz_botchannelslack_types.go b/apis/botservice/v1beta1/zz_botchannelslack_types.go index e4729f7f6..6abee38fe 100755 --- a/apis/botservice/v1beta1/zz_botchannelslack_types.go +++ b/apis/botservice/v1beta1/zz_botchannelslack_types.go @@ -18,11 +18,20 @@ type BotChannelSlackInitParameters struct { // The Client ID that will be used to authenticate with Slack. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The Client Secret that will be used to authenticate with Slack. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` + // The Slack Landing Page URL. LandingPageURL *string `json:"landingPageUrl,omitempty" tf:"landing_page_url,omitempty"` // The supported Azure location where the resource exists. Changing this forces a new resource to be created. Location *string `json:"location,omitempty" tf:"location,omitempty"` + + // The Signing Secret that will be used to sign the requests. + SigningSecretSecretRef *v1.SecretKeySelector `json:"signingSecretSecretRef,omitempty" tf:"-"` + + // The Verification Token that will be used to authenticate with Slack. + VerificationTokenSecretRef v1.SecretKeySelector `json:"verificationTokenSecretRef" tf:"-"` } type BotChannelSlackObservation struct { diff --git a/apis/botservice/v1beta1/zz_botchannelsms_terraformed.go b/apis/botservice/v1beta1/zz_botchannelsms_terraformed.go index eb031be01..2eac67cc2 100755 --- a/apis/botservice/v1beta1/zz_botchannelsms_terraformed.go +++ b/apis/botservice/v1beta1/zz_botchannelsms_terraformed.go @@ -21,7 +21,7 @@ func (mg *BotChannelSMS) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this BotChannelSMS func (tr *BotChannelSMS) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"sms_channel_auth_token": "spec.forProvider.smsChannelAuthTokenSecretRef"} + return map[string]string{"sms_channel_auth_token": "smsChannelAuthTokenSecretRef"} } // GetObservation of this BotChannelSMS diff --git a/apis/botservice/v1beta1/zz_botchannelsms_types.go b/apis/botservice/v1beta1/zz_botchannelsms_types.go index a19b7afc5..a06ad10da 100755 --- a/apis/botservice/v1beta1/zz_botchannelsms_types.go +++ b/apis/botservice/v1beta1/zz_botchannelsms_types.go @@ -23,6 +23,9 @@ type BotChannelSMSInitParameters struct { // The account security identifier (SID) for the SMS Channel. SMSChannelAccountSecurityID *string `json:"smsChannelAccountSecurityId,omitempty" tf:"sms_channel_account_security_id,omitempty"` + + // The authorization token for the SMS Channel. + SMSChannelAuthTokenSecretRef v1.SecretKeySelector `json:"smsChannelAuthTokenSecretRef" tf:"-"` } type BotChannelSMSObservation struct { diff --git a/apis/botservice/v1beta1/zz_botchannelsregistration_terraformed.go b/apis/botservice/v1beta1/zz_botchannelsregistration_terraformed.go index 883fe7091..1304d0771 100755 --- a/apis/botservice/v1beta1/zz_botchannelsregistration_terraformed.go +++ b/apis/botservice/v1beta1/zz_botchannelsregistration_terraformed.go @@ -21,7 +21,7 @@ func (mg *BotChannelsRegistration) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this BotChannelsRegistration func (tr *BotChannelsRegistration) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"developer_app_insights_api_key": "spec.forProvider.developerAppInsightsApiKeySecretRef"} + return map[string]string{"developer_app_insights_api_key": "developerAppInsightsApiKeySecretRef"} } // GetObservation of this BotChannelsRegistration diff --git a/apis/botservice/v1beta1/zz_botchannelsregistration_types.go b/apis/botservice/v1beta1/zz_botchannelsregistration_types.go index 812eef01c..19331867a 100755 --- a/apis/botservice/v1beta1/zz_botchannelsregistration_types.go +++ b/apis/botservice/v1beta1/zz_botchannelsregistration_types.go @@ -21,6 +21,9 @@ type BotChannelsRegistrationInitParameters struct { // The description of the Bot Channels Registration. Description *string `json:"description,omitempty" tf:"description,omitempty"` + // The Application Insights API Key to associate with the Bot Channels Registration. + DeveloperAppInsightsAPIKeySecretRef *v1.SecretKeySelector `json:"developerAppInsightsApiKeySecretRef,omitempty" tf:"-"` + // The Application Insights Application ID to associate with the Bot Channels Registration. DeveloperAppInsightsApplicationID *string `json:"developerAppInsightsApplicationId,omitempty" tf:"developer_app_insights_application_id,omitempty"` diff --git a/apis/botservice/v1beta1/zz_botconnection_terraformed.go b/apis/botservice/v1beta1/zz_botconnection_terraformed.go index 163e8aa6e..58e963f5d 100755 --- a/apis/botservice/v1beta1/zz_botconnection_terraformed.go +++ b/apis/botservice/v1beta1/zz_botconnection_terraformed.go @@ -21,7 +21,7 @@ func (mg *BotConnection) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this BotConnection func (tr *BotConnection) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"client_secret": "spec.forProvider.clientSecretSecretRef"} + return map[string]string{"client_secret": "clientSecretSecretRef"} } // GetObservation of this BotConnection diff --git a/apis/botservice/v1beta1/zz_botconnection_types.go b/apis/botservice/v1beta1/zz_botconnection_types.go index 6e10bcbd4..9caaea235 100755 --- a/apis/botservice/v1beta1/zz_botconnection_types.go +++ b/apis/botservice/v1beta1/zz_botconnection_types.go @@ -18,6 +18,9 @@ type BotConnectionInitParameters struct { // The Client ID that will be used to authenticate with the service provider. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The Client Secret that will be used to authenticate with the service provider. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` + // The supported Azure location where the resource exists. Changing this forces a new resource to be created. Location *string `json:"location,omitempty" tf:"location,omitempty"` diff --git a/apis/botservice/v1beta1/zz_botwebapp_terraformed.go b/apis/botservice/v1beta1/zz_botwebapp_terraformed.go index 97a1b1351..516332946 100755 --- a/apis/botservice/v1beta1/zz_botwebapp_terraformed.go +++ b/apis/botservice/v1beta1/zz_botwebapp_terraformed.go @@ -21,7 +21,7 @@ func (mg *BotWebApp) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this BotWebApp func (tr *BotWebApp) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"developer_app_insights_api_key": "spec.forProvider.developerAppInsightsApiKeySecretRef", "luis_key": "spec.forProvider.luisKeySecretRef"} + return map[string]string{"developer_app_insights_api_key": "developerAppInsightsApiKeySecretRef", "luis_key": "luisKeySecretRef"} } // GetObservation of this BotWebApp diff --git a/apis/botservice/v1beta1/zz_botwebapp_types.go b/apis/botservice/v1beta1/zz_botwebapp_types.go index 7f2156a68..d099d3d26 100755 --- a/apis/botservice/v1beta1/zz_botwebapp_types.go +++ b/apis/botservice/v1beta1/zz_botwebapp_types.go @@ -15,6 +15,9 @@ import ( type BotWebAppInitParameters struct { + // The Application Insights API Key to associate with the Web App Bot. + DeveloperAppInsightsAPIKeySecretRef *v1.SecretKeySelector `json:"developerAppInsightsApiKeySecretRef,omitempty" tf:"-"` + // The Application Insights Application ID to associate with the Web App Bot. DeveloperAppInsightsApplicationID *string `json:"developerAppInsightsApplicationId,omitempty" tf:"developer_app_insights_application_id,omitempty"` @@ -33,6 +36,9 @@ type BotWebAppInitParameters struct { // A list of LUIS App IDs to associate with the Web App Bot. LuisAppIds []*string `json:"luisAppIds,omitempty" tf:"luis_app_ids,omitempty"` + // The LUIS key to associate with the Web App Bot. + LuisKeySecretRef *v1.SecretKeySelector `json:"luisKeySecretRef,omitempty" tf:"-"` + // The Microsoft Application ID for the Web App Bot. Changing this forces a new resource to be created. MicrosoftAppID *string `json:"microsoftAppId,omitempty" tf:"microsoft_app_id,omitempty"` diff --git a/apis/botservice/v1beta1/zz_generated.deepcopy.go b/apis/botservice/v1beta1/zz_generated.deepcopy.go index 3e9836ba3..7e3165c85 100644 --- a/apis/botservice/v1beta1/zz_generated.deepcopy.go +++ b/apis/botservice/v1beta1/zz_generated.deepcopy.go @@ -950,6 +950,7 @@ func (in *BotChannelSMSInitParameters) DeepCopyInto(out *BotChannelSMSInitParame *out = new(string) **out = **in } + out.SMSChannelAuthTokenSecretRef = in.SMSChannelAuthTokenSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new BotChannelSMSInitParameters. @@ -1170,6 +1171,7 @@ func (in *BotChannelSlackInitParameters) DeepCopyInto(out *BotChannelSlackInitPa *out = new(string) **out = **in } + out.ClientSecretSecretRef = in.ClientSecretSecretRef if in.LandingPageURL != nil { in, out := &in.LandingPageURL, &out.LandingPageURL *out = new(string) @@ -1180,6 +1182,12 @@ func (in *BotChannelSlackInitParameters) DeepCopyInto(out *BotChannelSlackInitPa *out = new(string) **out = **in } + if in.SigningSecretSecretRef != nil { + in, out := &in.SigningSecretSecretRef, &out.SigningSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + out.VerificationTokenSecretRef = in.VerificationTokenSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new BotChannelSlackInitParameters. @@ -1769,6 +1777,11 @@ func (in *BotChannelsRegistrationInitParameters) DeepCopyInto(out *BotChannelsRe *out = new(string) **out = **in } + if in.DeveloperAppInsightsAPIKeySecretRef != nil { + in, out := &in.DeveloperAppInsightsAPIKeySecretRef, &out.DeveloperAppInsightsAPIKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DeveloperAppInsightsApplicationID != nil { in, out := &in.DeveloperAppInsightsApplicationID, &out.DeveloperAppInsightsApplicationID *out = new(string) @@ -2206,6 +2219,7 @@ func (in *BotConnectionInitParameters) DeepCopyInto(out *BotConnectionInitParame *out = new(string) **out = **in } + out.ClientSecretSecretRef = in.ClientSecretSecretRef if in.Location != nil { in, out := &in.Location, &out.Location *out = new(string) @@ -2542,6 +2556,11 @@ func (in *BotWebApp) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *BotWebAppInitParameters) DeepCopyInto(out *BotWebAppInitParameters) { *out = *in + if in.DeveloperAppInsightsAPIKeySecretRef != nil { + in, out := &in.DeveloperAppInsightsAPIKeySecretRef, &out.DeveloperAppInsightsAPIKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DeveloperAppInsightsApplicationID != nil { in, out := &in.DeveloperAppInsightsApplicationID, &out.DeveloperAppInsightsApplicationID *out = new(string) @@ -2578,6 +2597,11 @@ func (in *BotWebAppInitParameters) DeepCopyInto(out *BotWebAppInitParameters) { } } } + if in.LuisKeySecretRef != nil { + in, out := &in.LuisKeySecretRef, &out.LuisKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.MicrosoftAppID != nil { in, out := &in.MicrosoftAppID, &out.MicrosoftAppID *out = new(string) @@ -2875,6 +2899,8 @@ func (in *BotWebAppStatus) DeepCopy() *BotWebAppStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *LineChannelInitParameters) DeepCopyInto(out *LineChannelInitParameters) { *out = *in + out.AccessTokenSecretRef = in.AccessTokenSecretRef + out.SecretSecretRef = in.SecretSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LineChannelInitParameters. diff --git a/apis/cache/v1beta2/zz_generated.deepcopy.go b/apis/cache/v1beta2/zz_generated.deepcopy.go index 4f2314592..bbc1affa4 100644 --- a/apis/cache/v1beta2/zz_generated.deepcopy.go +++ b/apis/cache/v1beta2/zz_generated.deepcopy.go @@ -793,6 +793,16 @@ func (in *RedisConfigurationInitParameters) DeepCopyInto(out *RedisConfiguration *out = new(bool) **out = **in } + if in.AofStorageConnectionString0SecretRef != nil { + in, out := &in.AofStorageConnectionString0SecretRef, &out.AofStorageConnectionString0SecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.AofStorageConnectionString1SecretRef != nil { + in, out := &in.AofStorageConnectionString1SecretRef, &out.AofStorageConnectionString1SecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DataPersistenceAuthenticationMethod != nil { in, out := &in.DataPersistenceAuthenticationMethod, &out.DataPersistenceAuthenticationMethod *out = new(string) @@ -843,6 +853,11 @@ func (in *RedisConfigurationInitParameters) DeepCopyInto(out *RedisConfiguration *out = new(float64) **out = **in } + if in.RdbStorageConnectionStringSecretRef != nil { + in, out := &in.RdbStorageConnectionStringSecretRef, &out.RdbStorageConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageAccountSubscriptionID != nil { in, out := &in.StorageAccountSubscriptionID, &out.StorageAccountSubscriptionID *out = new(string) diff --git a/apis/cache/v1beta2/zz_rediscache_terraformed.go b/apis/cache/v1beta2/zz_rediscache_terraformed.go index dfcca1ec1..3b100b2df 100755 --- a/apis/cache/v1beta2/zz_rediscache_terraformed.go +++ b/apis/cache/v1beta2/zz_rediscache_terraformed.go @@ -21,7 +21,7 @@ func (mg *RedisCache) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this RedisCache func (tr *RedisCache) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"primary_access_key": "status.atProvider.primaryAccessKey", "primary_connection_string": "status.atProvider.primaryConnectionString", "redis_configuration[*].aof_storage_connection_string_0": "spec.forProvider.redisConfiguration[*].aofStorageConnectionString0SecretRef", "redis_configuration[*].aof_storage_connection_string_1": "spec.forProvider.redisConfiguration[*].aofStorageConnectionString1SecretRef", "redis_configuration[*].rdb_storage_connection_string": "spec.forProvider.redisConfiguration[*].rdbStorageConnectionStringSecretRef", "secondary_access_key": "status.atProvider.secondaryAccessKey", "secondary_connection_string": "status.atProvider.secondaryConnectionString"} + return map[string]string{"primary_access_key": "status.atProvider.primaryAccessKey", "primary_connection_string": "status.atProvider.primaryConnectionString", "redis_configuration[*].aof_storage_connection_string_0": "redisConfiguration[*].aofStorageConnectionString0SecretRef", "redis_configuration[*].aof_storage_connection_string_1": "redisConfiguration[*].aofStorageConnectionString1SecretRef", "redis_configuration[*].rdb_storage_connection_string": "redisConfiguration[*].rdbStorageConnectionStringSecretRef", "secondary_access_key": "status.atProvider.secondaryAccessKey", "secondary_connection_string": "status.atProvider.secondaryConnectionString"} } // GetObservation of this RedisCache diff --git a/apis/cache/v1beta2/zz_rediscache_types.go b/apis/cache/v1beta2/zz_rediscache_types.go index 175f8901a..92ac38b34 100755 --- a/apis/cache/v1beta2/zz_rediscache_types.go +++ b/apis/cache/v1beta2/zz_rediscache_types.go @@ -354,6 +354,12 @@ type RedisConfigurationInitParameters struct { // Enable or disable AOF persistence for this Redis Cache. Defaults to false. AofBackupEnabled *bool `json:"aofBackupEnabled,omitempty" tf:"aof_backup_enabled,omitempty"` + // First Storage Account connection string for AOF persistence. + AofStorageConnectionString0SecretRef *v1.SecretKeySelector `json:"aofStorageConnectionString0SecretRef,omitempty" tf:"-"` + + // Second Storage Account connection string for AOF persistence. + AofStorageConnectionString1SecretRef *v1.SecretKeySelector `json:"aofStorageConnectionString1SecretRef,omitempty" tf:"-"` + // Preferred auth method to communicate to storage account used for data persistence. Possible values are SAS and ManagedIdentity. Defaults to SAS. DataPersistenceAuthenticationMethod *string `json:"dataPersistenceAuthenticationMethod,omitempty" tf:"data_persistence_authentication_method,omitempty"` @@ -384,6 +390,9 @@ type RedisConfigurationInitParameters struct { // The maximum number of snapshots to create as a backup. Only supported for Premium SKUs. RdbBackupMaxSnapshotCount *float64 `json:"rdbBackupMaxSnapshotCount,omitempty" tf:"rdb_backup_max_snapshot_count,omitempty"` + // The Connection String to the Storage Account. Only supported for Premium SKUs. In the format: DefaultEndpointsProtocol=https;BlobEndpoint=${azurerm_storage_account.example.primary_blob_endpoint};AccountName=${azurerm_storage_account.example.name};AccountKey=${azurerm_storage_account.example.primary_access_key}. + RdbStorageConnectionStringSecretRef *v1.SecretKeySelector `json:"rdbStorageConnectionStringSecretRef,omitempty" tf:"-"` + // The ID of the Subscription containing the Storage Account. StorageAccountSubscriptionID *string `json:"storageAccountSubscriptionId,omitempty" tf:"storage_account_subscription_id,omitempty"` } diff --git a/apis/cognitiveservices/v1beta2/zz_account_terraformed.go b/apis/cognitiveservices/v1beta2/zz_account_terraformed.go index e46c61cde..77cbbeb27 100755 --- a/apis/cognitiveservices/v1beta2/zz_account_terraformed.go +++ b/apis/cognitiveservices/v1beta2/zz_account_terraformed.go @@ -21,7 +21,7 @@ func (mg *Account) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Account func (tr *Account) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"custom_question_answering_search_service_key": "spec.forProvider.customQuestionAnsweringSearchServiceKeySecretRef", "primary_access_key": "status.atProvider.primaryAccessKey", "secondary_access_key": "status.atProvider.secondaryAccessKey"} + return map[string]string{"custom_question_answering_search_service_key": "customQuestionAnsweringSearchServiceKeySecretRef", "primary_access_key": "status.atProvider.primaryAccessKey", "secondary_access_key": "status.atProvider.secondaryAccessKey"} } // GetObservation of this Account diff --git a/apis/cognitiveservices/v1beta2/zz_account_types.go b/apis/cognitiveservices/v1beta2/zz_account_types.go index 36beaa33e..3036e53a4 100755 --- a/apis/cognitiveservices/v1beta2/zz_account_types.go +++ b/apis/cognitiveservices/v1beta2/zz_account_types.go @@ -18,6 +18,9 @@ type AccountInitParameters struct { // If kind is TextAnalytics this specifies the ID of the Search service. CustomQuestionAnsweringSearchServiceID *string `json:"customQuestionAnsweringSearchServiceId,omitempty" tf:"custom_question_answering_search_service_id,omitempty"` + // If kind is TextAnalytics this specifies the key of the Search service. + CustomQuestionAnsweringSearchServiceKeySecretRef *v1.SecretKeySelector `json:"customQuestionAnsweringSearchServiceKeySecretRef,omitempty" tf:"-"` + // The subdomain name used for token-based authentication. This property is required when network_acls is specified. Changing this forces a new resource to be created. CustomSubdomainName *string `json:"customSubdomainName,omitempty" tf:"custom_subdomain_name,omitempty"` diff --git a/apis/cognitiveservices/v1beta2/zz_generated.deepcopy.go b/apis/cognitiveservices/v1beta2/zz_generated.deepcopy.go index d55a20d5d..048b2de76 100644 --- a/apis/cognitiveservices/v1beta2/zz_generated.deepcopy.go +++ b/apis/cognitiveservices/v1beta2/zz_generated.deepcopy.go @@ -48,6 +48,11 @@ func (in *AccountInitParameters) DeepCopyInto(out *AccountInitParameters) { *out = new(string) **out = **in } + if in.CustomQuestionAnsweringSearchServiceKeySecretRef != nil { + in, out := &in.CustomQuestionAnsweringSearchServiceKeySecretRef, &out.CustomQuestionAnsweringSearchServiceKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.CustomSubdomainName != nil { in, out := &in.CustomSubdomainName, &out.CustomSubdomainName *out = new(string) diff --git a/apis/compute/v1beta2/zz_generated.deepcopy.go b/apis/compute/v1beta2/zz_generated.deepcopy.go index f527e7cfe..7e82638a3 100644 --- a/apis/compute/v1beta2/zz_generated.deepcopy.go +++ b/apis/compute/v1beta2/zz_generated.deepcopy.go @@ -76,6 +76,7 @@ func (in *AdditionalCapabilitiesParameters) DeepCopy() *AdditionalCapabilitiesPa // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *AdditionalUnattendContentInitParameters) DeepCopyInto(out *AdditionalUnattendContentInitParameters) { *out = *in + out.ContentSecretRef = in.ContentSecretRef if in.Setting != nil { in, out := &in.Setting, &out.Setting *out = new(string) @@ -1671,6 +1672,16 @@ func (in *EncryptionSettingsParameters) DeepCopy() *EncryptionSettingsParameters // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *ErrorBlobManagedIdentityInitParameters) DeepCopyInto(out *ErrorBlobManagedIdentityInitParameters) { *out = *in + if in.ClientIDSecretRef != nil { + in, out := &in.ClientIDSecretRef, &out.ClientIDSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.ObjectIDSecretRef != nil { + in, out := &in.ObjectIDSecretRef, &out.ObjectIDSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ErrorBlobManagedIdentityInitParameters. @@ -1751,6 +1762,11 @@ func (in *ExtensionInitParameters) DeepCopyInto(out *ExtensionInitParameters) { *out = new(ProtectedSettingsFromKeyVaultInitParameters) (*in).DeepCopyInto(*out) } + if in.ProtectedSettingsSecretRef != nil { + in, out := &in.ProtectedSettingsSecretRef, &out.ProtectedSettingsSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ProvisionAfterExtensions != nil { in, out := &in.ProvisionAfterExtensions, &out.ProvisionAfterExtensions *out = make([]*string, len(*in)) @@ -3957,6 +3973,11 @@ func (in *LinuxConfigurationAdminSSHKeyParameters) DeepCopy() *LinuxConfiguratio // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *LinuxConfigurationInitParameters) DeepCopyInto(out *LinuxConfigurationInitParameters) { *out = *in + if in.AdminPasswordSecretRef != nil { + in, out := &in.AdminPasswordSecretRef, &out.AdminPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AdminSSHKey != nil { in, out := &in.AdminSSHKey, &out.AdminSSHKey *out = make([]LinuxConfigurationAdminSSHKeyInitParameters, len(*in)) @@ -4415,6 +4436,11 @@ func (in *LinuxVirtualMachineInitParameters) DeepCopyInto(out *LinuxVirtualMachi *out = new(AdditionalCapabilitiesInitParameters) (*in).DeepCopyInto(*out) } + if in.AdminPasswordSecretRef != nil { + in, out := &in.AdminPasswordSecretRef, &out.AdminPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AdminSSHKey != nil { in, out := &in.AdminSSHKey, &out.AdminSSHKey *out = make([]AdminSSHKeyInitParameters, len(*in)) @@ -4457,6 +4483,11 @@ func (in *LinuxVirtualMachineInitParameters) DeepCopyInto(out *LinuxVirtualMachi *out = new(string) **out = **in } + if in.CustomDataSecretRef != nil { + in, out := &in.CustomDataSecretRef, &out.CustomDataSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DedicatedHostGroupID != nil { in, out := &in.DedicatedHostGroupID, &out.DedicatedHostGroupID *out = new(string) @@ -6137,6 +6168,11 @@ func (in *LinuxVirtualMachineScaleSetInitParameters) DeepCopyInto(out *LinuxVirt *out = new(LinuxVirtualMachineScaleSetAdditionalCapabilitiesInitParameters) (*in).DeepCopyInto(*out) } + if in.AdminPasswordSecretRef != nil { + in, out := &in.AdminPasswordSecretRef, &out.AdminPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AdminSSHKey != nil { in, out := &in.AdminSSHKey, &out.AdminSSHKey *out = make([]LinuxVirtualMachineScaleSetAdminSSHKeyInitParameters, len(*in)) @@ -6174,6 +6210,11 @@ func (in *LinuxVirtualMachineScaleSetInitParameters) DeepCopyInto(out *LinuxVirt *out = new(string) **out = **in } + if in.CustomDataSecretRef != nil { + in, out := &in.CustomDataSecretRef, &out.CustomDataSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DataDisk != nil { in, out := &in.DataDisk, &out.DataDisk *out = make([]LinuxVirtualMachineScaleSetDataDiskInitParameters, len(*in)) @@ -9483,6 +9524,11 @@ func (in *OrchestratedVirtualMachineScaleSetExtensionInitParameters) DeepCopyInt *out = new(ExtensionProtectedSettingsFromKeyVaultInitParameters) (*in).DeepCopyInto(*out) } + if in.ProtectedSettingsSecretRef != nil { + in, out := &in.ProtectedSettingsSecretRef, &out.ProtectedSettingsSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Publisher != nil { in, out := &in.Publisher, &out.Publisher *out = new(string) @@ -9920,6 +9966,11 @@ func (in *OrchestratedVirtualMachineScaleSetInitParameters) DeepCopyInto(out *Or *out = new(OrchestratedVirtualMachineScaleSetTerminationNotificationInitParameters) (*in).DeepCopyInto(*out) } + if in.UserDataBase64SecretRef != nil { + in, out := &in.UserDataBase64SecretRef, &out.UserDataBase64SecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ZoneBalance != nil { in, out := &in.ZoneBalance, &out.ZoneBalance *out = new(bool) @@ -11378,6 +11429,11 @@ func (in *OsImageNotificationParameters) DeepCopy() *OsImageNotificationParamete // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *OsProfileInitParameters) DeepCopyInto(out *OsProfileInitParameters) { *out = *in + if in.CustomDataSecretRef != nil { + in, out := &in.CustomDataSecretRef, &out.CustomDataSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.LinuxConfiguration != nil { in, out := &in.LinuxConfiguration, &out.LinuxConfiguration *out = new(LinuxConfigurationInitParameters) @@ -11458,6 +11514,16 @@ func (in *OsProfileParameters) DeepCopy() *OsProfileParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *OutputBlobManagedIdentityInitParameters) DeepCopyInto(out *OutputBlobManagedIdentityInitParameters) { *out = *in + if in.ClientIDSecretRef != nil { + in, out := &in.ClientIDSecretRef, &out.ClientIDSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.ObjectIDSecretRef != nil { + in, out := &in.ObjectIDSecretRef, &out.ObjectIDSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new OutputBlobManagedIdentityInitParameters. @@ -11753,6 +11819,8 @@ func (in *PriorityMixParameters) DeepCopy() *PriorityMixParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *ProtectedParameterInitParameters) DeepCopyInto(out *ProtectedParameterInitParameters) { *out = *in + out.NameSecretRef = in.NameSecretRef + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ProtectedParameterInitParameters. @@ -12391,6 +12459,16 @@ func (in *ScaleInParameters) DeepCopy() *ScaleInParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *ScriptURIManagedIdentityInitParameters) DeepCopyInto(out *ScriptURIManagedIdentityInitParameters) { *out = *in + if in.ClientIDSecretRef != nil { + in, out := &in.ClientIDSecretRef, &out.ClientIDSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.ObjectIDSecretRef != nil { + in, out := &in.ObjectIDSecretRef, &out.ObjectIDSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ScriptURIManagedIdentityInitParameters. @@ -14623,6 +14701,11 @@ func (in *VirtualMachineExtensionInitParameters) DeepCopyInto(out *VirtualMachin *out = new(VirtualMachineExtensionProtectedSettingsFromKeyVaultInitParameters) (*in).DeepCopyInto(*out) } + if in.ProtectedSettingsSecretRef != nil { + in, out := &in.ProtectedSettingsSecretRef, &out.ProtectedSettingsSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ProvisionAfterExtensions != nil { in, out := &in.ProvisionAfterExtensions, &out.ProvisionAfterExtensions *out = make([]*string, len(*in)) @@ -15051,7 +15134,7 @@ func (in *VirtualMachineRunCommandInitParameters) DeepCopyInto(out *VirtualMachi if in.ErrorBlobManagedIdentity != nil { in, out := &in.ErrorBlobManagedIdentity, &out.ErrorBlobManagedIdentity *out = new(ErrorBlobManagedIdentityInitParameters) - **out = **in + (*in).DeepCopyInto(*out) } if in.ErrorBlobURI != nil { in, out := &in.ErrorBlobURI, &out.ErrorBlobURI @@ -15076,7 +15159,7 @@ func (in *VirtualMachineRunCommandInitParameters) DeepCopyInto(out *VirtualMachi if in.OutputBlobManagedIdentity != nil { in, out := &in.OutputBlobManagedIdentity, &out.OutputBlobManagedIdentity *out = new(OutputBlobManagedIdentityInitParameters) - **out = **in + (*in).DeepCopyInto(*out) } if in.OutputBlobURI != nil { in, out := &in.OutputBlobURI, &out.OutputBlobURI @@ -15105,6 +15188,11 @@ func (in *VirtualMachineRunCommandInitParameters) DeepCopyInto(out *VirtualMachi *out = make([]ProtectedParameterInitParameters, len(*in)) copy(*out, *in) } + if in.RunAsPasswordSecretRef != nil { + in, out := &in.RunAsPasswordSecretRef, &out.RunAsPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.RunAsUser != nil { in, out := &in.RunAsUser, &out.RunAsUser *out = new(string) @@ -15409,7 +15497,7 @@ func (in *VirtualMachineRunCommandSourceInitParameters) DeepCopyInto(out *Virtua if in.ScriptURIManagedIdentity != nil { in, out := &in.ScriptURIManagedIdentity, &out.ScriptURIManagedIdentity *out = new(ScriptURIManagedIdentityInitParameters) - **out = **in + (*in).DeepCopyInto(*out) } if in.ScriptURIRef != nil { in, out := &in.ScriptURIRef, &out.ScriptURIRef @@ -15558,6 +15646,7 @@ func (in *WindowsConfigurationInitParameters) DeepCopyInto(out *WindowsConfigura (*in)[i].DeepCopyInto(&(*out)[i]) } } + out.AdminPasswordSecretRef = in.AdminPasswordSecretRef if in.AdminUsername != nil { in, out := &in.AdminUsername, &out.AdminUsername *out = new(string) @@ -16023,6 +16112,7 @@ func (in *WindowsVirtualMachineAdditionalCapabilitiesParameters) DeepCopy() *Win // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *WindowsVirtualMachineAdditionalUnattendContentInitParameters) DeepCopyInto(out *WindowsVirtualMachineAdditionalUnattendContentInitParameters) { *out = *in + out.ContentSecretRef = in.ContentSecretRef if in.Setting != nil { in, out := &in.Setting, &out.Setting *out = new(string) @@ -16394,6 +16484,7 @@ func (in *WindowsVirtualMachineInitParameters) DeepCopyInto(out *WindowsVirtualM (*in)[i].DeepCopyInto(&(*out)[i]) } } + out.AdminPasswordSecretRef = in.AdminPasswordSecretRef if in.AdminUsername != nil { in, out := &in.AdminUsername, &out.AdminUsername *out = new(string) @@ -16429,6 +16520,11 @@ func (in *WindowsVirtualMachineInitParameters) DeepCopyInto(out *WindowsVirtualM *out = new(string) **out = **in } + if in.CustomDataSecretRef != nil { + in, out := &in.CustomDataSecretRef, &out.CustomDataSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DedicatedHostGroupID != nil { in, out := &in.DedicatedHostGroupID, &out.DedicatedHostGroupID *out = new(string) @@ -17838,6 +17934,7 @@ func (in *WindowsVirtualMachineScaleSetAdditionalCapabilitiesParameters) DeepCop // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *WindowsVirtualMachineScaleSetAdditionalUnattendContentInitParameters) DeepCopyInto(out *WindowsVirtualMachineScaleSetAdditionalUnattendContentInitParameters) { *out = *in + out.ContentSecretRef = in.ContentSecretRef if in.Setting != nil { in, out := &in.Setting, &out.Setting *out = new(string) @@ -18329,6 +18426,11 @@ func (in *WindowsVirtualMachineScaleSetExtensionInitParameters) DeepCopyInto(out *out = new(WindowsVirtualMachineScaleSetExtensionProtectedSettingsFromKeyVaultInitParameters) (*in).DeepCopyInto(*out) } + if in.ProtectedSettingsSecretRef != nil { + in, out := &in.ProtectedSettingsSecretRef, &out.ProtectedSettingsSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ProvisionAfterExtensions != nil { in, out := &in.ProvisionAfterExtensions, &out.ProvisionAfterExtensions *out = make([]*string, len(*in)) @@ -18922,6 +19024,7 @@ func (in *WindowsVirtualMachineScaleSetInitParameters) DeepCopyInto(out *Windows (*in)[i].DeepCopyInto(&(*out)[i]) } } + out.AdminPasswordSecretRef = in.AdminPasswordSecretRef if in.AdminUsername != nil { in, out := &in.AdminUsername, &out.AdminUsername *out = new(string) @@ -18952,6 +19055,11 @@ func (in *WindowsVirtualMachineScaleSetInitParameters) DeepCopyInto(out *Windows *out = new(string) **out = **in } + if in.CustomDataSecretRef != nil { + in, out := &in.CustomDataSecretRef, &out.CustomDataSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DataDisk != nil { in, out := &in.DataDisk, &out.DataDisk *out = make([]WindowsVirtualMachineScaleSetDataDiskInitParameters, len(*in)) diff --git a/apis/compute/v1beta2/zz_linuxvirtualmachine_terraformed.go b/apis/compute/v1beta2/zz_linuxvirtualmachine_terraformed.go index 93cbc8668..05a01175f 100755 --- a/apis/compute/v1beta2/zz_linuxvirtualmachine_terraformed.go +++ b/apis/compute/v1beta2/zz_linuxvirtualmachine_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinuxVirtualMachine) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinuxVirtualMachine func (tr *LinuxVirtualMachine) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"admin_password": "spec.forProvider.adminPasswordSecretRef", "custom_data": "spec.forProvider.customDataSecretRef"} + return map[string]string{"admin_password": "adminPasswordSecretRef", "custom_data": "customDataSecretRef"} } // GetObservation of this LinuxVirtualMachine diff --git a/apis/compute/v1beta2/zz_linuxvirtualmachine_types.go b/apis/compute/v1beta2/zz_linuxvirtualmachine_types.go index 98f9ef493..f47461e17 100755 --- a/apis/compute/v1beta2/zz_linuxvirtualmachine_types.go +++ b/apis/compute/v1beta2/zz_linuxvirtualmachine_types.go @@ -240,6 +240,9 @@ type LinuxVirtualMachineInitParameters struct { // A additional_capabilities block as defined below. AdditionalCapabilities *AdditionalCapabilitiesInitParameters `json:"additionalCapabilities,omitempty" tf:"additional_capabilities,omitempty"` + // The Password which should be used for the local-administrator on this Virtual Machine. Changing this forces a new resource to be created. + AdminPasswordSecretRef *v1.SecretKeySelector `json:"adminPasswordSecretRef,omitempty" tf:"-"` + // One or more admin_ssh_key blocks as defined below. Changing this forces a new resource to be created. AdminSSHKey []AdminSSHKeyInitParameters `json:"adminSshKey,omitempty" tf:"admin_ssh_key,omitempty"` @@ -264,6 +267,9 @@ type LinuxVirtualMachineInitParameters struct { // Specifies the Hostname which should be used for this Virtual Machine. If unspecified this defaults to the value for the name field. If the value of the name field is not a valid computer_name, then you must specify computer_name. Changing this forces a new resource to be created. ComputerName *string `json:"computerName,omitempty" tf:"computer_name,omitempty"` + // The Base64-Encoded Custom Data which should be used for this Virtual Machine. Changing this forces a new resource to be created. + CustomDataSecretRef *v1.SecretKeySelector `json:"customDataSecretRef,omitempty" tf:"-"` + // The ID of a Dedicated Host Group that this Linux Virtual Machine should be run within. Conflicts with dedicated_host_id. DedicatedHostGroupID *string `json:"dedicatedHostGroupId,omitempty" tf:"dedicated_host_group_id,omitempty"` diff --git a/apis/compute/v1beta2/zz_linuxvirtualmachinescaleset_terraformed.go b/apis/compute/v1beta2/zz_linuxvirtualmachinescaleset_terraformed.go index d9c9c7304..f932319ac 100755 --- a/apis/compute/v1beta2/zz_linuxvirtualmachinescaleset_terraformed.go +++ b/apis/compute/v1beta2/zz_linuxvirtualmachinescaleset_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinuxVirtualMachineScaleSet) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinuxVirtualMachineScaleSet func (tr *LinuxVirtualMachineScaleSet) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"admin_password": "spec.forProvider.adminPasswordSecretRef", "custom_data": "spec.forProvider.customDataSecretRef", "extension[*].protected_settings": "spec.forProvider.extension[*].protectedSettingsSecretRef"} + return map[string]string{"admin_password": "adminPasswordSecretRef", "custom_data": "customDataSecretRef", "extension[*].protected_settings": "extension[*].protectedSettingsSecretRef"} } // GetObservation of this LinuxVirtualMachineScaleSet diff --git a/apis/compute/v1beta2/zz_linuxvirtualmachinescaleset_types.go b/apis/compute/v1beta2/zz_linuxvirtualmachinescaleset_types.go index 68b6e3685..f1db9d555 100755 --- a/apis/compute/v1beta2/zz_linuxvirtualmachinescaleset_types.go +++ b/apis/compute/v1beta2/zz_linuxvirtualmachinescaleset_types.go @@ -88,6 +88,9 @@ type ExtensionInitParameters struct { // A protected_settings_from_key_vault block as defined below. ProtectedSettingsFromKeyVault *ProtectedSettingsFromKeyVaultInitParameters `json:"protectedSettingsFromKeyVault,omitempty" tf:"protected_settings_from_key_vault,omitempty"` + // A JSON String which specifies Sensitive Settings (such as Passwords) for the Extension. + ProtectedSettingsSecretRef *v1.SecretKeySelector `json:"protectedSettingsSecretRef,omitempty" tf:"-"` + // An ordered list of Extension names which this should be provisioned after. ProvisionAfterExtensions []*string `json:"provisionAfterExtensions,omitempty" tf:"provision_after_extensions,omitempty"` @@ -656,6 +659,9 @@ type LinuxVirtualMachineScaleSetInitParameters struct { // An additional_capabilities block as defined below. AdditionalCapabilities *LinuxVirtualMachineScaleSetAdditionalCapabilitiesInitParameters `json:"additionalCapabilities,omitempty" tf:"additional_capabilities,omitempty"` + // The Password which should be used for the local-administrator on this Virtual Machine. Changing this forces a new resource to be created. + AdminPasswordSecretRef *v1.SecretKeySelector `json:"adminPasswordSecretRef,omitempty" tf:"-"` + // One or more admin_ssh_key blocks as defined below. AdminSSHKey []LinuxVirtualMachineScaleSetAdminSSHKeyInitParameters `json:"adminSshKey,omitempty" tf:"admin_ssh_key,omitempty"` @@ -677,6 +683,9 @@ type LinuxVirtualMachineScaleSetInitParameters struct { // The prefix which should be used for the name of the Virtual Machines in this Scale Set. If unspecified this defaults to the value for the name field. If the value of the name field is not a valid computer_name_prefix, then you must specify computer_name_prefix. Changing this forces a new resource to be created. ComputerNamePrefix *string `json:"computerNamePrefix,omitempty" tf:"computer_name_prefix,omitempty"` + // The Base64-Encoded Custom Data which should be used for this Virtual Machine Scale Set. + CustomDataSecretRef *v1.SecretKeySelector `json:"customDataSecretRef,omitempty" tf:"-"` + // One or more data_disk blocks as defined below. DataDisk []LinuxVirtualMachineScaleSetDataDiskInitParameters `json:"dataDisk,omitempty" tf:"data_disk,omitempty"` diff --git a/apis/compute/v1beta2/zz_orchestratedvirtualmachinescaleset_terraformed.go b/apis/compute/v1beta2/zz_orchestratedvirtualmachinescaleset_terraformed.go index ff4f561c5..6f377e990 100755 --- a/apis/compute/v1beta2/zz_orchestratedvirtualmachinescaleset_terraformed.go +++ b/apis/compute/v1beta2/zz_orchestratedvirtualmachinescaleset_terraformed.go @@ -21,7 +21,7 @@ func (mg *OrchestratedVirtualMachineScaleSet) GetTerraformResourceType() string // GetConnectionDetailsMapping for this OrchestratedVirtualMachineScaleSet func (tr *OrchestratedVirtualMachineScaleSet) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"extension[*].protected_settings": "spec.forProvider.extension[*].protectedSettingsSecretRef", "os_profile[*].custom_data": "spec.forProvider.osProfile[*].customDataSecretRef", "os_profile[*].linux_configuration[*].admin_password": "spec.forProvider.osProfile[*].linuxConfiguration[*].adminPasswordSecretRef", "os_profile[*].windows_configuration[*].additional_unattend_content[*].content": "spec.forProvider.osProfile[*].windowsConfiguration[*].additionalUnattendContent[*].contentSecretRef", "os_profile[*].windows_configuration[*].admin_password": "spec.forProvider.osProfile[*].windowsConfiguration[*].adminPasswordSecretRef", "user_data_base64": "spec.forProvider.userDataBase64SecretRef"} + return map[string]string{"extension[*].protected_settings": "extension[*].protectedSettingsSecretRef", "os_profile[*].custom_data": "osProfile[*].customDataSecretRef", "os_profile[*].linux_configuration[*].admin_password": "osProfile[*].linuxConfiguration[*].adminPasswordSecretRef", "os_profile[*].windows_configuration[*].additional_unattend_content[*].content": "osProfile[*].windowsConfiguration[*].additionalUnattendContent[*].contentSecretRef", "os_profile[*].windows_configuration[*].admin_password": "osProfile[*].windowsConfiguration[*].adminPasswordSecretRef", "user_data_base64": "userDataBase64SecretRef"} } // GetObservation of this OrchestratedVirtualMachineScaleSet diff --git a/apis/compute/v1beta2/zz_orchestratedvirtualmachinescaleset_types.go b/apis/compute/v1beta2/zz_orchestratedvirtualmachinescaleset_types.go index 55177f64e..14182cf9e 100755 --- a/apis/compute/v1beta2/zz_orchestratedvirtualmachinescaleset_types.go +++ b/apis/compute/v1beta2/zz_orchestratedvirtualmachinescaleset_types.go @@ -15,6 +15,9 @@ import ( type AdditionalUnattendContentInitParameters struct { + // The XML formatted content that is added to the unattend.xml file for the specified path and component. Changing this forces a new resource to be created. + ContentSecretRef v1.SecretKeySelector `json:"contentSecretRef" tf:"-"` + // The name of the setting to which the content applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. Setting *string `json:"setting,omitempty" tf:"setting,omitempty"` } @@ -28,7 +31,7 @@ type AdditionalUnattendContentObservation struct { type AdditionalUnattendContentParameters struct { // The XML formatted content that is added to the unattend.xml file for the specified path and component. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ContentSecretRef v1.SecretKeySelector `json:"contentSecretRef" tf:"-"` // The name of the setting to which the content applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. @@ -175,6 +178,9 @@ type LinuxConfigurationAdminSSHKeyParameters struct { type LinuxConfigurationInitParameters struct { + // The Password which should be used for the local-administrator on this Virtual Machine. Changing this forces a new resource to be created. + AdminPasswordSecretRef *v1.SecretKeySelector `json:"adminPasswordSecretRef,omitempty" tf:"-"` + // A admin_ssh_key block as documented below. AdminSSHKey []LinuxConfigurationAdminSSHKeyInitParameters `json:"adminSshKey,omitempty" tf:"admin_ssh_key,omitempty"` @@ -618,6 +624,9 @@ type OrchestratedVirtualMachineScaleSetExtensionInitParameters struct { // A protected_settings_from_key_vault block as defined below. ProtectedSettingsFromKeyVault *ExtensionProtectedSettingsFromKeyVaultInitParameters `json:"protectedSettingsFromKeyVault,omitempty" tf:"protected_settings_from_key_vault,omitempty"` + // A JSON String which specifies Sensitive Settings (such as Passwords) for the Extension. + ProtectedSettingsSecretRef *v1.SecretKeySelector `json:"protectedSettingsSecretRef,omitempty" tf:"-"` + // Specifies the Publisher of the Extension. Publisher *string `json:"publisher,omitempty" tf:"publisher,omitempty"` @@ -833,6 +842,9 @@ type OrchestratedVirtualMachineScaleSetInitParameters struct { // A termination_notification block as defined below. TerminationNotification *OrchestratedVirtualMachineScaleSetTerminationNotificationInitParameters `json:"terminationNotification,omitempty" tf:"termination_notification,omitempty"` + // The Base64-Encoded User Data which should be used for this Virtual Machine Scale Set. + UserDataBase64SecretRef *v1.SecretKeySelector `json:"userDataBase64SecretRef,omitempty" tf:"-"` + // Should the Virtual Machines in this Scale Set be strictly evenly distributed across Availability Zones? Defaults to false. Changing this forces a new resource to be created. ZoneBalance *bool `json:"zoneBalance,omitempty" tf:"zone_balance,omitempty"` @@ -1390,6 +1402,9 @@ type OrchestratedVirtualMachineScaleSetTerminationNotificationParameters struct type OsProfileInitParameters struct { + // The Base64-Encoded Custom Data which should be used for this Virtual Machine Scale Set. + CustomDataSecretRef *v1.SecretKeySelector `json:"customDataSecretRef,omitempty" tf:"-"` + // A linux_configuration block as documented below. LinuxConfiguration *LinuxConfigurationInitParameters `json:"linuxConfiguration,omitempty" tf:"linux_configuration,omitempty"` @@ -1484,6 +1499,9 @@ type WindowsConfigurationInitParameters struct { // One or more additional_unattend_content blocks as defined below. Changing this forces a new resource to be created. AdditionalUnattendContent []AdditionalUnattendContentInitParameters `json:"additionalUnattendContent,omitempty" tf:"additional_unattend_content,omitempty"` + // The Password which should be used for the local-administrator on this Virtual Machine. Changing this forces a new resource to be created. + AdminPasswordSecretRef v1.SecretKeySelector `json:"adminPasswordSecretRef" tf:"-"` + // The username of the local administrator on each Virtual Machine Scale Set instance. Changing this forces a new resource to be created. AdminUsername *string `json:"adminUsername,omitempty" tf:"admin_username,omitempty"` @@ -1558,7 +1576,7 @@ type WindowsConfigurationParameters struct { AdditionalUnattendContent []AdditionalUnattendContentParameters `json:"additionalUnattendContent,omitempty" tf:"additional_unattend_content,omitempty"` // The Password which should be used for the local-administrator on this Virtual Machine. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AdminPasswordSecretRef v1.SecretKeySelector `json:"adminPasswordSecretRef" tf:"-"` // The username of the local administrator on each Virtual Machine Scale Set instance. Changing this forces a new resource to be created. diff --git a/apis/compute/v1beta2/zz_virtualmachineextension_terraformed.go b/apis/compute/v1beta2/zz_virtualmachineextension_terraformed.go index 6b5592e6e..df6e7909c 100755 --- a/apis/compute/v1beta2/zz_virtualmachineextension_terraformed.go +++ b/apis/compute/v1beta2/zz_virtualmachineextension_terraformed.go @@ -21,7 +21,7 @@ func (mg *VirtualMachineExtension) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this VirtualMachineExtension func (tr *VirtualMachineExtension) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"protected_settings": "spec.forProvider.protectedSettingsSecretRef"} + return map[string]string{"protected_settings": "protectedSettingsSecretRef"} } // GetObservation of this VirtualMachineExtension diff --git a/apis/compute/v1beta2/zz_virtualmachineextension_types.go b/apis/compute/v1beta2/zz_virtualmachineextension_types.go index 6bd6afeb9..811048c2d 100755 --- a/apis/compute/v1beta2/zz_virtualmachineextension_types.go +++ b/apis/compute/v1beta2/zz_virtualmachineextension_types.go @@ -27,6 +27,9 @@ type VirtualMachineExtensionInitParameters struct { // A protected_settings_from_key_vault block as defined below. ProtectedSettingsFromKeyVault *VirtualMachineExtensionProtectedSettingsFromKeyVaultInitParameters `json:"protectedSettingsFromKeyVault,omitempty" tf:"protected_settings_from_key_vault,omitempty"` + // The protected_settings passed to the extension, like settings, these are specified as a JSON object in a string. + ProtectedSettingsSecretRef *v1.SecretKeySelector `json:"protectedSettingsSecretRef,omitempty" tf:"-"` + // Specifies the collection of extension names after which this extension needs to be provisioned. ProvisionAfterExtensions []*string `json:"provisionAfterExtensions,omitempty" tf:"provision_after_extensions,omitempty"` diff --git a/apis/compute/v1beta2/zz_virtualmachineruncommand_terraformed.go b/apis/compute/v1beta2/zz_virtualmachineruncommand_terraformed.go index 460f6ff77..aa994525c 100755 --- a/apis/compute/v1beta2/zz_virtualmachineruncommand_terraformed.go +++ b/apis/compute/v1beta2/zz_virtualmachineruncommand_terraformed.go @@ -21,7 +21,7 @@ func (mg *VirtualMachineRunCommand) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this VirtualMachineRunCommand func (tr *VirtualMachineRunCommand) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"error_blob_managed_identity[*].client_id": "spec.forProvider.errorBlobManagedIdentity[*].clientIdSecretRef", "error_blob_managed_identity[*].object_id": "spec.forProvider.errorBlobManagedIdentity[*].objectIdSecretRef", "output_blob_managed_identity[*].client_id": "spec.forProvider.outputBlobManagedIdentity[*].clientIdSecretRef", "output_blob_managed_identity[*].object_id": "spec.forProvider.outputBlobManagedIdentity[*].objectIdSecretRef", "protected_parameter[*].name": "spec.forProvider.protectedParameter[*].nameSecretRef", "protected_parameter[*].value": "spec.forProvider.protectedParameter[*].valueSecretRef", "run_as_password": "spec.forProvider.runAsPasswordSecretRef", "source[*].script_uri_managed_identity[*].client_id": "spec.forProvider.source[*].scriptUriManagedIdentity[*].clientIdSecretRef", "source[*].script_uri_managed_identity[*].object_id": "spec.forProvider.source[*].scriptUriManagedIdentity[*].objectIdSecretRef"} + return map[string]string{"error_blob_managed_identity[*].client_id": "errorBlobManagedIdentity[*].clientIdSecretRef", "error_blob_managed_identity[*].object_id": "errorBlobManagedIdentity[*].objectIdSecretRef", "output_blob_managed_identity[*].client_id": "outputBlobManagedIdentity[*].clientIdSecretRef", "output_blob_managed_identity[*].object_id": "outputBlobManagedIdentity[*].objectIdSecretRef", "protected_parameter[*].name": "protectedParameter[*].nameSecretRef", "protected_parameter[*].value": "protectedParameter[*].valueSecretRef", "run_as_password": "runAsPasswordSecretRef", "source[*].script_uri_managed_identity[*].client_id": "source[*].scriptUriManagedIdentity[*].clientIdSecretRef", "source[*].script_uri_managed_identity[*].object_id": "source[*].scriptUriManagedIdentity[*].objectIdSecretRef"} } // GetObservation of this VirtualMachineRunCommand diff --git a/apis/compute/v1beta2/zz_virtualmachineruncommand_types.go b/apis/compute/v1beta2/zz_virtualmachineruncommand_types.go index f670d6865..d52915236 100755 --- a/apis/compute/v1beta2/zz_virtualmachineruncommand_types.go +++ b/apis/compute/v1beta2/zz_virtualmachineruncommand_types.go @@ -14,6 +14,12 @@ import ( ) type ErrorBlobManagedIdentityInitParameters struct { + + // The client ID of the managed identity. + ClientIDSecretRef *v1.SecretKeySelector `json:"clientIdSecretRef,omitempty" tf:"-"` + + // The object ID of the managed identity. + ObjectIDSecretRef *v1.SecretKeySelector `json:"objectIdSecretRef,omitempty" tf:"-"` } type ErrorBlobManagedIdentityObservation struct { @@ -53,6 +59,12 @@ type InstanceViewParameters struct { } type OutputBlobManagedIdentityInitParameters struct { + + // The client ID of the managed identity. + ClientIDSecretRef *v1.SecretKeySelector `json:"clientIdSecretRef,omitempty" tf:"-"` + + // The object ID of the managed identity. + ObjectIDSecretRef *v1.SecretKeySelector `json:"objectIdSecretRef,omitempty" tf:"-"` } type OutputBlobManagedIdentityObservation struct { @@ -99,6 +111,12 @@ type ParameterParameters struct { } type ProtectedParameterInitParameters struct { + + // The run parameter name. + NameSecretRef v1.SecretKeySelector `json:"nameSecretRef" tf:"-"` + + // The run parameter value. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type ProtectedParameterObservation struct { @@ -107,15 +125,21 @@ type ProtectedParameterObservation struct { type ProtectedParameterParameters struct { // The run parameter name. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional NameSecretRef v1.SecretKeySelector `json:"nameSecretRef" tf:"-"` // The run parameter value. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type ScriptURIManagedIdentityInitParameters struct { + + // The client ID of the managed identity. + ClientIDSecretRef *v1.SecretKeySelector `json:"clientIdSecretRef,omitempty" tf:"-"` + + // The object ID of the managed identity. + ObjectIDSecretRef *v1.SecretKeySelector `json:"objectIdSecretRef,omitempty" tf:"-"` } type ScriptURIManagedIdentityObservation struct { @@ -175,6 +199,9 @@ type VirtualMachineRunCommandInitParameters struct { // A list of protected_parameter blocks as defined below. The protected parameters used by the script. ProtectedParameter []ProtectedParameterInitParameters `json:"protectedParameter,omitempty" tf:"protected_parameter,omitempty"` + // Specifies the user account password on the VM when executing the Virtual Machine Run Command. + RunAsPasswordSecretRef *v1.SecretKeySelector `json:"runAsPasswordSecretRef,omitempty" tf:"-"` + // Specifies the user account on the VM when executing the Virtual Machine Run Command. RunAsUser *string `json:"runAsUser,omitempty" tf:"run_as_user,omitempty"` diff --git a/apis/compute/v1beta2/zz_windowsvirtualmachine_terraformed.go b/apis/compute/v1beta2/zz_windowsvirtualmachine_terraformed.go index e4521d81d..c10942fed 100755 --- a/apis/compute/v1beta2/zz_windowsvirtualmachine_terraformed.go +++ b/apis/compute/v1beta2/zz_windowsvirtualmachine_terraformed.go @@ -21,7 +21,7 @@ func (mg *WindowsVirtualMachine) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this WindowsVirtualMachine func (tr *WindowsVirtualMachine) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"additional_unattend_content[*].content": "spec.forProvider.additionalUnattendContent[*].contentSecretRef", "admin_password": "spec.forProvider.adminPasswordSecretRef", "custom_data": "spec.forProvider.customDataSecretRef"} + return map[string]string{"additional_unattend_content[*].content": "additionalUnattendContent[*].contentSecretRef", "admin_password": "adminPasswordSecretRef", "custom_data": "customDataSecretRef"} } // GetObservation of this WindowsVirtualMachine diff --git a/apis/compute/v1beta2/zz_windowsvirtualmachine_types.go b/apis/compute/v1beta2/zz_windowsvirtualmachine_types.go index 0e2ac8535..947c62279 100755 --- a/apis/compute/v1beta2/zz_windowsvirtualmachine_types.go +++ b/apis/compute/v1beta2/zz_windowsvirtualmachine_types.go @@ -34,6 +34,9 @@ type WindowsVirtualMachineAdditionalCapabilitiesParameters struct { type WindowsVirtualMachineAdditionalUnattendContentInitParameters struct { + // The XML formatted content that is added to the unattend.xml file for the specified path and component. Changing this forces a new resource to be created. + ContentSecretRef v1.SecretKeySelector `json:"contentSecretRef" tf:"-"` + // The name of the setting to which the content applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. Setting *string `json:"setting,omitempty" tf:"setting,omitempty"` } @@ -47,7 +50,7 @@ type WindowsVirtualMachineAdditionalUnattendContentObservation struct { type WindowsVirtualMachineAdditionalUnattendContentParameters struct { // The XML formatted content that is added to the unattend.xml file for the specified path and component. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ContentSecretRef v1.SecretKeySelector `json:"contentSecretRef" tf:"-"` // The name of the setting to which the content applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. @@ -189,6 +192,9 @@ type WindowsVirtualMachineInitParameters struct { // One or more additional_unattend_content blocks as defined below. Changing this forces a new resource to be created. AdditionalUnattendContent []WindowsVirtualMachineAdditionalUnattendContentInitParameters `json:"additionalUnattendContent,omitempty" tf:"additional_unattend_content,omitempty"` + // The Password which should be used for the local-administrator on this Virtual Machine. Changing this forces a new resource to be created. + AdminPasswordSecretRef v1.SecretKeySelector `json:"adminPasswordSecretRef" tf:"-"` + // The username of the local administrator used for the Virtual Machine. Changing this forces a new resource to be created. AdminUsername *string `json:"adminUsername,omitempty" tf:"admin_username,omitempty"` @@ -210,6 +216,9 @@ type WindowsVirtualMachineInitParameters struct { // Specifies the Hostname which should be used for this Virtual Machine. If unspecified this defaults to the value for the name field. If the value of the name field is not a valid computer_name, then you must specify computer_name. Changing this forces a new resource to be created. ComputerName *string `json:"computerName,omitempty" tf:"computer_name,omitempty"` + // The Base64-Encoded Custom Data which should be used for this Virtual Machine. Changing this forces a new resource to be created. + CustomDataSecretRef *v1.SecretKeySelector `json:"customDataSecretRef,omitempty" tf:"-"` + // The ID of a Dedicated Host Group that this Windows Virtual Machine should be run within. Conflicts with dedicated_host_id. DedicatedHostGroupID *string `json:"dedicatedHostGroupId,omitempty" tf:"dedicated_host_group_id,omitempty"` diff --git a/apis/compute/v1beta2/zz_windowsvirtualmachinescaleset_terraformed.go b/apis/compute/v1beta2/zz_windowsvirtualmachinescaleset_terraformed.go index ec5709922..e37744cc0 100755 --- a/apis/compute/v1beta2/zz_windowsvirtualmachinescaleset_terraformed.go +++ b/apis/compute/v1beta2/zz_windowsvirtualmachinescaleset_terraformed.go @@ -21,7 +21,7 @@ func (mg *WindowsVirtualMachineScaleSet) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this WindowsVirtualMachineScaleSet func (tr *WindowsVirtualMachineScaleSet) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"additional_unattend_content[*].content": "spec.forProvider.additionalUnattendContent[*].contentSecretRef", "admin_password": "spec.forProvider.adminPasswordSecretRef", "custom_data": "spec.forProvider.customDataSecretRef", "extension[*].protected_settings": "spec.forProvider.extension[*].protectedSettingsSecretRef"} + return map[string]string{"additional_unattend_content[*].content": "additionalUnattendContent[*].contentSecretRef", "admin_password": "adminPasswordSecretRef", "custom_data": "customDataSecretRef", "extension[*].protected_settings": "extension[*].protectedSettingsSecretRef"} } // GetObservation of this WindowsVirtualMachineScaleSet diff --git a/apis/compute/v1beta2/zz_windowsvirtualmachinescaleset_types.go b/apis/compute/v1beta2/zz_windowsvirtualmachinescaleset_types.go index 0b452a6a7..a3cdada69 100755 --- a/apis/compute/v1beta2/zz_windowsvirtualmachinescaleset_types.go +++ b/apis/compute/v1beta2/zz_windowsvirtualmachinescaleset_types.go @@ -132,6 +132,9 @@ type WindowsVirtualMachineScaleSetAdditionalCapabilitiesParameters struct { type WindowsVirtualMachineScaleSetAdditionalUnattendContentInitParameters struct { + // The XML formatted content that is added to the unattend.xml file for the specified path and component. Changing this forces a new resource to be created. + ContentSecretRef v1.SecretKeySelector `json:"contentSecretRef" tf:"-"` + // The name of the setting to which the content applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. Setting *string `json:"setting,omitempty" tf:"setting,omitempty"` } @@ -145,7 +148,7 @@ type WindowsVirtualMachineScaleSetAdditionalUnattendContentObservation struct { type WindowsVirtualMachineScaleSetAdditionalUnattendContentParameters struct { // The XML formatted content that is added to the unattend.xml file for the specified path and component. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ContentSecretRef v1.SecretKeySelector `json:"contentSecretRef" tf:"-"` // The name of the setting to which the content applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. @@ -356,6 +359,9 @@ type WindowsVirtualMachineScaleSetExtensionInitParameters struct { // A protected_settings_from_key_vault block as defined below. ProtectedSettingsFromKeyVault *WindowsVirtualMachineScaleSetExtensionProtectedSettingsFromKeyVaultInitParameters `json:"protectedSettingsFromKeyVault,omitempty" tf:"protected_settings_from_key_vault,omitempty"` + // A JSON String which specifies Sensitive Settings (such as Passwords) for the Extension. + ProtectedSettingsSecretRef *v1.SecretKeySelector `json:"protectedSettingsSecretRef,omitempty" tf:"-"` + // An ordered list of Extension names which this should be provisioned after. ProvisionAfterExtensions []*string `json:"provisionAfterExtensions,omitempty" tf:"provision_after_extensions,omitempty"` @@ -620,6 +626,9 @@ type WindowsVirtualMachineScaleSetInitParameters struct { // One or more additional_unattend_content blocks as defined below. Changing this forces a new resource to be created. AdditionalUnattendContent []WindowsVirtualMachineScaleSetAdditionalUnattendContentInitParameters `json:"additionalUnattendContent,omitempty" tf:"additional_unattend_content,omitempty"` + // The Password which should be used for the local-administrator on this Virtual Machine. Changing this forces a new resource to be created. + AdminPasswordSecretRef v1.SecretKeySelector `json:"adminPasswordSecretRef" tf:"-"` + // The username of the local administrator on each Virtual Machine Scale Set instance. Changing this forces a new resource to be created. AdminUsername *string `json:"adminUsername,omitempty" tf:"admin_username,omitempty"` @@ -638,6 +647,9 @@ type WindowsVirtualMachineScaleSetInitParameters struct { // The prefix which should be used for the name of the Virtual Machines in this Scale Set. If unspecified this defaults to the value for the name field. If the value of the name field is not a valid computer_name_prefix, then you must specify computer_name_prefix. Changing this forces a new resource to be created. ComputerNamePrefix *string `json:"computerNamePrefix,omitempty" tf:"computer_name_prefix,omitempty"` + // The Base64-Encoded Custom Data which should be used for this Virtual Machine Scale Set. + CustomDataSecretRef *v1.SecretKeySelector `json:"customDataSecretRef,omitempty" tf:"-"` + // One or more data_disk blocks as defined below. DataDisk []WindowsVirtualMachineScaleSetDataDiskInitParameters `json:"dataDisk,omitempty" tf:"data_disk,omitempty"` diff --git a/apis/containerapp/v1beta1/zz_environment_terraformed.go b/apis/containerapp/v1beta1/zz_environment_terraformed.go index c1e90e43f..ce6141288 100755 --- a/apis/containerapp/v1beta1/zz_environment_terraformed.go +++ b/apis/containerapp/v1beta1/zz_environment_terraformed.go @@ -21,7 +21,7 @@ func (mg *Environment) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Environment func (tr *Environment) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"dapr_application_insights_connection_string": "spec.forProvider.daprApplicationInsightsConnectionStringSecretRef"} + return map[string]string{"dapr_application_insights_connection_string": "daprApplicationInsightsConnectionStringSecretRef"} } // GetObservation of this Environment diff --git a/apis/containerapp/v1beta1/zz_environment_types.go b/apis/containerapp/v1beta1/zz_environment_types.go index 76bd2ed89..2e3fb1d25 100755 --- a/apis/containerapp/v1beta1/zz_environment_types.go +++ b/apis/containerapp/v1beta1/zz_environment_types.go @@ -15,6 +15,10 @@ import ( type EnvironmentInitParameters struct { + // Application Insights connection string used by Dapr to export Service to Service communication telemetry. Changing this forces a new resource to be created. + // Application Insights connection string used by Dapr to export Service to Service communication telemetry. + DaprApplicationInsightsConnectionStringSecretRef *v1.SecretKeySelector `json:"daprApplicationInsightsConnectionStringSecretRef,omitempty" tf:"-"` + // Name of the platform-managed resource group created for the Managed Environment to host infrastructure resources. Changing this forces a new resource to be created. // Name of the platform-managed resource group created for the Managed Environment to host infrastructure resources. **Note:** Only valid if a `workload_profile` is specified. If `infrastructure_subnet_id` is specified, this resource group will be created in the same subscription as `infrastructure_subnet_id`. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/azure/v1beta1.ResourceGroup diff --git a/apis/containerapp/v1beta1/zz_generated.deepcopy.go b/apis/containerapp/v1beta1/zz_generated.deepcopy.go index 8566ec065..508a8e6b6 100644 --- a/apis/containerapp/v1beta1/zz_generated.deepcopy.go +++ b/apis/containerapp/v1beta1/zz_generated.deepcopy.go @@ -1422,6 +1422,11 @@ func (in *Environment) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *EnvironmentInitParameters) DeepCopyInto(out *EnvironmentInitParameters) { *out = *in + if in.DaprApplicationInsightsConnectionStringSecretRef != nil { + in, out := &in.DaprApplicationInsightsConnectionStringSecretRef, &out.DaprApplicationInsightsConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.InfrastructureResourceGroupName != nil { in, out := &in.InfrastructureResourceGroupName, &out.InfrastructureResourceGroupName *out = new(string) diff --git a/apis/containerapp/v1beta2/zz_containerapp_terraformed.go b/apis/containerapp/v1beta2/zz_containerapp_terraformed.go index 04291143f..5365d6daf 100755 --- a/apis/containerapp/v1beta2/zz_containerapp_terraformed.go +++ b/apis/containerapp/v1beta2/zz_containerapp_terraformed.go @@ -21,7 +21,7 @@ func (mg *ContainerApp) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this ContainerApp func (tr *ContainerApp) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "secret[*].name": "spec.forProvider.secret[*].nameSecretRef", "secret[*].value": "spec.forProvider.secret[*].valueSecretRef"} + return map[string]string{"custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "secret[*].name": "secret[*].nameSecretRef", "secret[*].value": "secret[*].valueSecretRef"} } // GetObservation of this ContainerApp diff --git a/apis/containerapp/v1beta2/zz_containerapp_types.go b/apis/containerapp/v1beta2/zz_containerapp_types.go index c0a9f52ce..f72402599 100755 --- a/apis/containerapp/v1beta2/zz_containerapp_types.go +++ b/apis/containerapp/v1beta2/zz_containerapp_types.go @@ -1473,6 +1473,14 @@ type RegistryParameters struct { } type SecretInitParameters struct { + + // The Secret name. + // The Secret name. + NameSecretRef v1.SecretKeySelector `json:"nameSecretRef" tf:"-"` + + // The value for this secret. + // The value for this secret. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type SecretObservation struct { @@ -1482,12 +1490,12 @@ type SecretParameters struct { // The Secret name. // The Secret name. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional NameSecretRef v1.SecretKeySelector `json:"nameSecretRef" tf:"-"` // The value for this secret. // The value for this secret. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } diff --git a/apis/containerapp/v1beta2/zz_generated.deepcopy.go b/apis/containerapp/v1beta2/zz_generated.deepcopy.go index 445017c9b..95bbebc98 100644 --- a/apis/containerapp/v1beta2/zz_generated.deepcopy.go +++ b/apis/containerapp/v1beta2/zz_generated.deepcopy.go @@ -2947,6 +2947,8 @@ func (in *RegistryParameters) DeepCopy() *RegistryParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *SecretInitParameters) DeepCopyInto(out *SecretInitParameters) { *out = *in + out.NameSecretRef = in.NameSecretRef + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretInitParameters. diff --git a/apis/containerservice/v1beta2/zz_generated.deepcopy.go b/apis/containerservice/v1beta2/zz_generated.deepcopy.go index 25da02bf1..8c83d08d2 100644 --- a/apis/containerservice/v1beta2/zz_generated.deepcopy.go +++ b/apis/containerservice/v1beta2/zz_generated.deepcopy.go @@ -745,6 +745,11 @@ func (in *AzureActiveDirectoryRoleBasedAccessControlInitParameters) DeepCopyInto *out = new(string) **out = **in } + if in.ServerAppSecretSecretRef != nil { + in, out := &in.ServerAppSecretSecretRef, &out.ServerAppSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.TenantID != nil { in, out := &in.TenantID, &out.TenantID *out = new(string) @@ -1860,6 +1865,11 @@ func (in *HTTPProxyConfigInitParameters) DeepCopyInto(out *HTTPProxyConfigInitPa } } } + if in.TrustedCASecretRef != nil { + in, out := &in.TrustedCASecretRef, &out.TrustedCASecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new HTTPProxyConfigInitParameters. @@ -8463,6 +8473,7 @@ func (in *ServicePrincipalInitParameters) DeepCopyInto(out *ServicePrincipalInit *out = new(string) **out = **in } + out.ClientSecretSecretRef = in.ClientSecretSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ServicePrincipalInitParameters. @@ -9306,6 +9317,11 @@ func (in *WebAppRoutingParameters) DeepCopy() *WebAppRoutingParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *WindowsProfileInitParameters) DeepCopyInto(out *WindowsProfileInitParameters) { *out = *in + if in.AdminPasswordSecretRef != nil { + in, out := &in.AdminPasswordSecretRef, &out.AdminPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AdminUsername != nil { in, out := &in.AdminUsername, &out.AdminUsername *out = new(string) diff --git a/apis/containerservice/v1beta2/zz_kubernetescluster_terraformed.go b/apis/containerservice/v1beta2/zz_kubernetescluster_terraformed.go index 6c0b0f7b7..22b28c916 100755 --- a/apis/containerservice/v1beta2/zz_kubernetescluster_terraformed.go +++ b/apis/containerservice/v1beta2/zz_kubernetescluster_terraformed.go @@ -21,7 +21,7 @@ func (mg *KubernetesCluster) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this KubernetesCluster func (tr *KubernetesCluster) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"azure_active_directory_role_based_access_control[*].server_app_secret": "spec.forProvider.azureActiveDirectoryRoleBasedAccessControl[*].serverAppSecretSecretRef", "http_proxy_config[*].trusted_ca": "spec.forProvider.httpProxyConfig[*].trustedCaSecretRef", "kube_admin_config[*]": "status.atProvider.kubeAdminConfig[*]", "kube_admin_config[*].client_certificate": "status.atProvider.kubeAdminConfig[*].clientCertificate", "kube_admin_config[*].client_key": "status.atProvider.kubeAdminConfig[*].clientKey", "kube_admin_config[*].cluster_ca_certificate": "status.atProvider.kubeAdminConfig[*].clusterCaCertificate", "kube_admin_config[*].password": "status.atProvider.kubeAdminConfig[*].password", "kube_admin_config_raw": "status.atProvider.kubeAdminConfigRaw", "kube_config[*]": "status.atProvider.kubeConfig[*]", "kube_config[*].client_certificate": "status.atProvider.kubeConfig[*].clientCertificate", "kube_config[*].client_key": "status.atProvider.kubeConfig[*].clientKey", "kube_config[*].cluster_ca_certificate": "status.atProvider.kubeConfig[*].clusterCaCertificate", "kube_config[*].password": "status.atProvider.kubeConfig[*].password", "kube_config_raw": "status.atProvider.kubeConfigRaw", "service_principal[*].client_secret": "spec.forProvider.servicePrincipal[*].clientSecretSecretRef", "windows_profile[*].admin_password": "spec.forProvider.windowsProfile[*].adminPasswordSecretRef"} + return map[string]string{"azure_active_directory_role_based_access_control[*].server_app_secret": "azureActiveDirectoryRoleBasedAccessControl[*].serverAppSecretSecretRef", "http_proxy_config[*].trusted_ca": "httpProxyConfig[*].trustedCaSecretRef", "kube_admin_config[*]": "status.atProvider.kubeAdminConfig[*]", "kube_admin_config[*].client_certificate": "status.atProvider.kubeAdminConfig[*].clientCertificate", "kube_admin_config[*].client_key": "status.atProvider.kubeAdminConfig[*].clientKey", "kube_admin_config[*].cluster_ca_certificate": "status.atProvider.kubeAdminConfig[*].clusterCaCertificate", "kube_admin_config[*].password": "status.atProvider.kubeAdminConfig[*].password", "kube_admin_config_raw": "status.atProvider.kubeAdminConfigRaw", "kube_config[*]": "status.atProvider.kubeConfig[*]", "kube_config[*].client_certificate": "status.atProvider.kubeConfig[*].clientCertificate", "kube_config[*].client_key": "status.atProvider.kubeConfig[*].clientKey", "kube_config[*].cluster_ca_certificate": "status.atProvider.kubeConfig[*].clusterCaCertificate", "kube_config[*].password": "status.atProvider.kubeConfig[*].password", "kube_config_raw": "status.atProvider.kubeConfigRaw", "service_principal[*].client_secret": "servicePrincipal[*].clientSecretSecretRef", "windows_profile[*].admin_password": "windowsProfile[*].adminPasswordSecretRef"} } // GetObservation of this KubernetesCluster diff --git a/apis/containerservice/v1beta2/zz_kubernetescluster_types.go b/apis/containerservice/v1beta2/zz_kubernetescluster_types.go index a4705bd80..d380e5c3a 100755 --- a/apis/containerservice/v1beta2/zz_kubernetescluster_types.go +++ b/apis/containerservice/v1beta2/zz_kubernetescluster_types.go @@ -382,6 +382,9 @@ type AzureActiveDirectoryRoleBasedAccessControlInitParameters struct { // The Server ID of an Azure Active Directory Application. ServerAppID *string `json:"serverAppId,omitempty" tf:"server_app_id,omitempty"` + // The Server Secret of an Azure Active Directory Application. + ServerAppSecretSecretRef *v1.SecretKeySelector `json:"serverAppSecretSecretRef,omitempty" tf:"-"` + // The Tenant ID used for Azure Active Directory Application. If this isn't specified the Tenant ID of the current Subscription is used. TenantID *string `json:"tenantId,omitempty" tf:"tenant_id,omitempty"` } @@ -960,6 +963,9 @@ type HTTPProxyConfigInitParameters struct { // The list of domains that will not use the proxy for communication. // +listType=set NoProxy []*string `json:"noProxy,omitempty" tf:"no_proxy,omitempty"` + + // The base64 encoded alternative CA certificate content in PEM format. + TrustedCASecretRef *v1.SecretKeySelector `json:"trustedCaSecretRef,omitempty" tf:"-"` } type HTTPProxyConfigObservation struct { @@ -2906,6 +2912,9 @@ type ServicePrincipalInitParameters struct { // The Client ID for the Service Principal. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + + // The Client Secret for the Service Principal. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` } type ServicePrincipalObservation struct { @@ -2921,7 +2930,7 @@ type ServicePrincipalParameters struct { ClientID *string `json:"clientId" tf:"client_id,omitempty"` // The Client Secret for the Service Principal. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` } @@ -3344,6 +3353,9 @@ type WebAppRoutingParameters struct { type WindowsProfileInitParameters struct { + // The Admin Password for Windows VMs. Length must be between 14 and 123 characters. + AdminPasswordSecretRef *v1.SecretKeySelector `json:"adminPasswordSecretRef,omitempty" tf:"-"` + // The Admin Username for Windows VMs. Changing this forces a new resource to be created. AdminUsername *string `json:"adminUsername,omitempty" tf:"admin_username,omitempty"` diff --git a/apis/cosmosdb/v1beta2/zz_cassandracluster_terraformed.go b/apis/cosmosdb/v1beta2/zz_cassandracluster_terraformed.go index 25bf7116b..814a601c1 100755 --- a/apis/cosmosdb/v1beta2/zz_cassandracluster_terraformed.go +++ b/apis/cosmosdb/v1beta2/zz_cassandracluster_terraformed.go @@ -21,7 +21,7 @@ func (mg *CassandraCluster) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this CassandraCluster func (tr *CassandraCluster) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"default_admin_password": "spec.forProvider.defaultAdminPasswordSecretRef"} + return map[string]string{"default_admin_password": "defaultAdminPasswordSecretRef"} } // GetObservation of this CassandraCluster diff --git a/apis/cosmosdb/v1beta2/zz_cassandracluster_types.go b/apis/cosmosdb/v1beta2/zz_cassandracluster_types.go index 099591d65..ae27e702e 100755 --- a/apis/cosmosdb/v1beta2/zz_cassandracluster_types.go +++ b/apis/cosmosdb/v1beta2/zz_cassandracluster_types.go @@ -46,6 +46,9 @@ type CassandraClusterInitParameters struct { // A list of TLS certificates that is used to authorize client connecting to the Cassandra Cluster. ClientCertificatePems []*string `json:"clientCertificatePems,omitempty" tf:"client_certificate_pems,omitempty"` + // The initial admin password for this Cassandra Cluster. Changing this forces a new resource to be created. + DefaultAdminPasswordSecretRef v1.SecretKeySelector `json:"defaultAdminPasswordSecretRef" tf:"-"` + // The ID of the delegated management subnet for this Cassandra Cluster. Changing this forces a new Cassandra Cluster to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/network/v1beta2.Subnet // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID() diff --git a/apis/cosmosdb/v1beta2/zz_generated.deepcopy.go b/apis/cosmosdb/v1beta2/zz_generated.deepcopy.go index ec172f93d..a19c2e29d 100644 --- a/apis/cosmosdb/v1beta2/zz_generated.deepcopy.go +++ b/apis/cosmosdb/v1beta2/zz_generated.deepcopy.go @@ -1214,6 +1214,7 @@ func (in *CassandraClusterInitParameters) DeepCopyInto(out *CassandraClusterInit } } } + out.DefaultAdminPasswordSecretRef = in.DefaultAdminPasswordSecretRef if in.DelegatedManagementSubnetID != nil { in, out := &in.DelegatedManagementSubnetID, &out.DelegatedManagementSubnetID *out = new(string) diff --git a/apis/datafactory/v1beta1/zz_generated.deepcopy.go b/apis/datafactory/v1beta1/zz_generated.deepcopy.go index d3458c68e..5bc81a15a 100644 --- a/apis/datafactory/v1beta1/zz_generated.deepcopy.go +++ b/apis/datafactory/v1beta1/zz_generated.deepcopy.go @@ -14720,6 +14720,7 @@ func (in *LinkedServiceAzureTableStorageInitParameters) DeepCopyInto(out *Linked } } } + out.ConnectionStringSecretRef = in.ConnectionStringSecretRef if in.Description != nil { in, out := &in.Description, &out.Description *out = new(string) @@ -15022,6 +15023,11 @@ func (in *LinkedServiceCosmosDBInitParameters) DeepCopyInto(out *LinkedServiceCo *out = new(string) **out = **in } + if in.AccountKeySecretRef != nil { + in, out := &in.AccountKeySecretRef, &out.AccountKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AdditionalProperties != nil { in, out := &in.AdditionalProperties, &out.AdditionalProperties *out = make(map[string]*string, len(*in)) @@ -15049,6 +15055,11 @@ func (in *LinkedServiceCosmosDBInitParameters) DeepCopyInto(out *LinkedServiceCo } } } + if in.ConnectionStringSecretRef != nil { + in, out := &in.ConnectionStringSecretRef, &out.ConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Database != nil { in, out := &in.Database, &out.Database *out = new(string) @@ -15181,6 +15192,11 @@ func (in *LinkedServiceCosmosDBMongoapiInitParameters) DeepCopyInto(out *LinkedS } } } + if in.ConnectionStringSecretRef != nil { + in, out := &in.ConnectionStringSecretRef, &out.ConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Database != nil { in, out := &in.Database, &out.Database *out = new(string) @@ -16643,6 +16659,11 @@ func (in *LinkedServiceKustoInitParameters) DeepCopyInto(out *LinkedServiceKusto *out = new(string) **out = **in } + if in.ServicePrincipalKeySecretRef != nil { + in, out := &in.ServicePrincipalKeySecretRef, &out.ServicePrincipalKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Tenant != nil { in, out := &in.Tenant, &out.Tenant *out = new(string) @@ -18603,6 +18624,7 @@ func (in *LinkedServiceSFTPInitParameters) DeepCopyInto(out *LinkedServiceSFTPIn (*out)[key] = outVal } } + out.PasswordSecretRef = in.PasswordSecretRef if in.Port != nil { in, out := &in.Port, &out.Port *out = new(float64) @@ -20480,6 +20502,11 @@ func (in *LinkedServiceWebInitParameters) DeepCopyInto(out *LinkedServiceWebInit (*out)[key] = outVal } } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.URL != nil { in, out := &in.URL, &out.URL *out = new(string) diff --git a/apis/datafactory/v1beta1/zz_linkedserviceazuretablestorage_terraformed.go b/apis/datafactory/v1beta1/zz_linkedserviceazuretablestorage_terraformed.go index 6bb655e38..52d2d4696 100755 --- a/apis/datafactory/v1beta1/zz_linkedserviceazuretablestorage_terraformed.go +++ b/apis/datafactory/v1beta1/zz_linkedserviceazuretablestorage_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceAzureTableStorage) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceAzureTableStorage func (tr *LinkedServiceAzureTableStorage) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"connection_string": "spec.forProvider.connectionStringSecretRef"} + return map[string]string{"connection_string": "connectionStringSecretRef"} } // GetObservation of this LinkedServiceAzureTableStorage diff --git a/apis/datafactory/v1beta1/zz_linkedserviceazuretablestorage_types.go b/apis/datafactory/v1beta1/zz_linkedserviceazuretablestorage_types.go index 58ea879e3..38b29ca6d 100755 --- a/apis/datafactory/v1beta1/zz_linkedserviceazuretablestorage_types.go +++ b/apis/datafactory/v1beta1/zz_linkedserviceazuretablestorage_types.go @@ -22,6 +22,9 @@ type LinkedServiceAzureTableStorageInitParameters struct { // List of tags that can be used for describing the Data Factory Linked Service. Annotations []*string `json:"annotations,omitempty" tf:"annotations,omitempty"` + // The connection string to an Azure Storage Account. + ConnectionStringSecretRef v1.SecretKeySelector `json:"connectionStringSecretRef" tf:"-"` + // The description for the Data Factory Linked Service. Description *string `json:"description,omitempty" tf:"description,omitempty"` diff --git a/apis/datafactory/v1beta1/zz_linkedservicecosmosdb_terraformed.go b/apis/datafactory/v1beta1/zz_linkedservicecosmosdb_terraformed.go index d06b8e78c..082329e87 100755 --- a/apis/datafactory/v1beta1/zz_linkedservicecosmosdb_terraformed.go +++ b/apis/datafactory/v1beta1/zz_linkedservicecosmosdb_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceCosmosDB) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceCosmosDB func (tr *LinkedServiceCosmosDB) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"account_key": "spec.forProvider.accountKeySecretRef", "connection_string": "spec.forProvider.connectionStringSecretRef"} + return map[string]string{"account_key": "accountKeySecretRef", "connection_string": "connectionStringSecretRef"} } // GetObservation of this LinkedServiceCosmosDB diff --git a/apis/datafactory/v1beta1/zz_linkedservicecosmosdb_types.go b/apis/datafactory/v1beta1/zz_linkedservicecosmosdb_types.go index ad454ba0c..d1c4aad31 100755 --- a/apis/datafactory/v1beta1/zz_linkedservicecosmosdb_types.go +++ b/apis/datafactory/v1beta1/zz_linkedservicecosmosdb_types.go @@ -18,6 +18,9 @@ type LinkedServiceCosmosDBInitParameters struct { // The endpoint of the Azure CosmosDB account. Required if connection_string is unspecified. AccountEndpoint *string `json:"accountEndpoint,omitempty" tf:"account_endpoint,omitempty"` + // The account key of the Azure Cosmos DB account. Required if connection_string is unspecified. + AccountKeySecretRef *v1.SecretKeySelector `json:"accountKeySecretRef,omitempty" tf:"-"` + // A map of additional properties to associate with the Data Factory Linked Service. // +mapType=granular AdditionalProperties map[string]*string `json:"additionalProperties,omitempty" tf:"additional_properties,omitempty"` @@ -25,6 +28,9 @@ type LinkedServiceCosmosDBInitParameters struct { // List of tags that can be used for describing the Data Factory Linked Service. Annotations []*string `json:"annotations,omitempty" tf:"annotations,omitempty"` + // The connection string. Required if account_endpoint, account_key, and database are unspecified. + ConnectionStringSecretRef *v1.SecretKeySelector `json:"connectionStringSecretRef,omitempty" tf:"-"` + // The name of the database. Required if connection_string is unspecified. Database *string `json:"database,omitempty" tf:"database,omitempty"` diff --git a/apis/datafactory/v1beta1/zz_linkedservicecosmosdbmongoapi_terraformed.go b/apis/datafactory/v1beta1/zz_linkedservicecosmosdbmongoapi_terraformed.go index 45514ccc3..0625f31fe 100755 --- a/apis/datafactory/v1beta1/zz_linkedservicecosmosdbmongoapi_terraformed.go +++ b/apis/datafactory/v1beta1/zz_linkedservicecosmosdbmongoapi_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceCosmosDBMongoapi) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceCosmosDBMongoapi func (tr *LinkedServiceCosmosDBMongoapi) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"connection_string": "spec.forProvider.connectionStringSecretRef"} + return map[string]string{"connection_string": "connectionStringSecretRef"} } // GetObservation of this LinkedServiceCosmosDBMongoapi diff --git a/apis/datafactory/v1beta1/zz_linkedservicecosmosdbmongoapi_types.go b/apis/datafactory/v1beta1/zz_linkedservicecosmosdbmongoapi_types.go index 0da20eaf5..582764598 100755 --- a/apis/datafactory/v1beta1/zz_linkedservicecosmosdbmongoapi_types.go +++ b/apis/datafactory/v1beta1/zz_linkedservicecosmosdbmongoapi_types.go @@ -22,6 +22,9 @@ type LinkedServiceCosmosDBMongoapiInitParameters struct { // List of tags that can be used for describing the Data Factory Linked Service. Annotations []*string `json:"annotations,omitempty" tf:"annotations,omitempty"` + // The connection string. + ConnectionStringSecretRef *v1.SecretKeySelector `json:"connectionStringSecretRef,omitempty" tf:"-"` + // The name of the database. Database *string `json:"database,omitempty" tf:"database,omitempty"` diff --git a/apis/datafactory/v1beta1/zz_linkedservicekusto_terraformed.go b/apis/datafactory/v1beta1/zz_linkedservicekusto_terraformed.go index 7fb09f7b7..99a662d7e 100755 --- a/apis/datafactory/v1beta1/zz_linkedservicekusto_terraformed.go +++ b/apis/datafactory/v1beta1/zz_linkedservicekusto_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceKusto) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceKusto func (tr *LinkedServiceKusto) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"service_principal_key": "spec.forProvider.servicePrincipalKeySecretRef"} + return map[string]string{"service_principal_key": "servicePrincipalKeySecretRef"} } // GetObservation of this LinkedServiceKusto diff --git a/apis/datafactory/v1beta1/zz_linkedservicekusto_types.go b/apis/datafactory/v1beta1/zz_linkedservicekusto_types.go index 39243374f..a8ba96515 100755 --- a/apis/datafactory/v1beta1/zz_linkedservicekusto_types.go +++ b/apis/datafactory/v1beta1/zz_linkedservicekusto_types.go @@ -60,6 +60,9 @@ type LinkedServiceKustoInitParameters struct { // The service principal id in which to authenticate against the Kusto Database. ServicePrincipalID *string `json:"servicePrincipalId,omitempty" tf:"service_principal_id,omitempty"` + // The service principal key in which to authenticate against the Kusto Database. + ServicePrincipalKeySecretRef *v1.SecretKeySelector `json:"servicePrincipalKeySecretRef,omitempty" tf:"-"` + // The service principal tenant id or name in which to authenticate against the Kusto Database. Tenant *string `json:"tenant,omitempty" tf:"tenant,omitempty"` diff --git a/apis/datafactory/v1beta1/zz_linkedservicesftp_terraformed.go b/apis/datafactory/v1beta1/zz_linkedservicesftp_terraformed.go index 480f06696..e5ba71a8f 100755 --- a/apis/datafactory/v1beta1/zz_linkedservicesftp_terraformed.go +++ b/apis/datafactory/v1beta1/zz_linkedservicesftp_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceSFTP) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceSFTP func (tr *LinkedServiceSFTP) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this LinkedServiceSFTP diff --git a/apis/datafactory/v1beta1/zz_linkedservicesftp_types.go b/apis/datafactory/v1beta1/zz_linkedservicesftp_types.go index a537a6998..b2a2cb254 100755 --- a/apis/datafactory/v1beta1/zz_linkedservicesftp_types.go +++ b/apis/datafactory/v1beta1/zz_linkedservicesftp_types.go @@ -41,6 +41,9 @@ type LinkedServiceSFTPInitParameters struct { // +mapType=granular Parameters map[string]*string `json:"parameters,omitempty" tf:"parameters,omitempty"` + // Password to logon to the SFTP Server for Basic Authentication. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The TCP port number that the SFTP server uses to listen for client connection. Default value is 22. Port *float64 `json:"port,omitempty" tf:"port,omitempty"` diff --git a/apis/datafactory/v1beta1/zz_linkedserviceweb_terraformed.go b/apis/datafactory/v1beta1/zz_linkedserviceweb_terraformed.go index bef2acf27..dffe13cc7 100755 --- a/apis/datafactory/v1beta1/zz_linkedserviceweb_terraformed.go +++ b/apis/datafactory/v1beta1/zz_linkedserviceweb_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceWeb) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceWeb func (tr *LinkedServiceWeb) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this LinkedServiceWeb diff --git a/apis/datafactory/v1beta1/zz_linkedserviceweb_types.go b/apis/datafactory/v1beta1/zz_linkedserviceweb_types.go index d8d7c565e..407044461 100755 --- a/apis/datafactory/v1beta1/zz_linkedserviceweb_types.go +++ b/apis/datafactory/v1beta1/zz_linkedserviceweb_types.go @@ -35,6 +35,9 @@ type LinkedServiceWebInitParameters struct { // +mapType=granular Parameters map[string]*string `json:"parameters,omitempty" tf:"parameters,omitempty"` + // The password for Basic authentication. Required if authentication_type sets to Basic. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // The URL of the web service endpoint (e.g. https://www.microsoft.com). URL *string `json:"url,omitempty" tf:"url,omitempty"` diff --git a/apis/datafactory/v1beta2/zz_generated.deepcopy.go b/apis/datafactory/v1beta2/zz_generated.deepcopy.go index 72a83b43f..e5ec69bc0 100644 --- a/apis/datafactory/v1beta2/zz_generated.deepcopy.go +++ b/apis/datafactory/v1beta2/zz_generated.deepcopy.go @@ -286,6 +286,7 @@ func (in *AzureBlobStorageLocationParameters) DeepCopy() *AzureBlobStorageLocati // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *BasicAuthenticationInitParameters) DeepCopyInto(out *BasicAuthenticationInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -352,6 +353,11 @@ func (in *CatalogInfoInitParameters) DeepCopyInto(out *CatalogInfoInitParameters *out = new(string) **out = **in } + if in.AdministratorPasswordSecretRef != nil { + in, out := &in.AdministratorPasswordSecretRef, &out.AdministratorPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DualStandbyPairName != nil { in, out := &in.DualStandbyPairName, &out.DualStandbyPairName *out = new(string) @@ -477,6 +483,11 @@ func (in *CommandKeyInitParameters) DeepCopyInto(out *CommandKeyInitParameters) *out = new(KeyVaultPasswordInitParameters) (*in).DeepCopyInto(*out) } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.TargetName != nil { in, out := &in.TargetName, &out.TargetName *out = new(string) @@ -572,6 +583,11 @@ func (in *ComponentInitParameters) DeepCopyInto(out *ComponentInitParameters) { *out = new(KeyVaultLicenseInitParameters) (*in).DeepCopyInto(*out) } + if in.LicenseSecretRef != nil { + in, out := &in.LicenseSecretRef, &out.LicenseSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Name != nil { in, out := &in.Name, &out.Name *out = new(string) @@ -1110,6 +1126,7 @@ func (in *CustomSetupScriptInitParameters) DeepCopyInto(out *CustomSetupScriptIn *out = new(string) **out = **in } + out.SASTokenSecretRef = in.SASTokenSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CustomSetupScriptInitParameters. @@ -6304,6 +6321,11 @@ func (in *IntegrationRuntimeManagedCatalogInfoInitParameters) DeepCopyInto(out * *out = new(string) **out = **in } + if in.AdministratorPasswordSecretRef != nil { + in, out := &in.AdministratorPasswordSecretRef, &out.AdministratorPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.PricingTier != nil { in, out := &in.PricingTier, &out.PricingTier *out = new(string) @@ -6399,6 +6421,7 @@ func (in *IntegrationRuntimeManagedCustomSetupScriptInitParameters) DeepCopyInto *out = new(string) **out = **in } + out.SASTokenSecretRef = in.SASTokenSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new IntegrationRuntimeManagedCustomSetupScriptInitParameters. @@ -7857,6 +7880,11 @@ func (in *LinkedServiceAzureBlobStorageInitParameters) DeepCopyInto(out *LinkedS *out = new(string) **out = **in } + if in.ConnectionStringSecretRef != nil { + in, out := &in.ConnectionStringSecretRef, &out.ConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Description != nil { in, out := &in.Description, &out.Description *out = new(string) @@ -7888,6 +7916,16 @@ func (in *LinkedServiceAzureBlobStorageInitParameters) DeepCopyInto(out *LinkedS (*out)[key] = outVal } } + if in.SASURISecretRef != nil { + in, out := &in.SASURISecretRef, &out.SASURISecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.ServiceEndpointSecretRef != nil { + in, out := &in.ServiceEndpointSecretRef, &out.ServiceEndpointSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ServicePrincipalID != nil { in, out := &in.ServicePrincipalID, &out.ServicePrincipalID *out = new(string) @@ -8283,6 +8321,11 @@ func (in *LinkedServiceAzureDatabricks) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *LinkedServiceAzureDatabricksInitParameters) DeepCopyInto(out *LinkedServiceAzureDatabricksInitParameters) { *out = *in + if in.AccessTokenSecretRef != nil { + in, out := &in.AccessTokenSecretRef, &out.AccessTokenSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AdbDomain != nil { in, out := &in.AdbDomain, &out.AdbDomain *out = new(string) @@ -8823,6 +8866,7 @@ func (in *LinkedServiceAzureFileStorageInitParameters) DeepCopyInto(out *LinkedS } } } + out.ConnectionStringSecretRef = in.ConnectionStringSecretRef if in.Description != nil { in, out := &in.Description, &out.Description *out = new(string) @@ -8864,6 +8908,11 @@ func (in *LinkedServiceAzureFileStorageInitParameters) DeepCopyInto(out *LinkedS (*out)[key] = outVal } } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.UserID != nil { in, out := &in.UserID, &out.UserID *out = new(string) @@ -9297,6 +9346,11 @@ func (in *LinkedServiceAzureFunctionInitParameters) DeepCopyInto(out *LinkedServ *out = new(string) **out = **in } + if in.KeySecretRef != nil { + in, out := &in.KeySecretRef, &out.KeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.KeyVaultKey != nil { in, out := &in.KeyVaultKey, &out.KeyVaultKey *out = new(KeyVaultKeyInitParameters) @@ -10556,6 +10610,7 @@ func (in *LinkedServiceOdbc) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *LinkedServiceOdbcBasicAuthenticationInitParameters) DeepCopyInto(out *LinkedServiceOdbcBasicAuthenticationInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) diff --git a/apis/datafactory/v1beta2/zz_integrationruntimeazuressis_terraformed.go b/apis/datafactory/v1beta2/zz_integrationruntimeazuressis_terraformed.go index 0deef375e..ae7172411 100755 --- a/apis/datafactory/v1beta2/zz_integrationruntimeazuressis_terraformed.go +++ b/apis/datafactory/v1beta2/zz_integrationruntimeazuressis_terraformed.go @@ -21,7 +21,7 @@ func (mg *IntegrationRuntimeAzureSSIS) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IntegrationRuntimeAzureSSIS func (tr *IntegrationRuntimeAzureSSIS) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"catalog_info[*].administrator_password": "spec.forProvider.catalogInfo[*].administratorPasswordSecretRef", "custom_setup_script[*].sas_token": "spec.forProvider.customSetupScript[*].sasTokenSecretRef", "express_custom_setup[*].command_key[*].password": "spec.forProvider.expressCustomSetup[*].commandKey[*].passwordSecretRef", "express_custom_setup[*].component[*].license": "spec.forProvider.expressCustomSetup[*].component[*].licenseSecretRef"} + return map[string]string{"catalog_info[*].administrator_password": "catalogInfo[*].administratorPasswordSecretRef", "custom_setup_script[*].sas_token": "customSetupScript[*].sasTokenSecretRef", "express_custom_setup[*].command_key[*].password": "expressCustomSetup[*].commandKey[*].passwordSecretRef", "express_custom_setup[*].component[*].license": "expressCustomSetup[*].component[*].licenseSecretRef"} } // GetObservation of this IntegrationRuntimeAzureSSIS diff --git a/apis/datafactory/v1beta2/zz_integrationruntimeazuressis_types.go b/apis/datafactory/v1beta2/zz_integrationruntimeazuressis_types.go index 02a8cfd74..9c7d02ec1 100755 --- a/apis/datafactory/v1beta2/zz_integrationruntimeazuressis_types.go +++ b/apis/datafactory/v1beta2/zz_integrationruntimeazuressis_types.go @@ -18,6 +18,9 @@ type CatalogInfoInitParameters struct { // Administrator login name for the SQL Server. AdministratorLogin *string `json:"administratorLogin,omitempty" tf:"administrator_login,omitempty"` + // Administrator login password for the SQL Server. + AdministratorPasswordSecretRef *v1.SecretKeySelector `json:"administratorPasswordSecretRef,omitempty" tf:"-"` + // The dual standby Azure-SSIS Integration Runtime pair with SSISDB failover. DualStandbyPairName *string `json:"dualStandbyPairName,omitempty" tf:"dual_standby_pair_name,omitempty"` @@ -81,6 +84,9 @@ type CommandKeyInitParameters struct { // A key_vault_secret_reference block as defined below. KeyVaultPassword *KeyVaultPasswordInitParameters `json:"keyVaultPassword,omitempty" tf:"key_vault_password,omitempty"` + // The password for the target device. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // The target computer or domain name. TargetName *string `json:"targetName,omitempty" tf:"target_name,omitempty"` @@ -124,6 +130,9 @@ type ComponentInitParameters struct { // A key_vault_secret_reference block as defined below. KeyVaultLicense *KeyVaultLicenseInitParameters `json:"keyVaultLicense,omitempty" tf:"key_vault_license,omitempty"` + // The license used for the Component. + LicenseSecretRef *v1.SecretKeySelector `json:"licenseSecretRef,omitempty" tf:"-"` + // Name of the package store. Name *string `json:"name,omitempty" tf:"name,omitempty"` } @@ -156,6 +165,9 @@ type CustomSetupScriptInitParameters struct { // The blob endpoint for the container which contains a custom setup script that will be run on every node on startup. See https://docs.microsoft.com/azure/data-factory/how-to-configure-azure-ssis-ir-custom-setup for more information. BlobContainerURI *string `json:"blobContainerUri,omitempty" tf:"blob_container_uri,omitempty"` + + // A container SAS token that gives access to the files. See https://docs.microsoft.com/azure/data-factory/how-to-configure-azure-ssis-ir-custom-setup for more information. + SASTokenSecretRef v1.SecretKeySelector `json:"sasTokenSecretRef" tf:"-"` } type CustomSetupScriptObservation struct { @@ -171,7 +183,7 @@ type CustomSetupScriptParameters struct { BlobContainerURI *string `json:"blobContainerUri" tf:"blob_container_uri,omitempty"` // A container SAS token that gives access to the files. See https://docs.microsoft.com/azure/data-factory/how-to-configure-azure-ssis-ir-custom-setup for more information. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional SASTokenSecretRef v1.SecretKeySelector `json:"sasTokenSecretRef" tf:"-"` } diff --git a/apis/datafactory/v1beta2/zz_integrationruntimemanaged_terraformed.go b/apis/datafactory/v1beta2/zz_integrationruntimemanaged_terraformed.go index 073718ccb..a07e84a2c 100755 --- a/apis/datafactory/v1beta2/zz_integrationruntimemanaged_terraformed.go +++ b/apis/datafactory/v1beta2/zz_integrationruntimemanaged_terraformed.go @@ -21,7 +21,7 @@ func (mg *IntegrationRuntimeManaged) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IntegrationRuntimeManaged func (tr *IntegrationRuntimeManaged) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"catalog_info[*].administrator_password": "spec.forProvider.catalogInfo[*].administratorPasswordSecretRef", "custom_setup_script[*].sas_token": "spec.forProvider.customSetupScript[*].sasTokenSecretRef"} + return map[string]string{"catalog_info[*].administrator_password": "catalogInfo[*].administratorPasswordSecretRef", "custom_setup_script[*].sas_token": "customSetupScript[*].sasTokenSecretRef"} } // GetObservation of this IntegrationRuntimeManaged diff --git a/apis/datafactory/v1beta2/zz_integrationruntimemanaged_types.go b/apis/datafactory/v1beta2/zz_integrationruntimemanaged_types.go index e7495a223..321d83c4f 100755 --- a/apis/datafactory/v1beta2/zz_integrationruntimemanaged_types.go +++ b/apis/datafactory/v1beta2/zz_integrationruntimemanaged_types.go @@ -18,6 +18,9 @@ type IntegrationRuntimeManagedCatalogInfoInitParameters struct { // Administrator login name for the SQL Server. AdministratorLogin *string `json:"administratorLogin,omitempty" tf:"administrator_login,omitempty"` + // Administrator login password for the SQL Server. + AdministratorPasswordSecretRef *v1.SecretKeySelector `json:"administratorPasswordSecretRef,omitempty" tf:"-"` + // Pricing tier for the database that will be created for the SSIS catalog. Valid values are: Basic, Standard, Premium and PremiumRS. Defaults to Basic. PricingTier *string `json:"pricingTier,omitempty" tf:"pricing_tier,omitempty"` @@ -60,6 +63,9 @@ type IntegrationRuntimeManagedCustomSetupScriptInitParameters struct { // The blob endpoint for the container which contains a custom setup script that will be run on every node on startup. See https://docs.microsoft.com/azure/data-factory/how-to-configure-azure-ssis-ir-custom-setup for more information. BlobContainerURI *string `json:"blobContainerUri,omitempty" tf:"blob_container_uri,omitempty"` + + // A container SAS token that gives access to the files. See https://docs.microsoft.com/azure/data-factory/how-to-configure-azure-ssis-ir-custom-setup for more information. + SASTokenSecretRef v1.SecretKeySelector `json:"sasTokenSecretRef" tf:"-"` } type IntegrationRuntimeManagedCustomSetupScriptObservation struct { @@ -75,7 +81,7 @@ type IntegrationRuntimeManagedCustomSetupScriptParameters struct { BlobContainerURI *string `json:"blobContainerUri" tf:"blob_container_uri,omitempty"` // A container SAS token that gives access to the files. See https://docs.microsoft.com/azure/data-factory/how-to-configure-azure-ssis-ir-custom-setup for more information. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional SASTokenSecretRef v1.SecretKeySelector `json:"sasTokenSecretRef" tf:"-"` } diff --git a/apis/datafactory/v1beta2/zz_linkedserviceazureblobstorage_terraformed.go b/apis/datafactory/v1beta2/zz_linkedserviceazureblobstorage_terraformed.go index 5a6cd3985..57c6a32d7 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceazureblobstorage_terraformed.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceazureblobstorage_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceAzureBlobStorage) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceAzureBlobStorage func (tr *LinkedServiceAzureBlobStorage) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"connection_string": "spec.forProvider.connectionStringSecretRef", "sas_uri": "spec.forProvider.sasUriSecretRef", "service_endpoint": "spec.forProvider.serviceEndpointSecretRef"} + return map[string]string{"connection_string": "connectionStringSecretRef", "sas_uri": "sasUriSecretRef", "service_endpoint": "serviceEndpointSecretRef"} } // GetObservation of this LinkedServiceAzureBlobStorage diff --git a/apis/datafactory/v1beta2/zz_linkedserviceazureblobstorage_types.go b/apis/datafactory/v1beta2/zz_linkedserviceazureblobstorage_types.go index 145d9738e..bc0862337 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceazureblobstorage_types.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceazureblobstorage_types.go @@ -72,6 +72,9 @@ type LinkedServiceAzureBlobStorageInitParameters struct { // The connection string sent insecurely. Conflicts with connection_string, sas_uri and service_endpoint. ConnectionStringInsecure *string `json:"connectionStringInsecure,omitempty" tf:"connection_string_insecure,omitempty"` + // The connection string. Conflicts with connection_string_insecure, sas_uri and service_endpoint. + ConnectionStringSecretRef *v1.SecretKeySelector `json:"connectionStringSecretRef,omitempty" tf:"-"` + // The description for the Data Factory Linked Service. Description *string `json:"description,omitempty" tf:"description,omitempty"` @@ -85,6 +88,12 @@ type LinkedServiceAzureBlobStorageInitParameters struct { // +mapType=granular Parameters map[string]*string `json:"parameters,omitempty" tf:"parameters,omitempty"` + // The SAS URI. Conflicts with connection_string_insecure, connection_string and service_endpoint. + SASURISecretRef *v1.SecretKeySelector `json:"sasuriSecretRef,omitempty" tf:"-"` + + // The Service Endpoint. Conflicts with connection_string, connection_string_insecure and sas_uri. + ServiceEndpointSecretRef *v1.SecretKeySelector `json:"serviceEndpointSecretRef,omitempty" tf:"-"` + // The service principal id in which to authenticate against the Azure Blob Storage account. ServicePrincipalID *string `json:"servicePrincipalId,omitempty" tf:"service_principal_id,omitempty"` diff --git a/apis/datafactory/v1beta2/zz_linkedserviceazuredatabricks_terraformed.go b/apis/datafactory/v1beta2/zz_linkedserviceazuredatabricks_terraformed.go index 866d9fdd8..8cf002757 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceazuredatabricks_terraformed.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceazuredatabricks_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceAzureDatabricks) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceAzureDatabricks func (tr *LinkedServiceAzureDatabricks) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"access_token": "spec.forProvider.accessTokenSecretRef"} + return map[string]string{"access_token": "accessTokenSecretRef"} } // GetObservation of this LinkedServiceAzureDatabricks diff --git a/apis/datafactory/v1beta2/zz_linkedserviceazuredatabricks_types.go b/apis/datafactory/v1beta2/zz_linkedserviceazuredatabricks_types.go index e5e712392..b5c9d9a95 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceazuredatabricks_types.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceazuredatabricks_types.go @@ -64,6 +64,9 @@ type InstancePoolParameters struct { type LinkedServiceAzureDatabricksInitParameters struct { + // Authenticate to ADB via an access token. + AccessTokenSecretRef *v1.SecretKeySelector `json:"accessTokenSecretRef,omitempty" tf:"-"` + // The domain URL of the databricks instance. AdbDomain *string `json:"adbDomain,omitempty" tf:"adb_domain,omitempty"` diff --git a/apis/datafactory/v1beta2/zz_linkedserviceazurefilestorage_terraformed.go b/apis/datafactory/v1beta2/zz_linkedserviceazurefilestorage_terraformed.go index 4bc6774ea..af930775a 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceazurefilestorage_terraformed.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceazurefilestorage_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceAzureFileStorage) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceAzureFileStorage func (tr *LinkedServiceAzureFileStorage) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"connection_string": "spec.forProvider.connectionStringSecretRef", "password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"connection_string": "connectionStringSecretRef", "password": "passwordSecretRef"} } // GetObservation of this LinkedServiceAzureFileStorage diff --git a/apis/datafactory/v1beta2/zz_linkedserviceazurefilestorage_types.go b/apis/datafactory/v1beta2/zz_linkedserviceazurefilestorage_types.go index c2525d3f5..59c1bd7bc 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceazurefilestorage_types.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceazurefilestorage_types.go @@ -22,6 +22,9 @@ type LinkedServiceAzureFileStorageInitParameters struct { // List of tags that can be used for describing the Data Factory Linked Service. Annotations []*string `json:"annotations,omitempty" tf:"annotations,omitempty"` + // The connection string. + ConnectionStringSecretRef v1.SecretKeySelector `json:"connectionStringSecretRef" tf:"-"` + // The description for the Data Factory Linked Service. Description *string `json:"description,omitempty" tf:"description,omitempty"` @@ -41,6 +44,9 @@ type LinkedServiceAzureFileStorageInitParameters struct { // +mapType=granular Parameters map[string]*string `json:"parameters,omitempty" tf:"parameters,omitempty"` + // The password to log in the server. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // The user ID to log in the server. UserID *string `json:"userId,omitempty" tf:"user_id,omitempty"` } diff --git a/apis/datafactory/v1beta2/zz_linkedserviceazurefunction_terraformed.go b/apis/datafactory/v1beta2/zz_linkedserviceazurefunction_terraformed.go index 68e8ec2b4..8f3e97086 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceazurefunction_terraformed.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceazurefunction_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceAzureFunction) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceAzureFunction func (tr *LinkedServiceAzureFunction) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"key": "spec.forProvider.keySecretRef"} + return map[string]string{"key": "keySecretRef"} } // GetObservation of this LinkedServiceAzureFunction diff --git a/apis/datafactory/v1beta2/zz_linkedserviceazurefunction_types.go b/apis/datafactory/v1beta2/zz_linkedserviceazurefunction_types.go index 8e96c93d3..9a1e1b395 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceazurefunction_types.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceazurefunction_types.go @@ -57,6 +57,9 @@ type LinkedServiceAzureFunctionInitParameters struct { // The integration runtime reference to associate with the Data Factory Linked Service. IntegrationRuntimeName *string `json:"integrationRuntimeName,omitempty" tf:"integration_runtime_name,omitempty"` + // The system key of the Azure Function. Exactly one of either key or key_vault_key is required + KeySecretRef *v1.SecretKeySelector `json:"keySecretRef,omitempty" tf:"-"` + // A key_vault_key block as defined below. Use this Argument to store the system key of the Azure Function in an existing Key Vault. It needs an existing Key Vault Data Factory Linked Service. Exactly one of either key or key_vault_key is required. KeyVaultKey *KeyVaultKeyInitParameters `json:"keyVaultKey,omitempty" tf:"key_vault_key,omitempty"` diff --git a/apis/datafactory/v1beta2/zz_linkedserviceodata_terraformed.go b/apis/datafactory/v1beta2/zz_linkedserviceodata_terraformed.go index c54d9696a..a23296200 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceodata_terraformed.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceodata_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceOData) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceOData func (tr *LinkedServiceOData) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"basic_authentication[*].password": "spec.forProvider.basicAuthentication[*].passwordSecretRef"} + return map[string]string{"basic_authentication[*].password": "basicAuthentication[*].passwordSecretRef"} } // GetObservation of this LinkedServiceOData diff --git a/apis/datafactory/v1beta2/zz_linkedserviceodata_types.go b/apis/datafactory/v1beta2/zz_linkedserviceodata_types.go index ca7c2a5b9..fce32385f 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceodata_types.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceodata_types.go @@ -15,6 +15,9 @@ import ( type BasicAuthenticationInitParameters struct { + // The password associated with the username, which can be used to authenticate to the OData endpoint. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username which can be used to authenticate to the OData endpoint. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -28,7 +31,7 @@ type BasicAuthenticationObservation struct { type BasicAuthenticationParameters struct { // The password associated with the username, which can be used to authenticate to the OData endpoint. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username which can be used to authenticate to the OData endpoint. diff --git a/apis/datafactory/v1beta2/zz_linkedserviceodbc_terraformed.go b/apis/datafactory/v1beta2/zz_linkedserviceodbc_terraformed.go index 973f926c6..d2db524da 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceodbc_terraformed.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceodbc_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinkedServiceOdbc) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinkedServiceOdbc func (tr *LinkedServiceOdbc) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"basic_authentication[*].password": "spec.forProvider.basicAuthentication[*].passwordSecretRef"} + return map[string]string{"basic_authentication[*].password": "basicAuthentication[*].passwordSecretRef"} } // GetObservation of this LinkedServiceOdbc diff --git a/apis/datafactory/v1beta2/zz_linkedserviceodbc_types.go b/apis/datafactory/v1beta2/zz_linkedserviceodbc_types.go index f430eaefe..1d27576fc 100755 --- a/apis/datafactory/v1beta2/zz_linkedserviceodbc_types.go +++ b/apis/datafactory/v1beta2/zz_linkedserviceodbc_types.go @@ -15,6 +15,9 @@ import ( type LinkedServiceOdbcBasicAuthenticationInitParameters struct { + // The password associated with the username, which can be used to authenticate to the ODBC endpoint. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username which can be used to authenticate to the ODBC endpoint. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -28,7 +31,7 @@ type LinkedServiceOdbcBasicAuthenticationObservation struct { type LinkedServiceOdbcBasicAuthenticationParameters struct { // The password associated with the username, which can be used to authenticate to the ODBC endpoint. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username which can be used to authenticate to the ODBC endpoint. diff --git a/apis/dbformariadb/v1beta1/zz_generated.deepcopy.go b/apis/dbformariadb/v1beta1/zz_generated.deepcopy.go index 43b7cd669..f2d2ac78d 100644 --- a/apis/dbformariadb/v1beta1/zz_generated.deepcopy.go +++ b/apis/dbformariadb/v1beta1/zz_generated.deepcopy.go @@ -720,6 +720,11 @@ func (in *ServerInitParameters) DeepCopyInto(out *ServerInitParameters) { *out = new(string) **out = **in } + if in.AdministratorLoginPasswordSecretRef != nil { + in, out := &in.AdministratorLoginPasswordSecretRef, &out.AdministratorLoginPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AutoGrowEnabled != nil { in, out := &in.AutoGrowEnabled, &out.AutoGrowEnabled *out = new(bool) diff --git a/apis/dbformariadb/v1beta1/zz_server_terraformed.go b/apis/dbformariadb/v1beta1/zz_server_terraformed.go index e47cee7de..d509a8123 100755 --- a/apis/dbformariadb/v1beta1/zz_server_terraformed.go +++ b/apis/dbformariadb/v1beta1/zz_server_terraformed.go @@ -21,7 +21,7 @@ func (mg *Server) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Server func (tr *Server) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"administrator_login_password": "spec.forProvider.administratorLoginPasswordSecretRef"} + return map[string]string{"administrator_login_password": "administratorLoginPasswordSecretRef"} } // GetObservation of this Server diff --git a/apis/dbformariadb/v1beta1/zz_server_types.go b/apis/dbformariadb/v1beta1/zz_server_types.go index 8cb9a6dfd..81bec2ed9 100755 --- a/apis/dbformariadb/v1beta1/zz_server_types.go +++ b/apis/dbformariadb/v1beta1/zz_server_types.go @@ -18,6 +18,9 @@ type ServerInitParameters struct { // The Administrator login for the MariaDB Server. Changing this forces a new resource to be created. AdministratorLogin *string `json:"administratorLogin,omitempty" tf:"administrator_login,omitempty"` + // The Password associated with the administrator_login for the MariaDB Server. + AdministratorLoginPasswordSecretRef *v1.SecretKeySelector `json:"administratorLoginPasswordSecretRef,omitempty" tf:"-"` + // Enable/Disable auto-growing of the storage. Storage auto-grow prevents your server from running out of storage and becoming read-only. If storage auto grow is enabled, the storage automatically grows without impacting the workload. The default value if not explicitly specified is true. Defaults to true. AutoGrowEnabled *bool `json:"autoGrowEnabled,omitempty" tf:"auto_grow_enabled,omitempty"` diff --git a/apis/dbformysql/v1beta2/zz_flexibleserver_terraformed.go b/apis/dbformysql/v1beta2/zz_flexibleserver_terraformed.go index 318bcb318..f2a8c4c07 100755 --- a/apis/dbformysql/v1beta2/zz_flexibleserver_terraformed.go +++ b/apis/dbformysql/v1beta2/zz_flexibleserver_terraformed.go @@ -21,7 +21,7 @@ func (mg *FlexibleServer) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this FlexibleServer func (tr *FlexibleServer) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"administrator_password": "spec.forProvider.administratorPasswordSecretRef"} + return map[string]string{"administrator_password": "administratorPasswordSecretRef"} } // GetObservation of this FlexibleServer diff --git a/apis/dbformysql/v1beta2/zz_flexibleserver_types.go b/apis/dbformysql/v1beta2/zz_flexibleserver_types.go index 97d47395e..24dece930 100755 --- a/apis/dbformysql/v1beta2/zz_flexibleserver_types.go +++ b/apis/dbformysql/v1beta2/zz_flexibleserver_types.go @@ -67,6 +67,9 @@ type FlexibleServerInitParameters struct { // The Administrator login for the MySQL Flexible Server. Required when create_mode is Default. Changing this forces a new MySQL Flexible Server to be created. AdministratorLogin *string `json:"administratorLogin,omitempty" tf:"administrator_login,omitempty"` + // The Password associated with the administrator_login for the MySQL Flexible Server. Required when create_mode is Default. + AdministratorPasswordSecretRef *v1.SecretKeySelector `json:"administratorPasswordSecretRef,omitempty" tf:"-"` + // The backup retention days for the MySQL Flexible Server. Possible values are between 1 and 35 days. Defaults to 7. BackupRetentionDays *float64 `json:"backupRetentionDays,omitempty" tf:"backup_retention_days,omitempty"` diff --git a/apis/dbformysql/v1beta2/zz_generated.deepcopy.go b/apis/dbformysql/v1beta2/zz_generated.deepcopy.go index f24fc6534..b7c370f14 100644 --- a/apis/dbformysql/v1beta2/zz_generated.deepcopy.go +++ b/apis/dbformysql/v1beta2/zz_generated.deepcopy.go @@ -153,6 +153,11 @@ func (in *FlexibleServerInitParameters) DeepCopyInto(out *FlexibleServerInitPara *out = new(string) **out = **in } + if in.AdministratorPasswordSecretRef != nil { + in, out := &in.AdministratorPasswordSecretRef, &out.AdministratorPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.BackupRetentionDays != nil { in, out := &in.BackupRetentionDays, &out.BackupRetentionDays *out = new(float64) @@ -1023,6 +1028,11 @@ func (in *ServerInitParameters) DeepCopyInto(out *ServerInitParameters) { *out = new(string) **out = **in } + if in.AdministratorLoginPasswordSecretRef != nil { + in, out := &in.AdministratorLoginPasswordSecretRef, &out.AdministratorLoginPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AutoGrowEnabled != nil { in, out := &in.AutoGrowEnabled, &out.AutoGrowEnabled *out = new(bool) @@ -1610,6 +1620,11 @@ func (in *ThreatDetectionPolicyInitParameters) DeepCopyInto(out *ThreatDetection *out = new(float64) **out = **in } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageEndpoint != nil { in, out := &in.StorageEndpoint, &out.StorageEndpoint *out = new(string) diff --git a/apis/dbformysql/v1beta2/zz_server_terraformed.go b/apis/dbformysql/v1beta2/zz_server_terraformed.go index 9dec365f7..928cd13e5 100755 --- a/apis/dbformysql/v1beta2/zz_server_terraformed.go +++ b/apis/dbformysql/v1beta2/zz_server_terraformed.go @@ -21,7 +21,7 @@ func (mg *Server) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Server func (tr *Server) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"administrator_login_password": "spec.forProvider.administratorLoginPasswordSecretRef", "threat_detection_policy[*].storage_account_access_key": "spec.forProvider.threatDetectionPolicy[*].storageAccountAccessKeySecretRef"} + return map[string]string{"administrator_login_password": "administratorLoginPasswordSecretRef", "threat_detection_policy[*].storage_account_access_key": "threatDetectionPolicy[*].storageAccountAccessKeySecretRef"} } // GetObservation of this Server diff --git a/apis/dbformysql/v1beta2/zz_server_types.go b/apis/dbformysql/v1beta2/zz_server_types.go index 2fc52a42a..910072dd2 100755 --- a/apis/dbformysql/v1beta2/zz_server_types.go +++ b/apis/dbformysql/v1beta2/zz_server_types.go @@ -43,6 +43,9 @@ type ServerInitParameters struct { // The Administrator login for the MySQL Server. Required when create_mode is Default. Changing this forces a new resource to be created. AdministratorLogin *string `json:"administratorLogin,omitempty" tf:"administrator_login,omitempty"` + // The Password associated with the administrator_login for the MySQL Server. Required when create_mode is Default. + AdministratorLoginPasswordSecretRef *v1.SecretKeySelector `json:"administratorLoginPasswordSecretRef,omitempty" tf:"-"` + // Enable/Disable auto-growing of the storage. Storage auto-grow prevents your server from running out of storage and becoming read-only. If storage auto grow is enabled, the storage automatically grows without impacting the workload. Defaults to true. AutoGrowEnabled *bool `json:"autoGrowEnabled,omitempty" tf:"auto_grow_enabled,omitempty"` @@ -275,6 +278,9 @@ type ThreatDetectionPolicyInitParameters struct { // Specifies the number of days to keep in the Threat Detection audit logs. RetentionDays *float64 `json:"retentionDays,omitempty" tf:"retention_days,omitempty"` + // Specifies the identifier key of the Threat Detection audit storage account. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. StorageEndpoint *string `json:"storageEndpoint,omitempty" tf:"storage_endpoint,omitempty"` } diff --git a/apis/dbforpostgresql/v1beta2/zz_flexibleserver_terraformed.go b/apis/dbforpostgresql/v1beta2/zz_flexibleserver_terraformed.go index 28e294c7c..3fa167a58 100755 --- a/apis/dbforpostgresql/v1beta2/zz_flexibleserver_terraformed.go +++ b/apis/dbforpostgresql/v1beta2/zz_flexibleserver_terraformed.go @@ -21,7 +21,7 @@ func (mg *FlexibleServer) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this FlexibleServer func (tr *FlexibleServer) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"administrator_password": "spec.forProvider.administratorPasswordSecretRef"} + return map[string]string{"administrator_password": "administratorPasswordSecretRef"} } // GetObservation of this FlexibleServer diff --git a/apis/dbforpostgresql/v1beta2/zz_flexibleserver_types.go b/apis/dbforpostgresql/v1beta2/zz_flexibleserver_types.go index fb04787f5..fac12ecd3 100755 --- a/apis/dbforpostgresql/v1beta2/zz_flexibleserver_types.go +++ b/apis/dbforpostgresql/v1beta2/zz_flexibleserver_types.go @@ -106,6 +106,10 @@ type FlexibleServerInitParameters struct { // The Administrator login for the PostgreSQL Flexible Server. Required when create_mode is Default and authentication.password_auth_enabled is true. AdministratorLogin *string `json:"administratorLogin,omitempty" tf:"administrator_login,omitempty"` + // The Password associated with the administrator_login for the PostgreSQL Flexible Server. Required when create_mode is Default and authentication.password_auth_enabled is true. + // Password for the master DB user. If you set autoGeneratePassword to true, the Secret referenced here will be created or updated with generated password if it does not already contain one. + AdministratorPasswordSecretRef *v1.SecretKeySelector `json:"administratorPasswordSecretRef,omitempty" tf:"-"` + // An authentication block as defined below. Authentication *AuthenticationInitParameters `json:"authentication,omitempty" tf:"authentication,omitempty"` diff --git a/apis/dbforpostgresql/v1beta2/zz_generated.deepcopy.go b/apis/dbforpostgresql/v1beta2/zz_generated.deepcopy.go index 441feeae3..83091ac93 100644 --- a/apis/dbforpostgresql/v1beta2/zz_generated.deepcopy.go +++ b/apis/dbforpostgresql/v1beta2/zz_generated.deepcopy.go @@ -243,6 +243,11 @@ func (in *FlexibleServerInitParameters) DeepCopyInto(out *FlexibleServerInitPara *out = new(string) **out = **in } + if in.AdministratorPasswordSecretRef != nil { + in, out := &in.AdministratorPasswordSecretRef, &out.AdministratorPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Authentication != nil { in, out := &in.Authentication, &out.Authentication *out = new(AuthenticationInitParameters) @@ -1158,6 +1163,11 @@ func (in *ServerInitParameters) DeepCopyInto(out *ServerInitParameters) { *out = new(string) **out = **in } + if in.AdministratorLoginPasswordSecretRef != nil { + in, out := &in.AdministratorLoginPasswordSecretRef, &out.AdministratorLoginPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AutoGrowEnabled != nil { in, out := &in.AutoGrowEnabled, &out.AutoGrowEnabled *out = new(bool) @@ -1640,6 +1650,11 @@ func (in *ThreatDetectionPolicyInitParameters) DeepCopyInto(out *ThreatDetection *out = new(float64) **out = **in } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageEndpoint != nil { in, out := &in.StorageEndpoint, &out.StorageEndpoint *out = new(string) diff --git a/apis/dbforpostgresql/v1beta2/zz_server_terraformed.go b/apis/dbforpostgresql/v1beta2/zz_server_terraformed.go index 0cce611f2..c4a43931e 100755 --- a/apis/dbforpostgresql/v1beta2/zz_server_terraformed.go +++ b/apis/dbforpostgresql/v1beta2/zz_server_terraformed.go @@ -21,7 +21,7 @@ func (mg *Server) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Server func (tr *Server) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"administrator_login_password": "spec.forProvider.administratorLoginPasswordSecretRef", "threat_detection_policy[*].storage_account_access_key": "spec.forProvider.threatDetectionPolicy[*].storageAccountAccessKeySecretRef"} + return map[string]string{"administrator_login_password": "administratorLoginPasswordSecretRef", "threat_detection_policy[*].storage_account_access_key": "threatDetectionPolicy[*].storageAccountAccessKeySecretRef"} } // GetObservation of this Server diff --git a/apis/dbforpostgresql/v1beta2/zz_server_types.go b/apis/dbforpostgresql/v1beta2/zz_server_types.go index 1f5e4085f..493c6f7f9 100755 --- a/apis/dbforpostgresql/v1beta2/zz_server_types.go +++ b/apis/dbforpostgresql/v1beta2/zz_server_types.go @@ -43,6 +43,9 @@ type ServerInitParameters struct { // The Administrator login for the PostgreSQL Server. Required when create_mode is Default. Changing this forces a new resource to be created. AdministratorLogin *string `json:"administratorLogin,omitempty" tf:"administrator_login,omitempty"` + // The Password associated with the administrator_login for the PostgreSQL Server. Required when create_mode is Default. + AdministratorLoginPasswordSecretRef *v1.SecretKeySelector `json:"administratorLoginPasswordSecretRef,omitempty" tf:"-"` + // Enable/Disable auto-growing of the storage. Storage auto-grow prevents your server from running out of storage and becoming read-only. If storage auto grow is enabled, the storage automatically grows without impacting the workload. Defaults to true. AutoGrowEnabled *bool `json:"autoGrowEnabled,omitempty" tf:"auto_grow_enabled,omitempty"` @@ -275,6 +278,9 @@ type ThreatDetectionPolicyInitParameters struct { // Specifies the number of days to keep in the Threat Detection audit logs. RetentionDays *float64 `json:"retentionDays,omitempty" tf:"retention_days,omitempty"` + // Specifies the identifier key of the Threat Detection audit storage account. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. StorageEndpoint *string `json:"storageEndpoint,omitempty" tf:"storage_endpoint,omitempty"` } diff --git a/apis/devices/v1beta1/zz_generated.deepcopy.go b/apis/devices/v1beta1/zz_generated.deepcopy.go index e5c1b22b5..43fd29c63 100644 --- a/apis/devices/v1beta1/zz_generated.deepcopy.go +++ b/apis/devices/v1beta1/zz_generated.deepcopy.go @@ -664,6 +664,7 @@ func (in *IOTHubCertificate) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *IOTHubCertificateInitParameters) DeepCopyInto(out *IOTHubCertificateInitParameters) { *out = *in + out.CertificateContentSecretRef = in.CertificateContentSecretRef if in.IsVerified != nil { in, out := &in.IsVerified, &out.IsVerified *out = new(bool) @@ -1085,6 +1086,7 @@ func (in *IOTHubDPSCertificate) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *IOTHubDPSCertificateInitParameters) DeepCopyInto(out *IOTHubDPSCertificateInitParameters) { *out = *in + out.CertificateContentSecretRef = in.CertificateContentSecretRef if in.IOTDPSName != nil { in, out := &in.IOTDPSName, &out.IOTDPSName *out = new(string) @@ -1962,6 +1964,11 @@ func (in *IOTHubEndpointEventHubInitParameters) DeepCopyInto(out *IOTHubEndpoint *out = new(string) **out = **in } + if in.ConnectionStringSecretRef != nil { + in, out := &in.ConnectionStringSecretRef, &out.ConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.EndpointURI != nil { in, out := &in.EndpointURI, &out.EndpointURI *out = new(string) @@ -2226,6 +2233,11 @@ func (in *IOTHubEndpointServiceBusQueueInitParameters) DeepCopyInto(out *IOTHubE *out = new(string) **out = **in } + if in.ConnectionStringSecretRef != nil { + in, out := &in.ConnectionStringSecretRef, &out.ConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.EndpointURI != nil { in, out := &in.EndpointURI, &out.EndpointURI *out = new(string) @@ -2490,6 +2502,11 @@ func (in *IOTHubEndpointServiceBusTopicInitParameters) DeepCopyInto(out *IOTHubE *out = new(string) **out = **in } + if in.ConnectionStringSecretRef != nil { + in, out := &in.ConnectionStringSecretRef, &out.ConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.EndpointURI != nil { in, out := &in.EndpointURI, &out.EndpointURI *out = new(string) @@ -2759,6 +2776,11 @@ func (in *IOTHubEndpointStorageContainerInitParameters) DeepCopyInto(out *IOTHub *out = new(float64) **out = **in } + if in.ConnectionStringSecretRef != nil { + in, out := &in.ConnectionStringSecretRef, &out.ConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ContainerName != nil { in, out := &in.ContainerName, &out.ContainerName *out = new(string) diff --git a/apis/devices/v1beta1/zz_iothubcertificate_terraformed.go b/apis/devices/v1beta1/zz_iothubcertificate_terraformed.go index 983032382..5d2da4380 100755 --- a/apis/devices/v1beta1/zz_iothubcertificate_terraformed.go +++ b/apis/devices/v1beta1/zz_iothubcertificate_terraformed.go @@ -21,7 +21,7 @@ func (mg *IOTHubCertificate) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IOTHubCertificate func (tr *IOTHubCertificate) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"certificate_content": "spec.forProvider.certificateContentSecretRef"} + return map[string]string{"certificate_content": "certificateContentSecretRef"} } // GetObservation of this IOTHubCertificate diff --git a/apis/devices/v1beta1/zz_iothubcertificate_types.go b/apis/devices/v1beta1/zz_iothubcertificate_types.go index fc77a6eaa..ee6eb9e7c 100755 --- a/apis/devices/v1beta1/zz_iothubcertificate_types.go +++ b/apis/devices/v1beta1/zz_iothubcertificate_types.go @@ -15,6 +15,9 @@ import ( type IOTHubCertificateInitParameters struct { + // The Base-64 representation of the X509 leaf certificate .cer file or just a .pem file content. + CertificateContentSecretRef v1.SecretKeySelector `json:"certificateContentSecretRef" tf:"-"` + // Is the certificate verified? Defaults to false. IsVerified *bool `json:"isVerified,omitempty" tf:"is_verified,omitempty"` } diff --git a/apis/devices/v1beta1/zz_iothubdpscertificate_terraformed.go b/apis/devices/v1beta1/zz_iothubdpscertificate_terraformed.go index ff0e15682..b73647331 100755 --- a/apis/devices/v1beta1/zz_iothubdpscertificate_terraformed.go +++ b/apis/devices/v1beta1/zz_iothubdpscertificate_terraformed.go @@ -21,7 +21,7 @@ func (mg *IOTHubDPSCertificate) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IOTHubDPSCertificate func (tr *IOTHubDPSCertificate) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"certificate_content": "spec.forProvider.certificateContentSecretRef"} + return map[string]string{"certificate_content": "certificateContentSecretRef"} } // GetObservation of this IOTHubDPSCertificate diff --git a/apis/devices/v1beta1/zz_iothubdpscertificate_types.go b/apis/devices/v1beta1/zz_iothubdpscertificate_types.go index c2133b5c8..882620db0 100755 --- a/apis/devices/v1beta1/zz_iothubdpscertificate_types.go +++ b/apis/devices/v1beta1/zz_iothubdpscertificate_types.go @@ -15,6 +15,9 @@ import ( type IOTHubDPSCertificateInitParameters struct { + // The Base-64 representation of the X509 leaf certificate .cer file or just a .pem file content. + CertificateContentSecretRef v1.SecretKeySelector `json:"certificateContentSecretRef" tf:"-"` + // The name of the IoT Device Provisioning Service that this certificate will be attached to. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/devices/v1beta2.IOTHubDPS IOTDPSName *string `json:"iotDpsName,omitempty" tf:"iot_dps_name,omitempty"` diff --git a/apis/devices/v1beta1/zz_iothubendpointeventhub_terraformed.go b/apis/devices/v1beta1/zz_iothubendpointeventhub_terraformed.go index 592ada51f..7ecf43982 100755 --- a/apis/devices/v1beta1/zz_iothubendpointeventhub_terraformed.go +++ b/apis/devices/v1beta1/zz_iothubendpointeventhub_terraformed.go @@ -21,7 +21,7 @@ func (mg *IOTHubEndpointEventHub) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IOTHubEndpointEventHub func (tr *IOTHubEndpointEventHub) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"connection_string": "spec.forProvider.connectionStringSecretRef"} + return map[string]string{"connection_string": "connectionStringSecretRef"} } // GetObservation of this IOTHubEndpointEventHub diff --git a/apis/devices/v1beta1/zz_iothubendpointeventhub_types.go b/apis/devices/v1beta1/zz_iothubendpointeventhub_types.go index 6fc94da87..76e2578ae 100755 --- a/apis/devices/v1beta1/zz_iothubendpointeventhub_types.go +++ b/apis/devices/v1beta1/zz_iothubendpointeventhub_types.go @@ -18,6 +18,9 @@ type IOTHubEndpointEventHubInitParameters struct { // Type used to authenticate against the Event Hub endpoint. Possible values are keyBased and identityBased. Defaults to keyBased. AuthenticationType *string `json:"authenticationType,omitempty" tf:"authentication_type,omitempty"` + // The connection string for the endpoint. This attribute can only be specified and is mandatory when authentication_type is keyBased. + ConnectionStringSecretRef *v1.SecretKeySelector `json:"connectionStringSecretRef,omitempty" tf:"-"` + // URI of the Event Hubs Namespace endpoint. This attribute can only be specified and is mandatory when authentication_type is identityBased. EndpointURI *string `json:"endpointUri,omitempty" tf:"endpoint_uri,omitempty"` diff --git a/apis/devices/v1beta1/zz_iothubendpointservicebusqueue_terraformed.go b/apis/devices/v1beta1/zz_iothubendpointservicebusqueue_terraformed.go index 642f3e17d..107051071 100755 --- a/apis/devices/v1beta1/zz_iothubendpointservicebusqueue_terraformed.go +++ b/apis/devices/v1beta1/zz_iothubendpointservicebusqueue_terraformed.go @@ -21,7 +21,7 @@ func (mg *IOTHubEndpointServiceBusQueue) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IOTHubEndpointServiceBusQueue func (tr *IOTHubEndpointServiceBusQueue) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"connection_string": "spec.forProvider.connectionStringSecretRef"} + return map[string]string{"connection_string": "connectionStringSecretRef"} } // GetObservation of this IOTHubEndpointServiceBusQueue diff --git a/apis/devices/v1beta1/zz_iothubendpointservicebusqueue_types.go b/apis/devices/v1beta1/zz_iothubendpointservicebusqueue_types.go index ec1ca0e27..2f5016112 100755 --- a/apis/devices/v1beta1/zz_iothubendpointservicebusqueue_types.go +++ b/apis/devices/v1beta1/zz_iothubendpointservicebusqueue_types.go @@ -18,6 +18,9 @@ type IOTHubEndpointServiceBusQueueInitParameters struct { // Type used to authenticate against the Service Bus Queue endpoint. Possible values are keyBased and identityBased. Defaults to keyBased. AuthenticationType *string `json:"authenticationType,omitempty" tf:"authentication_type,omitempty"` + // The connection string for the endpoint. This attribute can only be specified and is mandatory when authentication_type is keyBased. + ConnectionStringSecretRef *v1.SecretKeySelector `json:"connectionStringSecretRef,omitempty" tf:"-"` + // URI of the Service Bus endpoint. This attribute can only be specified and is mandatory when authentication_type is identityBased. EndpointURI *string `json:"endpointUri,omitempty" tf:"endpoint_uri,omitempty"` diff --git a/apis/devices/v1beta1/zz_iothubendpointservicebustopic_terraformed.go b/apis/devices/v1beta1/zz_iothubendpointservicebustopic_terraformed.go index 1cf91c717..2f309357e 100755 --- a/apis/devices/v1beta1/zz_iothubendpointservicebustopic_terraformed.go +++ b/apis/devices/v1beta1/zz_iothubendpointservicebustopic_terraformed.go @@ -21,7 +21,7 @@ func (mg *IOTHubEndpointServiceBusTopic) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IOTHubEndpointServiceBusTopic func (tr *IOTHubEndpointServiceBusTopic) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"connection_string": "spec.forProvider.connectionStringSecretRef"} + return map[string]string{"connection_string": "connectionStringSecretRef"} } // GetObservation of this IOTHubEndpointServiceBusTopic diff --git a/apis/devices/v1beta1/zz_iothubendpointservicebustopic_types.go b/apis/devices/v1beta1/zz_iothubendpointservicebustopic_types.go index 7610577a2..4a625b20c 100755 --- a/apis/devices/v1beta1/zz_iothubendpointservicebustopic_types.go +++ b/apis/devices/v1beta1/zz_iothubendpointservicebustopic_types.go @@ -18,6 +18,9 @@ type IOTHubEndpointServiceBusTopicInitParameters struct { // Type used to authenticate against the Service Bus Topic endpoint. Possible values are keyBased and identityBased. Defaults to keyBased. AuthenticationType *string `json:"authenticationType,omitempty" tf:"authentication_type,omitempty"` + // The connection string for the endpoint. This attribute can only be specified and is mandatory when authentication_type is keyBased. + ConnectionStringSecretRef *v1.SecretKeySelector `json:"connectionStringSecretRef,omitempty" tf:"-"` + // URI of the Service Bus endpoint. This attribute can only be specified and is mandatory when authentication_type is identityBased. EndpointURI *string `json:"endpointUri,omitempty" tf:"endpoint_uri,omitempty"` diff --git a/apis/devices/v1beta1/zz_iothubendpointstoragecontainer_terraformed.go b/apis/devices/v1beta1/zz_iothubendpointstoragecontainer_terraformed.go index 247f49f47..6f1de3d7b 100755 --- a/apis/devices/v1beta1/zz_iothubendpointstoragecontainer_terraformed.go +++ b/apis/devices/v1beta1/zz_iothubendpointstoragecontainer_terraformed.go @@ -21,7 +21,7 @@ func (mg *IOTHubEndpointStorageContainer) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IOTHubEndpointStorageContainer func (tr *IOTHubEndpointStorageContainer) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"connection_string": "spec.forProvider.connectionStringSecretRef"} + return map[string]string{"connection_string": "connectionStringSecretRef"} } // GetObservation of this IOTHubEndpointStorageContainer diff --git a/apis/devices/v1beta1/zz_iothubendpointstoragecontainer_types.go b/apis/devices/v1beta1/zz_iothubendpointstoragecontainer_types.go index 74e45363c..6feb7ef30 100755 --- a/apis/devices/v1beta1/zz_iothubendpointstoragecontainer_types.go +++ b/apis/devices/v1beta1/zz_iothubendpointstoragecontainer_types.go @@ -21,6 +21,9 @@ type IOTHubEndpointStorageContainerInitParameters struct { // Time interval at which blobs are written to storage. Value should be between 60 and 720 seconds. Default value is 300 seconds. BatchFrequencyInSeconds *float64 `json:"batchFrequencyInSeconds,omitempty" tf:"batch_frequency_in_seconds,omitempty"` + // The connection string for the endpoint. This attribute can only be specified and is mandatory when authentication_type is keyBased. + ConnectionStringSecretRef *v1.SecretKeySelector `json:"connectionStringSecretRef,omitempty" tf:"-"` + // The name of storage container in the storage account. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta1.Container ContainerName *string `json:"containerName,omitempty" tf:"container_name,omitempty"` diff --git a/apis/devices/v1beta2/zz_generated.deepcopy.go b/apis/devices/v1beta2/zz_generated.deepcopy.go index c1309093e..0408c78b3 100644 --- a/apis/devices/v1beta2/zz_generated.deepcopy.go +++ b/apis/devices/v1beta2/zz_generated.deepcopy.go @@ -449,6 +449,7 @@ func (in *FileUploadInitParameters) DeepCopyInto(out *FileUploadInitParameters) *out = new(string) **out = **in } + out.ConnectionStringSecretRef = in.ConnectionStringSecretRef if in.ContainerName != nil { in, out := &in.ContainerName, &out.ContainerName *out = new(string) @@ -1788,6 +1789,7 @@ func (in *LinkedHubInitParameters) DeepCopyInto(out *LinkedHubInitParameters) { *out = new(bool) **out = **in } + out.ConnectionStringSecretRef = in.ConnectionStringSecretRef if in.Location != nil { in, out := &in.Location, &out.Location *out = new(string) diff --git a/apis/devices/v1beta2/zz_iothub_terraformed.go b/apis/devices/v1beta2/zz_iothub_terraformed.go index 839b98bae..9f44c53c8 100755 --- a/apis/devices/v1beta2/zz_iothub_terraformed.go +++ b/apis/devices/v1beta2/zz_iothub_terraformed.go @@ -21,7 +21,7 @@ func (mg *IOTHub) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IOTHub func (tr *IOTHub) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"endpoint[*].connection_string": "status.atProvider.endpoint[*].connectionString", "file_upload[*].connection_string": "spec.forProvider.fileUpload[*].connectionStringSecretRef", "shared_access_policy[*].primary_key": "status.atProvider.sharedAccessPolicy[*].primaryKey", "shared_access_policy[*].secondary_key": "status.atProvider.sharedAccessPolicy[*].secondaryKey"} + return map[string]string{"endpoint[*].connection_string": "status.atProvider.endpoint[*].connectionString", "file_upload[*].connection_string": "fileUpload[*].connectionStringSecretRef", "shared_access_policy[*].primary_key": "status.atProvider.sharedAccessPolicy[*].primaryKey", "shared_access_policy[*].secondary_key": "status.atProvider.sharedAccessPolicy[*].secondaryKey"} } // GetObservation of this IOTHub diff --git a/apis/devices/v1beta2/zz_iothub_types.go b/apis/devices/v1beta2/zz_iothub_types.go index 599fe139d..c1f763cd8 100755 --- a/apis/devices/v1beta2/zz_iothub_types.go +++ b/apis/devices/v1beta2/zz_iothub_types.go @@ -180,6 +180,9 @@ type FileUploadInitParameters struct { // The type used to authenticate against the storage account. Possible values are keyBased and identityBased. Defaults to keyBased. AuthenticationType *string `json:"authenticationType,omitempty" tf:"authentication_type,omitempty"` + // The connection string for the Azure Storage account to which files are uploaded. + ConnectionStringSecretRef v1.SecretKeySelector `json:"connectionStringSecretRef" tf:"-"` + // The name of the root container where the files should be uploaded to. The container need not exist but should be creatable using the connection_string specified. ContainerName *string `json:"containerName,omitempty" tf:"container_name,omitempty"` @@ -236,7 +239,7 @@ type FileUploadParameters struct { AuthenticationType *string `json:"authenticationType,omitempty" tf:"authentication_type,omitempty"` // The connection string for the Azure Storage account to which files are uploaded. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ConnectionStringSecretRef v1.SecretKeySelector `json:"connectionStringSecretRef" tf:"-"` // The name of the root container where the files should be uploaded to. The container need not exist but should be creatable using the connection_string specified. diff --git a/apis/devices/v1beta2/zz_iothubdps_terraformed.go b/apis/devices/v1beta2/zz_iothubdps_terraformed.go index 5113b83ce..0dca93a93 100755 --- a/apis/devices/v1beta2/zz_iothubdps_terraformed.go +++ b/apis/devices/v1beta2/zz_iothubdps_terraformed.go @@ -21,7 +21,7 @@ func (mg *IOTHubDPS) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IOTHubDPS func (tr *IOTHubDPS) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"linked_hub[*].connection_string": "spec.forProvider.linkedHub[*].connectionStringSecretRef"} + return map[string]string{"linked_hub[*].connection_string": "linkedHub[*].connectionStringSecretRef"} } // GetObservation of this IOTHubDPS diff --git a/apis/devices/v1beta2/zz_iothubdps_types.go b/apis/devices/v1beta2/zz_iothubdps_types.go index c4b675c45..7343c81a8 100755 --- a/apis/devices/v1beta2/zz_iothubdps_types.go +++ b/apis/devices/v1beta2/zz_iothubdps_types.go @@ -219,6 +219,9 @@ type LinkedHubInitParameters struct { // Determines whether to apply allocation policies to the IoT Hub. Defaults to true. ApplyAllocationPolicy *bool `json:"applyAllocationPolicy,omitempty" tf:"apply_allocation_policy,omitempty"` + // The connection string to connect to the IoT Hub. + ConnectionStringSecretRef v1.SecretKeySelector `json:"connectionStringSecretRef" tf:"-"` + // The location of the IoT hub. Location *string `json:"location,omitempty" tf:"location,omitempty"` } @@ -249,7 +252,7 @@ type LinkedHubParameters struct { ApplyAllocationPolicy *bool `json:"applyAllocationPolicy,omitempty" tf:"apply_allocation_policy,omitempty"` // The connection string to connect to the IoT Hub. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ConnectionStringSecretRef v1.SecretKeySelector `json:"connectionStringSecretRef" tf:"-"` // The location of the IoT hub. diff --git a/apis/deviceupdate/v1beta2/zz_generated.deepcopy.go b/apis/deviceupdate/v1beta2/zz_generated.deepcopy.go index b35231ec8..f356bc140 100644 --- a/apis/deviceupdate/v1beta2/zz_generated.deepcopy.go +++ b/apis/deviceupdate/v1beta2/zz_generated.deepcopy.go @@ -16,6 +16,7 @@ import ( // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *DiagnosticStorageAccountInitParameters) DeepCopyInto(out *DiagnosticStorageAccountInitParameters) { *out = *in + out.ConnectionStringSecretRef = in.ConnectionStringSecretRef if in.ID != nil { in, out := &in.ID, &out.ID *out = new(string) diff --git a/apis/deviceupdate/v1beta2/zz_iothubdeviceupdateinstance_terraformed.go b/apis/deviceupdate/v1beta2/zz_iothubdeviceupdateinstance_terraformed.go index 4a3092136..cac021e78 100755 --- a/apis/deviceupdate/v1beta2/zz_iothubdeviceupdateinstance_terraformed.go +++ b/apis/deviceupdate/v1beta2/zz_iothubdeviceupdateinstance_terraformed.go @@ -21,7 +21,7 @@ func (mg *IOTHubDeviceUpdateInstance) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this IOTHubDeviceUpdateInstance func (tr *IOTHubDeviceUpdateInstance) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"diagnostic_storage_account[*].connection_string": "spec.forProvider.diagnosticStorageAccount[*].connectionStringSecretRef"} + return map[string]string{"diagnostic_storage_account[*].connection_string": "diagnosticStorageAccount[*].connectionStringSecretRef"} } // GetObservation of this IOTHubDeviceUpdateInstance diff --git a/apis/deviceupdate/v1beta2/zz_iothubdeviceupdateinstance_types.go b/apis/deviceupdate/v1beta2/zz_iothubdeviceupdateinstance_types.go index 16880915e..5fe15e607 100755 --- a/apis/deviceupdate/v1beta2/zz_iothubdeviceupdateinstance_types.go +++ b/apis/deviceupdate/v1beta2/zz_iothubdeviceupdateinstance_types.go @@ -15,6 +15,9 @@ import ( type DiagnosticStorageAccountInitParameters struct { + // Connection String of the Diagnostic Storage Account. + ConnectionStringSecretRef v1.SecretKeySelector `json:"connectionStringSecretRef" tf:"-"` + // Resource ID of the Diagnostic Storage Account. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID() @@ -38,7 +41,7 @@ type DiagnosticStorageAccountObservation struct { type DiagnosticStorageAccountParameters struct { // Connection String of the Diagnostic Storage Account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ConnectionStringSecretRef v1.SecretKeySelector `json:"connectionStringSecretRef" tf:"-"` // Resource ID of the Diagnostic Storage Account. diff --git a/apis/devtestlab/v1beta2/zz_generated.deepcopy.go b/apis/devtestlab/v1beta2/zz_generated.deepcopy.go index 38cd7ffa2..4d21cced4 100644 --- a/apis/devtestlab/v1beta2/zz_generated.deepcopy.go +++ b/apis/devtestlab/v1beta2/zz_generated.deepcopy.go @@ -732,6 +732,11 @@ func (in *LinuxVirtualMachineInitParameters) DeepCopyInto(out *LinuxVirtualMachi *out = new(string) **out = **in } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ResourceGroupName != nil { in, out := &in.ResourceGroupName, &out.ResourceGroupName *out = new(string) @@ -2467,6 +2472,7 @@ func (in *WindowsVirtualMachineInitParameters) DeepCopyInto(out *WindowsVirtualM *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.ResourceGroupName != nil { in, out := &in.ResourceGroupName, &out.ResourceGroupName *out = new(string) diff --git a/apis/devtestlab/v1beta2/zz_linuxvirtualmachine_terraformed.go b/apis/devtestlab/v1beta2/zz_linuxvirtualmachine_terraformed.go index 522aa05e0..b1e1aaad0 100755 --- a/apis/devtestlab/v1beta2/zz_linuxvirtualmachine_terraformed.go +++ b/apis/devtestlab/v1beta2/zz_linuxvirtualmachine_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinuxVirtualMachine) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinuxVirtualMachine func (tr *LinuxVirtualMachine) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this LinuxVirtualMachine diff --git a/apis/devtestlab/v1beta2/zz_linuxvirtualmachine_types.go b/apis/devtestlab/v1beta2/zz_linuxvirtualmachine_types.go index a36d42bba..51dd9a52f 100755 --- a/apis/devtestlab/v1beta2/zz_linuxvirtualmachine_types.go +++ b/apis/devtestlab/v1beta2/zz_linuxvirtualmachine_types.go @@ -154,6 +154,9 @@ type LinuxVirtualMachineInitParameters struct { // Any notes about the Virtual Machine. Notes *string `json:"notes,omitempty" tf:"notes,omitempty"` + // The Password associated with the username used to login to this Virtual Machine. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // The name of the resource group in which the Dev Test Lab resource exists. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/azure/v1beta1.ResourceGroup ResourceGroupName *string `json:"resourceGroupName,omitempty" tf:"resource_group_name,omitempty"` diff --git a/apis/devtestlab/v1beta2/zz_windowsvirtualmachine_terraformed.go b/apis/devtestlab/v1beta2/zz_windowsvirtualmachine_terraformed.go index f0dbfca16..f42b2f88e 100755 --- a/apis/devtestlab/v1beta2/zz_windowsvirtualmachine_terraformed.go +++ b/apis/devtestlab/v1beta2/zz_windowsvirtualmachine_terraformed.go @@ -21,7 +21,7 @@ func (mg *WindowsVirtualMachine) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this WindowsVirtualMachine func (tr *WindowsVirtualMachine) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this WindowsVirtualMachine diff --git a/apis/devtestlab/v1beta2/zz_windowsvirtualmachine_types.go b/apis/devtestlab/v1beta2/zz_windowsvirtualmachine_types.go index b5b055c79..b68d5e0db 100755 --- a/apis/devtestlab/v1beta2/zz_windowsvirtualmachine_types.go +++ b/apis/devtestlab/v1beta2/zz_windowsvirtualmachine_types.go @@ -154,6 +154,9 @@ type WindowsVirtualMachineInitParameters struct { // Any notes about the Virtual Machine. Notes *string `json:"notes,omitempty" tf:"notes,omitempty"` + // The Password associated with the username used to login to this Virtual Machine. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The name of the resource group in which the Dev Test Lab resource exists. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/azure/v1beta1.ResourceGroup ResourceGroupName *string `json:"resourceGroupName,omitempty" tf:"resource_group_name,omitempty"` diff --git a/apis/eventgrid/v1beta2/zz_eventsubscription_terraformed.go b/apis/eventgrid/v1beta2/zz_eventsubscription_terraformed.go index 35e510bfb..d1542e667 100755 --- a/apis/eventgrid/v1beta2/zz_eventsubscription_terraformed.go +++ b/apis/eventgrid/v1beta2/zz_eventsubscription_terraformed.go @@ -21,7 +21,7 @@ func (mg *EventSubscription) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this EventSubscription func (tr *EventSubscription) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"delivery_property[*].value": "spec.forProvider.deliveryProperty[*].valueSecretRef"} + return map[string]string{"delivery_property[*].value": "deliveryProperty[*].valueSecretRef"} } // GetObservation of this EventSubscription diff --git a/apis/eventgrid/v1beta2/zz_eventsubscription_types.go b/apis/eventgrid/v1beta2/zz_eventsubscription_types.go index fed817af6..f8b482921 100755 --- a/apis/eventgrid/v1beta2/zz_eventsubscription_types.go +++ b/apis/eventgrid/v1beta2/zz_eventsubscription_types.go @@ -351,6 +351,9 @@ type DeliveryPropertyInitParameters struct { // Either Static or Dynamic Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // If the type is Static, then provide the value to use + ValueSecretRef *v1.SecretKeySelector `json:"valueSecretRef,omitempty" tf:"-"` } type DeliveryPropertyObservation struct { diff --git a/apis/eventgrid/v1beta2/zz_generated.deepcopy.go b/apis/eventgrid/v1beta2/zz_generated.deepcopy.go index 4b34256ac..4510f1791 100644 --- a/apis/eventgrid/v1beta2/zz_generated.deepcopy.go +++ b/apis/eventgrid/v1beta2/zz_generated.deepcopy.go @@ -795,6 +795,11 @@ func (in *DeliveryPropertyInitParameters) DeepCopyInto(out *DeliveryPropertyInit *out = new(string) **out = **in } + if in.ValueSecretRef != nil { + in, out := &in.ValueSecretRef, &out.ValueSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new DeliveryPropertyInitParameters. diff --git a/apis/hdinsight/v1beta2/zz_generated.deepcopy.go b/apis/hdinsight/v1beta2/zz_generated.deepcopy.go index 9e3fc3fdf..5c65d5dc9 100644 --- a/apis/hdinsight/v1beta2/zz_generated.deepcopy.go +++ b/apis/hdinsight/v1beta2/zz_generated.deepcopy.go @@ -21,6 +21,7 @@ func (in *AmbariInitParameters) DeepCopyInto(out *AmbariInitParameters) { *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -904,6 +905,7 @@ func (in *ExtensionInitParameters) DeepCopyInto(out *ExtensionInitParameters) { *out = new(string) **out = **in } + out.PrimaryKeySecretRef = in.PrimaryKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ExtensionInitParameters. @@ -960,6 +962,7 @@ func (in *ExtensionParameters) DeepCopy() *ExtensionParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *GatewayInitParameters) DeepCopyInto(out *GatewayInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -1293,6 +1296,7 @@ func (in *HBaseClusterExtensionInitParameters) DeepCopyInto(out *HBaseClusterExt *out = new(string) **out = **in } + out.PrimaryKeySecretRef = in.PrimaryKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new HBaseClusterExtensionInitParameters. @@ -1349,6 +1353,7 @@ func (in *HBaseClusterExtensionParameters) DeepCopy() *HBaseClusterExtensionPara // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *HBaseClusterGatewayInitParameters) DeepCopyInto(out *HBaseClusterGatewayInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -1652,6 +1657,7 @@ func (in *HBaseClusterMonitorInitParameters) DeepCopyInto(out *HBaseClusterMonit *out = new(string) **out = **in } + out.PrimaryKeySecretRef = in.PrimaryKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new HBaseClusterMonitorInitParameters. @@ -2159,6 +2165,7 @@ func (in *HBaseClusterSecurityProfileInitParameters) DeepCopyInto(out *HBaseClus *out = new(string) **out = **in } + out.DomainUserPasswordSecretRef = in.DomainUserPasswordSecretRef if in.DomainUsername != nil { in, out := &in.DomainUsername, &out.DomainUsername *out = new(string) @@ -2455,6 +2462,7 @@ func (in *HBaseClusterStorageAccountInitParameters) DeepCopyInto(out *HBaseClust *out = new(bool) **out = **in } + out.StorageAccountKeySecretRef = in.StorageAccountKeySecretRef if in.StorageContainerID != nil { in, out := &in.StorageContainerID, &out.StorageContainerID *out = new(string) @@ -3173,6 +3181,11 @@ func (in *HadoopClusterStatus) DeepCopy() *HadoopClusterStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *HeadNodeInitParameters) DeepCopyInto(out *HeadNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -3452,6 +3465,7 @@ func (in *HiveInitParameters) DeepCopyInto(out *HiveInitParameters) { *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -3900,6 +3914,7 @@ func (in *InteractiveQueryClusterExtensionInitParameters) DeepCopyInto(out *Inte *out = new(string) **out = **in } + out.PrimaryKeySecretRef = in.PrimaryKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new InteractiveQueryClusterExtensionInitParameters. @@ -3956,6 +3971,7 @@ func (in *InteractiveQueryClusterExtensionParameters) DeepCopy() *InteractiveQue // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *InteractiveQueryClusterGatewayInitParameters) DeepCopyInto(out *InteractiveQueryClusterGatewayInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -4174,6 +4190,7 @@ func (in *InteractiveQueryClusterMetastoresAmbariInitParameters) DeepCopyInto(ou *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -4265,6 +4282,7 @@ func (in *InteractiveQueryClusterMetastoresHiveInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -4416,6 +4434,7 @@ func (in *InteractiveQueryClusterMetastoresOozieInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -4537,6 +4556,7 @@ func (in *InteractiveQueryClusterMonitorInitParameters) DeepCopyInto(out *Intera *out = new(string) **out = **in } + out.PrimaryKeySecretRef = in.PrimaryKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new InteractiveQueryClusterMonitorInitParameters. @@ -4943,6 +4963,11 @@ func (in *InteractiveQueryClusterParameters) DeepCopy() *InteractiveQueryCluster // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *InteractiveQueryClusterRolesHeadNodeInitParameters) DeepCopyInto(out *InteractiveQueryClusterRolesHeadNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -5222,6 +5247,11 @@ func (in *InteractiveQueryClusterRolesWorkerNodeInitParameters) DeepCopyInto(out *out = new(RolesWorkerNodeAutoscaleInitParameters) (*in).DeepCopyInto(*out) } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -5521,6 +5551,11 @@ func (in *InteractiveQueryClusterRolesWorkerNodeScriptActionsParameters) DeepCop // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *InteractiveQueryClusterRolesZookeeperNodeInitParameters) DeepCopyInto(out *InteractiveQueryClusterRolesZookeeperNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -5816,6 +5851,7 @@ func (in *InteractiveQueryClusterSecurityProfileInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + out.DomainUserPasswordSecretRef = in.DomainUserPasswordSecretRef if in.DomainUsername != nil { in, out := &in.DomainUsername, &out.DomainUsername *out = new(string) @@ -6112,6 +6148,7 @@ func (in *InteractiveQueryClusterStorageAccountInitParameters) DeepCopyInto(out *out = new(bool) **out = **in } + out.StorageAccountKeySecretRef = in.StorageAccountKeySecretRef if in.StorageContainerID != nil { in, out := &in.StorageContainerID, &out.StorageContainerID *out = new(string) @@ -6490,6 +6527,7 @@ func (in *KafkaClusterExtensionInitParameters) DeepCopyInto(out *KafkaClusterExt *out = new(string) **out = **in } + out.PrimaryKeySecretRef = in.PrimaryKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new KafkaClusterExtensionInitParameters. @@ -6546,6 +6584,7 @@ func (in *KafkaClusterExtensionParameters) DeepCopy() *KafkaClusterExtensionPara // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *KafkaClusterGatewayInitParameters) DeepCopyInto(out *KafkaClusterGatewayInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -6769,6 +6808,7 @@ func (in *KafkaClusterMetastoresAmbariInitParameters) DeepCopyInto(out *KafkaClu *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -6860,6 +6900,7 @@ func (in *KafkaClusterMetastoresHiveInitParameters) DeepCopyInto(out *KafkaClust *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -7011,6 +7052,7 @@ func (in *KafkaClusterMetastoresOozieInitParameters) DeepCopyInto(out *KafkaClus *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -7132,6 +7174,7 @@ func (in *KafkaClusterMonitorInitParameters) DeepCopyInto(out *KafkaClusterMonit *out = new(string) **out = **in } + out.PrimaryKeySecretRef = in.PrimaryKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new KafkaClusterMonitorInitParameters. @@ -7553,6 +7596,11 @@ func (in *KafkaClusterParameters) DeepCopy() *KafkaClusterParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *KafkaClusterRolesHeadNodeInitParameters) DeepCopyInto(out *KafkaClusterRolesHeadNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -7937,6 +7985,11 @@ func (in *KafkaClusterRolesWorkerNodeInitParameters) DeepCopyInto(out *KafkaClus *out = new(float64) **out = **in } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -8236,6 +8289,11 @@ func (in *KafkaClusterRolesWorkerNodeScriptActionsParameters) DeepCopy() *KafkaC // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *KafkaClusterRolesZookeeperNodeInitParameters) DeepCopyInto(out *KafkaClusterRolesZookeeperNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -8531,6 +8589,7 @@ func (in *KafkaClusterSecurityProfileInitParameters) DeepCopyInto(out *KafkaClus *out = new(string) **out = **in } + out.DomainUserPasswordSecretRef = in.DomainUserPasswordSecretRef if in.DomainUsername != nil { in, out := &in.DomainUsername, &out.DomainUsername *out = new(string) @@ -8827,6 +8886,7 @@ func (in *KafkaClusterStorageAccountInitParameters) DeepCopyInto(out *KafkaClust *out = new(bool) **out = **in } + out.StorageAccountKeySecretRef = in.StorageAccountKeySecretRef if in.StorageContainerID != nil { in, out := &in.StorageContainerID, &out.StorageContainerID *out = new(string) @@ -8933,6 +8993,11 @@ func (in *KafkaClusterStorageAccountParameters) DeepCopy() *KafkaClusterStorageA // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *KafkaManagementNodeInitParameters) DeepCopyInto(out *KafkaManagementNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -9212,6 +9277,7 @@ func (in *MetastoresAmbariInitParameters) DeepCopyInto(out *MetastoresAmbariInit *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -9303,6 +9369,7 @@ func (in *MetastoresHiveInitParameters) DeepCopyInto(out *MetastoresHiveInitPara *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -9454,6 +9521,7 @@ func (in *MetastoresOozieInitParameters) DeepCopyInto(out *MetastoresOozieInitPa *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -9575,6 +9643,7 @@ func (in *MonitorInitParameters) DeepCopyInto(out *MonitorInitParameters) { *out = new(string) **out = **in } + out.PrimaryKeySecretRef = in.PrimaryKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MonitorInitParameters. @@ -9711,6 +9780,7 @@ func (in *OozieInitParameters) DeepCopyInto(out *OozieInitParameters) { *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -10061,6 +10131,11 @@ func (in *RestProxyParameters) DeepCopy() *RestProxyParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *RolesHeadNodeInitParameters) DeepCopyInto(out *RolesHeadNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -10601,6 +10676,11 @@ func (in *RolesWorkerNodeInitParameters) DeepCopyInto(out *RolesWorkerNodeInitPa *out = new(WorkerNodeAutoscaleInitParameters) (*in).DeepCopyInto(*out) } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -10900,6 +10980,11 @@ func (in *RolesWorkerNodeScriptActionsParameters) DeepCopy() *RolesWorkerNodeScr // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *RolesZookeeperNodeInitParameters) DeepCopyInto(out *RolesZookeeperNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -11393,6 +11478,7 @@ func (in *SecurityProfileInitParameters) DeepCopyInto(out *SecurityProfileInitPa *out = new(string) **out = **in } + out.DomainUserPasswordSecretRef = in.DomainUserPasswordSecretRef if in.DomainUsername != nil { in, out := &in.DomainUsername, &out.DomainUsername *out = new(string) @@ -11816,6 +11902,7 @@ func (in *SparkClusterExtensionInitParameters) DeepCopyInto(out *SparkClusterExt *out = new(string) **out = **in } + out.PrimaryKeySecretRef = in.PrimaryKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SparkClusterExtensionInitParameters. @@ -11872,6 +11959,7 @@ func (in *SparkClusterExtensionParameters) DeepCopy() *SparkClusterExtensionPara // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *SparkClusterGatewayInitParameters) DeepCopyInto(out *SparkClusterGatewayInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -12090,6 +12178,7 @@ func (in *SparkClusterMetastoresAmbariInitParameters) DeepCopyInto(out *SparkClu *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -12181,6 +12270,7 @@ func (in *SparkClusterMetastoresHiveInitParameters) DeepCopyInto(out *SparkClust *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -12332,6 +12422,7 @@ func (in *SparkClusterMetastoresOozieInitParameters) DeepCopyInto(out *SparkClus *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -12453,6 +12544,7 @@ func (in *SparkClusterMonitorInitParameters) DeepCopyInto(out *SparkClusterMonit *out = new(string) **out = **in } + out.PrimaryKeySecretRef = in.PrimaryKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SparkClusterMonitorInitParameters. @@ -12859,6 +12951,11 @@ func (in *SparkClusterParameters) DeepCopy() *SparkClusterParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *SparkClusterRolesHeadNodeInitParameters) DeepCopyInto(out *SparkClusterRolesHeadNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -13303,6 +13400,11 @@ func (in *SparkClusterRolesWorkerNodeInitParameters) DeepCopyInto(out *SparkClus *out = new(SparkClusterRolesWorkerNodeAutoscaleInitParameters) (*in).DeepCopyInto(*out) } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -13602,6 +13704,11 @@ func (in *SparkClusterRolesWorkerNodeScriptActionsParameters) DeepCopy() *SparkC // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *SparkClusterRolesZookeeperNodeInitParameters) DeepCopyInto(out *SparkClusterRolesZookeeperNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -13897,6 +14004,7 @@ func (in *SparkClusterSecurityProfileInitParameters) DeepCopyInto(out *SparkClus *out = new(string) **out = **in } + out.DomainUserPasswordSecretRef = in.DomainUserPasswordSecretRef if in.DomainUsername != nil { in, out := &in.DomainUsername, &out.DomainUsername *out = new(string) @@ -14193,6 +14301,7 @@ func (in *SparkClusterStorageAccountInitParameters) DeepCopyInto(out *SparkClust *out = new(bool) **out = **in } + out.StorageAccountKeySecretRef = in.StorageAccountKeySecretRef if in.StorageContainerID != nil { in, out := &in.StorageContainerID, &out.StorageContainerID *out = new(string) @@ -14409,6 +14518,7 @@ func (in *StorageAccountInitParameters) DeepCopyInto(out *StorageAccountInitPara *out = new(bool) **out = **in } + out.StorageAccountKeySecretRef = in.StorageAccountKeySecretRef if in.StorageContainerID != nil { in, out := &in.StorageContainerID, &out.StorageContainerID *out = new(string) @@ -14934,6 +15044,11 @@ func (in *WorkerNodeInitParameters) DeepCopyInto(out *WorkerNodeInitParameters) *out = new(AutoscaleInitParameters) (*in).DeepCopyInto(*out) } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) @@ -15233,6 +15348,11 @@ func (in *WorkerNodeScriptActionsParameters) DeepCopy() *WorkerNodeScriptActions // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *ZookeeperNodeInitParameters) DeepCopyInto(out *ZookeeperNodeInitParameters) { *out = *in + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SSHKeys != nil { in, out := &in.SSHKeys, &out.SSHKeys *out = make([]*string, len(*in)) diff --git a/apis/hdinsight/v1beta2/zz_hadoopcluster_terraformed.go b/apis/hdinsight/v1beta2/zz_hadoopcluster_terraformed.go index 656d376cf..2e052efde 100755 --- a/apis/hdinsight/v1beta2/zz_hadoopcluster_terraformed.go +++ b/apis/hdinsight/v1beta2/zz_hadoopcluster_terraformed.go @@ -21,7 +21,7 @@ func (mg *HadoopCluster) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this HadoopCluster func (tr *HadoopCluster) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"extension[*].primary_key": "spec.forProvider.extension[*].primaryKeySecretRef", "gateway[*].password": "spec.forProvider.gateway[*].passwordSecretRef", "metastores[*].ambari[*].password": "spec.forProvider.metastores[*].ambari[*].passwordSecretRef", "metastores[*].hive[*].password": "spec.forProvider.metastores[*].hive[*].passwordSecretRef", "metastores[*].oozie[*].password": "spec.forProvider.metastores[*].oozie[*].passwordSecretRef", "monitor[*].primary_key": "spec.forProvider.monitor[*].primaryKeySecretRef", "roles[*].head_node[*].password": "spec.forProvider.roles[*].headNode[*].passwordSecretRef", "roles[*].worker_node[*].password": "spec.forProvider.roles[*].workerNode[*].passwordSecretRef", "roles[*].zookeeper_node[*].password": "spec.forProvider.roles[*].zookeeperNode[*].passwordSecretRef", "security_profile[*].domain_user_password": "spec.forProvider.securityProfile[*].domainUserPasswordSecretRef", "storage_account[*].storage_account_key": "spec.forProvider.storageAccount[*].storageAccountKeySecretRef"} + return map[string]string{"extension[*].primary_key": "extension[*].primaryKeySecretRef", "gateway[*].password": "gateway[*].passwordSecretRef", "metastores[*].ambari[*].password": "metastores[*].ambari[*].passwordSecretRef", "metastores[*].hive[*].password": "metastores[*].hive[*].passwordSecretRef", "metastores[*].oozie[*].password": "metastores[*].oozie[*].passwordSecretRef", "monitor[*].primary_key": "monitor[*].primaryKeySecretRef", "roles[*].head_node[*].password": "roles[*].headNode[*].passwordSecretRef", "roles[*].worker_node[*].password": "roles[*].workerNode[*].passwordSecretRef", "roles[*].zookeeper_node[*].password": "roles[*].zookeeperNode[*].passwordSecretRef", "security_profile[*].domain_user_password": "securityProfile[*].domainUserPasswordSecretRef", "storage_account[*].storage_account_key": "storageAccount[*].storageAccountKeySecretRef"} } // GetObservation of this HadoopCluster diff --git a/apis/hdinsight/v1beta2/zz_hadoopcluster_types.go b/apis/hdinsight/v1beta2/zz_hadoopcluster_types.go index e0c20c0af..2394cabe0 100755 --- a/apis/hdinsight/v1beta2/zz_hadoopcluster_types.go +++ b/apis/hdinsight/v1beta2/zz_hadoopcluster_types.go @@ -18,6 +18,9 @@ type AmbariInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -44,7 +47,7 @@ type AmbariParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -274,6 +277,9 @@ type ExtensionInitParameters struct { // The workspace ID of the log analytics extension. LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId,omitempty" tf:"log_analytics_workspace_id,omitempty"` + + // The workspace key of the log analytics extension. + PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type ExtensionObservation struct { @@ -289,12 +295,15 @@ type ExtensionParameters struct { LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId" tf:"log_analytics_workspace_id,omitempty"` // The workspace key of the log analytics extension. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type GatewayInitParameters struct { + // The password used for the Ambari Portal. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username used for the Ambari Portal. Changing this forces a new resource to be created. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -308,7 +317,7 @@ type GatewayObservation struct { type GatewayParameters struct { // The password used for the Ambari Portal. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username used for the Ambari Portal. Changing this forces a new resource to be created. @@ -584,6 +593,9 @@ type HadoopClusterParameters struct { type HeadNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -683,6 +695,9 @@ type HiveInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -709,7 +724,7 @@ type HiveParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -803,6 +818,9 @@ type MonitorInitParameters struct { // The Operations Management Suite (OMS) workspace ID. LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId,omitempty" tf:"log_analytics_workspace_id,omitempty"` + + // The Operations Management Suite (OMS) workspace key. + PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type MonitorObservation struct { @@ -818,7 +836,7 @@ type MonitorParameters struct { LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId" tf:"log_analytics_workspace_id,omitempty"` // The Operations Management Suite (OMS) workspace key. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } @@ -856,6 +874,9 @@ type OozieInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -882,7 +903,7 @@ type OozieParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -1062,6 +1083,9 @@ type SecurityProfileInitParameters struct { // The name of the Azure Active Directory Domain. Changing this forces a new resource to be created. DomainName *string `json:"domainName,omitempty" tf:"domain_name,omitempty"` + // The user password of the Azure Active Directory Domain. Changing this forces a new resource to be created. + DomainUserPasswordSecretRef v1.SecretKeySelector `json:"domainUserPasswordSecretRef" tf:"-"` + // The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. DomainUsername *string `json:"domainUsername,omitempty" tf:"domain_username,omitempty"` @@ -1112,7 +1136,7 @@ type SecurityProfileParameters struct { DomainName *string `json:"domainName" tf:"domain_name,omitempty"` // The user password of the Azure Active Directory Domain. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional DomainUserPasswordSecretRef v1.SecretKeySelector `json:"domainUserPasswordSecretRef" tf:"-"` // The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. @@ -1183,6 +1207,9 @@ type StorageAccountInitParameters struct { // Is this the Default Storage Account for the HDInsight Hadoop Cluster? Changing this forces a new resource to be created. IsDefault *bool `json:"isDefault,omitempty" tf:"is_default,omitempty"` + // The Access Key which should be used to connect to the Storage Account. Changing this forces a new resource to be created. + StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` + // The ID of the Storage Container. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta1.Container // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID() @@ -1219,7 +1246,7 @@ type StorageAccountParameters struct { IsDefault *bool `json:"isDefault" tf:"is_default,omitempty"` // The Access Key which should be used to connect to the Storage Account. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` // The ID of the Storage Container. Changing this forces a new resource to be created. @@ -1285,6 +1312,9 @@ type WorkerNodeInitParameters struct { // A autoscale block as defined below. Autoscale *AutoscaleInitParameters `json:"autoscale,omitempty" tf:"autoscale,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -1437,6 +1467,9 @@ type WorkerNodeScriptActionsParameters struct { type ZookeeperNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` diff --git a/apis/hdinsight/v1beta2/zz_hbasecluster_terraformed.go b/apis/hdinsight/v1beta2/zz_hbasecluster_terraformed.go index 7009af923..bd55f080d 100755 --- a/apis/hdinsight/v1beta2/zz_hbasecluster_terraformed.go +++ b/apis/hdinsight/v1beta2/zz_hbasecluster_terraformed.go @@ -21,7 +21,7 @@ func (mg *HBaseCluster) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this HBaseCluster func (tr *HBaseCluster) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"extension[*].primary_key": "spec.forProvider.extension[*].primaryKeySecretRef", "gateway[*].password": "spec.forProvider.gateway[*].passwordSecretRef", "metastores[*].ambari[*].password": "spec.forProvider.metastores[*].ambari[*].passwordSecretRef", "metastores[*].hive[*].password": "spec.forProvider.metastores[*].hive[*].passwordSecretRef", "metastores[*].oozie[*].password": "spec.forProvider.metastores[*].oozie[*].passwordSecretRef", "monitor[*].primary_key": "spec.forProvider.monitor[*].primaryKeySecretRef", "roles[*].head_node[*].password": "spec.forProvider.roles[*].headNode[*].passwordSecretRef", "roles[*].worker_node[*].password": "spec.forProvider.roles[*].workerNode[*].passwordSecretRef", "roles[*].zookeeper_node[*].password": "spec.forProvider.roles[*].zookeeperNode[*].passwordSecretRef", "security_profile[*].domain_user_password": "spec.forProvider.securityProfile[*].domainUserPasswordSecretRef", "storage_account[*].storage_account_key": "spec.forProvider.storageAccount[*].storageAccountKeySecretRef"} + return map[string]string{"extension[*].primary_key": "extension[*].primaryKeySecretRef", "gateway[*].password": "gateway[*].passwordSecretRef", "metastores[*].ambari[*].password": "metastores[*].ambari[*].passwordSecretRef", "metastores[*].hive[*].password": "metastores[*].hive[*].passwordSecretRef", "metastores[*].oozie[*].password": "metastores[*].oozie[*].passwordSecretRef", "monitor[*].primary_key": "monitor[*].primaryKeySecretRef", "roles[*].head_node[*].password": "roles[*].headNode[*].passwordSecretRef", "roles[*].worker_node[*].password": "roles[*].workerNode[*].passwordSecretRef", "roles[*].zookeeper_node[*].password": "roles[*].zookeeperNode[*].passwordSecretRef", "security_profile[*].domain_user_password": "securityProfile[*].domainUserPasswordSecretRef", "storage_account[*].storage_account_key": "storageAccount[*].storageAccountKeySecretRef"} } // GetObservation of this HBaseCluster diff --git a/apis/hdinsight/v1beta2/zz_hbasecluster_types.go b/apis/hdinsight/v1beta2/zz_hbasecluster_types.go index 2ef05e457..2e98d7214 100755 --- a/apis/hdinsight/v1beta2/zz_hbasecluster_types.go +++ b/apis/hdinsight/v1beta2/zz_hbasecluster_types.go @@ -143,6 +143,9 @@ type HBaseClusterExtensionInitParameters struct { // The workspace ID of the log analytics extension. LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId,omitempty" tf:"log_analytics_workspace_id,omitempty"` + + // The workspace key of the log analytics extension. + PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type HBaseClusterExtensionObservation struct { @@ -158,12 +161,15 @@ type HBaseClusterExtensionParameters struct { LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId" tf:"log_analytics_workspace_id,omitempty"` // The workspace key of the log analytics extension. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type HBaseClusterGatewayInitParameters struct { + // The password used for the Ambari Portal. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username used for the Ambari Portal. Changing this forces a new resource to be created. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -177,7 +183,7 @@ type HBaseClusterGatewayObservation struct { type HBaseClusterGatewayParameters struct { // The password used for the Ambari Portal. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username used for the Ambari Portal. Changing this forces a new resource to be created. @@ -283,6 +289,9 @@ type HBaseClusterMonitorInitParameters struct { // The Operations Management Suite (OMS) workspace ID. LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId,omitempty" tf:"log_analytics_workspace_id,omitempty"` + + // The Operations Management Suite (OMS) workspace key. + PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type HBaseClusterMonitorObservation struct { @@ -298,7 +307,7 @@ type HBaseClusterMonitorParameters struct { LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId" tf:"log_analytics_workspace_id,omitempty"` // The Operations Management Suite (OMS) workspace key. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } @@ -534,6 +543,9 @@ type HBaseClusterSecurityProfileInitParameters struct { // The name of the Azure Active Directory Domain. Changing this forces a new resource to be created. DomainName *string `json:"domainName,omitempty" tf:"domain_name,omitempty"` + // The user password of the Azure Active Directory Domain. Changing this forces a new resource to be created. + DomainUserPasswordSecretRef v1.SecretKeySelector `json:"domainUserPasswordSecretRef" tf:"-"` + // The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. DomainUsername *string `json:"domainUsername,omitempty" tf:"domain_username,omitempty"` @@ -584,7 +596,7 @@ type HBaseClusterSecurityProfileParameters struct { DomainName *string `json:"domainName" tf:"domain_name,omitempty"` // The user password of the Azure Active Directory Domain. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional DomainUserPasswordSecretRef v1.SecretKeySelector `json:"domainUserPasswordSecretRef" tf:"-"` // The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. @@ -655,6 +667,9 @@ type HBaseClusterStorageAccountInitParameters struct { // Is this the Default Storage Account for the HDInsight Hadoop Cluster? Changing this forces a new resource to be created. IsDefault *bool `json:"isDefault,omitempty" tf:"is_default,omitempty"` + // The Access Key which should be used to connect to the Storage Account. Changing this forces a new resource to be created. + StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` + // The ID of the Storage Container. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta1.Container // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID() @@ -691,7 +706,7 @@ type HBaseClusterStorageAccountParameters struct { IsDefault *bool `json:"isDefault" tf:"is_default,omitempty"` // The Access Key which should be used to connect to the Storage Account. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` // The ID of the Storage Container. Changing this forces a new resource to be created. @@ -757,6 +772,9 @@ type MetastoresAmbariInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -783,7 +801,7 @@ type MetastoresAmbariParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -800,6 +818,9 @@ type MetastoresHiveInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -826,7 +847,7 @@ type MetastoresHiveParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -843,6 +864,9 @@ type MetastoresOozieInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -869,7 +893,7 @@ type MetastoresOozieParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -922,6 +946,9 @@ type RecurrenceScheduleParameters struct { type RolesHeadNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -1021,6 +1048,9 @@ type RolesWorkerNodeInitParameters struct { // A autoscale block as defined below. Autoscale *WorkerNodeAutoscaleInitParameters `json:"autoscale,omitempty" tf:"autoscale,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -1173,6 +1203,9 @@ type RolesWorkerNodeScriptActionsParameters struct { type RolesZookeeperNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` diff --git a/apis/hdinsight/v1beta2/zz_interactivequerycluster_terraformed.go b/apis/hdinsight/v1beta2/zz_interactivequerycluster_terraformed.go index 5b9634919..9d1aad8dd 100755 --- a/apis/hdinsight/v1beta2/zz_interactivequerycluster_terraformed.go +++ b/apis/hdinsight/v1beta2/zz_interactivequerycluster_terraformed.go @@ -21,7 +21,7 @@ func (mg *InteractiveQueryCluster) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this InteractiveQueryCluster func (tr *InteractiveQueryCluster) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"extension[*].primary_key": "spec.forProvider.extension[*].primaryKeySecretRef", "gateway[*].password": "spec.forProvider.gateway[*].passwordSecretRef", "metastores[*].ambari[*].password": "spec.forProvider.metastores[*].ambari[*].passwordSecretRef", "metastores[*].hive[*].password": "spec.forProvider.metastores[*].hive[*].passwordSecretRef", "metastores[*].oozie[*].password": "spec.forProvider.metastores[*].oozie[*].passwordSecretRef", "monitor[*].primary_key": "spec.forProvider.monitor[*].primaryKeySecretRef", "roles[*].head_node[*].password": "spec.forProvider.roles[*].headNode[*].passwordSecretRef", "roles[*].worker_node[*].password": "spec.forProvider.roles[*].workerNode[*].passwordSecretRef", "roles[*].zookeeper_node[*].password": "spec.forProvider.roles[*].zookeeperNode[*].passwordSecretRef", "security_profile[*].domain_user_password": "spec.forProvider.securityProfile[*].domainUserPasswordSecretRef", "storage_account[*].storage_account_key": "spec.forProvider.storageAccount[*].storageAccountKeySecretRef"} + return map[string]string{"extension[*].primary_key": "extension[*].primaryKeySecretRef", "gateway[*].password": "gateway[*].passwordSecretRef", "metastores[*].ambari[*].password": "metastores[*].ambari[*].passwordSecretRef", "metastores[*].hive[*].password": "metastores[*].hive[*].passwordSecretRef", "metastores[*].oozie[*].password": "metastores[*].oozie[*].passwordSecretRef", "monitor[*].primary_key": "monitor[*].primaryKeySecretRef", "roles[*].head_node[*].password": "roles[*].headNode[*].passwordSecretRef", "roles[*].worker_node[*].password": "roles[*].workerNode[*].passwordSecretRef", "roles[*].zookeeper_node[*].password": "roles[*].zookeeperNode[*].passwordSecretRef", "security_profile[*].domain_user_password": "securityProfile[*].domainUserPasswordSecretRef", "storage_account[*].storage_account_key": "storageAccount[*].storageAccountKeySecretRef"} } // GetObservation of this InteractiveQueryCluster diff --git a/apis/hdinsight/v1beta2/zz_interactivequerycluster_types.go b/apis/hdinsight/v1beta2/zz_interactivequerycluster_types.go index 4e2c08443..3b2dab8b1 100755 --- a/apis/hdinsight/v1beta2/zz_interactivequerycluster_types.go +++ b/apis/hdinsight/v1beta2/zz_interactivequerycluster_types.go @@ -174,6 +174,9 @@ type InteractiveQueryClusterExtensionInitParameters struct { // The workspace ID of the log analytics extension. LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId,omitempty" tf:"log_analytics_workspace_id,omitempty"` + + // The workspace key of the log analytics extension. + PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type InteractiveQueryClusterExtensionObservation struct { @@ -189,12 +192,15 @@ type InteractiveQueryClusterExtensionParameters struct { LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId" tf:"log_analytics_workspace_id,omitempty"` // The workspace key of the log analytics extension. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type InteractiveQueryClusterGatewayInitParameters struct { + // The password used for the Ambari Portal. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username used for the Ambari Portal. Changing this forces a new resource to be created. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -208,7 +214,7 @@ type InteractiveQueryClusterGatewayObservation struct { type InteractiveQueryClusterGatewayParameters struct { // The password used for the Ambari Portal. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username used for the Ambari Portal. Changing this forces a new resource to be created. @@ -279,6 +285,9 @@ type InteractiveQueryClusterMetastoresAmbariInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -305,7 +314,7 @@ type InteractiveQueryClusterMetastoresAmbariParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -322,6 +331,9 @@ type InteractiveQueryClusterMetastoresHiveInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -348,7 +360,7 @@ type InteractiveQueryClusterMetastoresHiveParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -389,6 +401,9 @@ type InteractiveQueryClusterMetastoresOozieInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -415,7 +430,7 @@ type InteractiveQueryClusterMetastoresOozieParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -446,6 +461,9 @@ type InteractiveQueryClusterMonitorInitParameters struct { // The Operations Management Suite (OMS) workspace ID. LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId,omitempty" tf:"log_analytics_workspace_id,omitempty"` + + // The Operations Management Suite (OMS) workspace key. + PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type InteractiveQueryClusterMonitorObservation struct { @@ -461,7 +479,7 @@ type InteractiveQueryClusterMonitorParameters struct { LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId" tf:"log_analytics_workspace_id,omitempty"` // The Operations Management Suite (OMS) workspace key. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } @@ -655,6 +673,9 @@ type InteractiveQueryClusterParameters struct { type InteractiveQueryClusterRolesHeadNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -793,6 +814,9 @@ type InteractiveQueryClusterRolesWorkerNodeInitParameters struct { // A autoscale block as defined below. Autoscale *RolesWorkerNodeAutoscaleInitParameters `json:"autoscale,omitempty" tf:"autoscale,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -945,6 +969,9 @@ type InteractiveQueryClusterRolesWorkerNodeScriptActionsParameters struct { type InteractiveQueryClusterRolesZookeeperNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -1090,6 +1117,9 @@ type InteractiveQueryClusterSecurityProfileInitParameters struct { // The name of the Azure Active Directory Domain. Changing this forces a new resource to be created. DomainName *string `json:"domainName,omitempty" tf:"domain_name,omitempty"` + // The user password of the Azure Active Directory Domain. Changing this forces a new resource to be created. + DomainUserPasswordSecretRef v1.SecretKeySelector `json:"domainUserPasswordSecretRef" tf:"-"` + // The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. DomainUsername *string `json:"domainUsername,omitempty" tf:"domain_username,omitempty"` @@ -1140,7 +1170,7 @@ type InteractiveQueryClusterSecurityProfileParameters struct { DomainName *string `json:"domainName" tf:"domain_name,omitempty"` // The user password of the Azure Active Directory Domain. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional DomainUserPasswordSecretRef v1.SecretKeySelector `json:"domainUserPasswordSecretRef" tf:"-"` // The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. @@ -1211,6 +1241,9 @@ type InteractiveQueryClusterStorageAccountInitParameters struct { // Is this the Default Storage Account for the HDInsight Hadoop Cluster? Changing this forces a new resource to be created. IsDefault *bool `json:"isDefault,omitempty" tf:"is_default,omitempty"` + // The Access Key which should be used to connect to the Storage Account. Changing this forces a new resource to be created. + StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` + // The ID of the Storage Container. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta1.Container // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID() @@ -1247,7 +1280,7 @@ type InteractiveQueryClusterStorageAccountParameters struct { IsDefault *bool `json:"isDefault" tf:"is_default,omitempty"` // The Access Key which should be used to connect to the Storage Account. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` // The ID of the Storage Container. Changing this forces a new resource to be created. diff --git a/apis/hdinsight/v1beta2/zz_kafkacluster_terraformed.go b/apis/hdinsight/v1beta2/zz_kafkacluster_terraformed.go index 69665697a..c567b2ace 100755 --- a/apis/hdinsight/v1beta2/zz_kafkacluster_terraformed.go +++ b/apis/hdinsight/v1beta2/zz_kafkacluster_terraformed.go @@ -21,7 +21,7 @@ func (mg *KafkaCluster) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this KafkaCluster func (tr *KafkaCluster) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"extension[*].primary_key": "spec.forProvider.extension[*].primaryKeySecretRef", "gateway[*].password": "spec.forProvider.gateway[*].passwordSecretRef", "metastores[*].ambari[*].password": "spec.forProvider.metastores[*].ambari[*].passwordSecretRef", "metastores[*].hive[*].password": "spec.forProvider.metastores[*].hive[*].passwordSecretRef", "metastores[*].oozie[*].password": "spec.forProvider.metastores[*].oozie[*].passwordSecretRef", "monitor[*].primary_key": "spec.forProvider.monitor[*].primaryKeySecretRef", "roles[*].head_node[*].password": "spec.forProvider.roles[*].headNode[*].passwordSecretRef", "roles[*].kafka_management_node[*].password": "spec.forProvider.roles[*].kafkaManagementNode[*].passwordSecretRef", "roles[*].worker_node[*].password": "spec.forProvider.roles[*].workerNode[*].passwordSecretRef", "roles[*].zookeeper_node[*].password": "spec.forProvider.roles[*].zookeeperNode[*].passwordSecretRef", "security_profile[*].domain_user_password": "spec.forProvider.securityProfile[*].domainUserPasswordSecretRef", "storage_account[*].storage_account_key": "spec.forProvider.storageAccount[*].storageAccountKeySecretRef"} + return map[string]string{"extension[*].primary_key": "extension[*].primaryKeySecretRef", "gateway[*].password": "gateway[*].passwordSecretRef", "metastores[*].ambari[*].password": "metastores[*].ambari[*].passwordSecretRef", "metastores[*].hive[*].password": "metastores[*].hive[*].passwordSecretRef", "metastores[*].oozie[*].password": "metastores[*].oozie[*].passwordSecretRef", "monitor[*].primary_key": "monitor[*].primaryKeySecretRef", "roles[*].head_node[*].password": "roles[*].headNode[*].passwordSecretRef", "roles[*].kafka_management_node[*].password": "roles[*].kafkaManagementNode[*].passwordSecretRef", "roles[*].worker_node[*].password": "roles[*].workerNode[*].passwordSecretRef", "roles[*].zookeeper_node[*].password": "roles[*].zookeeperNode[*].passwordSecretRef", "security_profile[*].domain_user_password": "securityProfile[*].domainUserPasswordSecretRef", "storage_account[*].storage_account_key": "storageAccount[*].storageAccountKeySecretRef"} } // GetObservation of this KafkaCluster diff --git a/apis/hdinsight/v1beta2/zz_kafkacluster_types.go b/apis/hdinsight/v1beta2/zz_kafkacluster_types.go index 917f5c642..eb352631e 100755 --- a/apis/hdinsight/v1beta2/zz_kafkacluster_types.go +++ b/apis/hdinsight/v1beta2/zz_kafkacluster_types.go @@ -114,6 +114,9 @@ type KafkaClusterExtensionInitParameters struct { // The workspace ID of the log analytics extension. LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId,omitempty" tf:"log_analytics_workspace_id,omitempty"` + + // The workspace key of the log analytics extension. + PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type KafkaClusterExtensionObservation struct { @@ -129,12 +132,15 @@ type KafkaClusterExtensionParameters struct { LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId" tf:"log_analytics_workspace_id,omitempty"` // The workspace key of the log analytics extension. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type KafkaClusterGatewayInitParameters struct { + // The password used for the Ambari Portal. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username used for the Ambari Portal. Changing this forces a new resource to be created. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -148,7 +154,7 @@ type KafkaClusterGatewayObservation struct { type KafkaClusterGatewayParameters struct { // The password used for the Ambari Portal. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username used for the Ambari Portal. Changing this forces a new resource to be created. @@ -222,6 +228,9 @@ type KafkaClusterMetastoresAmbariInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -248,7 +257,7 @@ type KafkaClusterMetastoresAmbariParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -265,6 +274,9 @@ type KafkaClusterMetastoresHiveInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -291,7 +303,7 @@ type KafkaClusterMetastoresHiveParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -332,6 +344,9 @@ type KafkaClusterMetastoresOozieInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -358,7 +373,7 @@ type KafkaClusterMetastoresOozieParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -389,6 +404,9 @@ type KafkaClusterMonitorInitParameters struct { // The Operations Management Suite (OMS) workspace ID. LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId,omitempty" tf:"log_analytics_workspace_id,omitempty"` + + // The Operations Management Suite (OMS) workspace key. + PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type KafkaClusterMonitorObservation struct { @@ -404,7 +422,7 @@ type KafkaClusterMonitorParameters struct { LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId" tf:"log_analytics_workspace_id,omitempty"` // The Operations Management Suite (OMS) workspace key. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } @@ -608,6 +626,9 @@ type KafkaClusterParameters struct { type KafkaClusterRolesHeadNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -795,6 +816,9 @@ type KafkaClusterRolesWorkerNodeInitParameters struct { // The number of Data Disks which should be assigned to each Worker Node, which can be between 1 and 8. Changing this forces a new resource to be created. NumberOfDisksPerNode *float64 `json:"numberOfDisksPerNode,omitempty" tf:"number_of_disks_per_node,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -947,6 +971,9 @@ type KafkaClusterRolesWorkerNodeScriptActionsParameters struct { type KafkaClusterRolesZookeeperNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -1092,6 +1119,9 @@ type KafkaClusterSecurityProfileInitParameters struct { // The name of the Azure Active Directory Domain. Changing this forces a new resource to be created. DomainName *string `json:"domainName,omitempty" tf:"domain_name,omitempty"` + // The user password of the Azure Active Directory Domain. Changing this forces a new resource to be created. + DomainUserPasswordSecretRef v1.SecretKeySelector `json:"domainUserPasswordSecretRef" tf:"-"` + // The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. DomainUsername *string `json:"domainUsername,omitempty" tf:"domain_username,omitempty"` @@ -1142,7 +1172,7 @@ type KafkaClusterSecurityProfileParameters struct { DomainName *string `json:"domainName" tf:"domain_name,omitempty"` // The user password of the Azure Active Directory Domain. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional DomainUserPasswordSecretRef v1.SecretKeySelector `json:"domainUserPasswordSecretRef" tf:"-"` // The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. @@ -1213,6 +1243,9 @@ type KafkaClusterStorageAccountInitParameters struct { // Is this the Default Storage Account for the HDInsight Hadoop Cluster? Changing this forces a new resource to be created. IsDefault *bool `json:"isDefault,omitempty" tf:"is_default,omitempty"` + // The Access Key which should be used to connect to the Storage Account. Changing this forces a new resource to be created. + StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` + // The ID of the Storage Container. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta1.Container // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID() @@ -1249,7 +1282,7 @@ type KafkaClusterStorageAccountParameters struct { IsDefault *bool `json:"isDefault" tf:"is_default,omitempty"` // The Access Key which should be used to connect to the Storage Account. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` // The ID of the Storage Container. Changing this forces a new resource to be created. @@ -1273,6 +1306,9 @@ type KafkaClusterStorageAccountParameters struct { type KafkaManagementNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` diff --git a/apis/hdinsight/v1beta2/zz_sparkcluster_terraformed.go b/apis/hdinsight/v1beta2/zz_sparkcluster_terraformed.go index 8be1a8f08..421eba2cd 100755 --- a/apis/hdinsight/v1beta2/zz_sparkcluster_terraformed.go +++ b/apis/hdinsight/v1beta2/zz_sparkcluster_terraformed.go @@ -21,7 +21,7 @@ func (mg *SparkCluster) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this SparkCluster func (tr *SparkCluster) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"extension[*].primary_key": "spec.forProvider.extension[*].primaryKeySecretRef", "gateway[*].password": "spec.forProvider.gateway[*].passwordSecretRef", "metastores[*].ambari[*].password": "spec.forProvider.metastores[*].ambari[*].passwordSecretRef", "metastores[*].hive[*].password": "spec.forProvider.metastores[*].hive[*].passwordSecretRef", "metastores[*].oozie[*].password": "spec.forProvider.metastores[*].oozie[*].passwordSecretRef", "monitor[*].primary_key": "spec.forProvider.monitor[*].primaryKeySecretRef", "roles[*].head_node[*].password": "spec.forProvider.roles[*].headNode[*].passwordSecretRef", "roles[*].worker_node[*].password": "spec.forProvider.roles[*].workerNode[*].passwordSecretRef", "roles[*].zookeeper_node[*].password": "spec.forProvider.roles[*].zookeeperNode[*].passwordSecretRef", "security_profile[*].domain_user_password": "spec.forProvider.securityProfile[*].domainUserPasswordSecretRef", "storage_account[*].storage_account_key": "spec.forProvider.storageAccount[*].storageAccountKeySecretRef"} + return map[string]string{"extension[*].primary_key": "extension[*].primaryKeySecretRef", "gateway[*].password": "gateway[*].passwordSecretRef", "metastores[*].ambari[*].password": "metastores[*].ambari[*].passwordSecretRef", "metastores[*].hive[*].password": "metastores[*].hive[*].passwordSecretRef", "metastores[*].oozie[*].password": "metastores[*].oozie[*].passwordSecretRef", "monitor[*].primary_key": "monitor[*].primaryKeySecretRef", "roles[*].head_node[*].password": "roles[*].headNode[*].passwordSecretRef", "roles[*].worker_node[*].password": "roles[*].workerNode[*].passwordSecretRef", "roles[*].zookeeper_node[*].password": "roles[*].zookeeperNode[*].passwordSecretRef", "security_profile[*].domain_user_password": "securityProfile[*].domainUserPasswordSecretRef", "storage_account[*].storage_account_key": "storageAccount[*].storageAccountKeySecretRef"} } // GetObservation of this SparkCluster diff --git a/apis/hdinsight/v1beta2/zz_sparkcluster_types.go b/apis/hdinsight/v1beta2/zz_sparkcluster_types.go index 3b97a2a44..e5fc86957 100755 --- a/apis/hdinsight/v1beta2/zz_sparkcluster_types.go +++ b/apis/hdinsight/v1beta2/zz_sparkcluster_types.go @@ -143,6 +143,9 @@ type SparkClusterExtensionInitParameters struct { // The workspace ID of the log analytics extension. LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId,omitempty" tf:"log_analytics_workspace_id,omitempty"` + + // The workspace key of the log analytics extension. + PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type SparkClusterExtensionObservation struct { @@ -158,12 +161,15 @@ type SparkClusterExtensionParameters struct { LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId" tf:"log_analytics_workspace_id,omitempty"` // The workspace key of the log analytics extension. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type SparkClusterGatewayInitParameters struct { + // The password used for the Ambari Portal. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username used for the Ambari Portal. Changing this forces a new resource to be created. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -177,7 +183,7 @@ type SparkClusterGatewayObservation struct { type SparkClusterGatewayParameters struct { // The password used for the Ambari Portal. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username used for the Ambari Portal. Changing this forces a new resource to be created. @@ -248,6 +254,9 @@ type SparkClusterMetastoresAmbariInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -274,7 +283,7 @@ type SparkClusterMetastoresAmbariParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -291,6 +300,9 @@ type SparkClusterMetastoresHiveInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -317,7 +329,7 @@ type SparkClusterMetastoresHiveParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -358,6 +370,9 @@ type SparkClusterMetastoresOozieInitParameters struct { // The external Oozie metastore's existing SQL database. Changing this forces a new resource to be created. DatabaseName *string `json:"databaseName,omitempty" tf:"database_name,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` @@ -384,7 +399,7 @@ type SparkClusterMetastoresOozieParameters struct { DatabaseName *string `json:"databaseName" tf:"database_name,omitempty"` // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. Changing this forces a new resource to be created. @@ -415,6 +430,9 @@ type SparkClusterMonitorInitParameters struct { // The Operations Management Suite (OMS) workspace ID. LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId,omitempty" tf:"log_analytics_workspace_id,omitempty"` + + // The Operations Management Suite (OMS) workspace key. + PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } type SparkClusterMonitorObservation struct { @@ -430,7 +448,7 @@ type SparkClusterMonitorParameters struct { LogAnalyticsWorkspaceID *string `json:"logAnalyticsWorkspaceId" tf:"log_analytics_workspace_id,omitempty"` // The Operations Management Suite (OMS) workspace key. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PrimaryKeySecretRef v1.SecretKeySelector `json:"primaryKeySecretRef" tf:"-"` } @@ -624,6 +642,9 @@ type SparkClusterParameters struct { type SparkClusterRolesHeadNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -830,6 +851,9 @@ type SparkClusterRolesWorkerNodeInitParameters struct { // A autoscale block as defined below. Autoscale *SparkClusterRolesWorkerNodeAutoscaleInitParameters `json:"autoscale,omitempty" tf:"autoscale,omitempty"` + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -982,6 +1006,9 @@ type SparkClusterRolesWorkerNodeScriptActionsParameters struct { type SparkClusterRolesZookeeperNodeInitParameters struct { + // The Password associated with the local administrator for the Zookeeper Nodes. Changing this forces a new resource to be created. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // A list of SSH Keys which should be used for the local administrator on the Zookeeper Nodes. Changing this forces a new resource to be created. // +listType=set SSHKeys []*string `json:"sshKeys,omitempty" tf:"ssh_keys,omitempty"` @@ -1127,6 +1154,9 @@ type SparkClusterSecurityProfileInitParameters struct { // The name of the Azure Active Directory Domain. Changing this forces a new resource to be created. DomainName *string `json:"domainName,omitempty" tf:"domain_name,omitempty"` + // The user password of the Azure Active Directory Domain. Changing this forces a new resource to be created. + DomainUserPasswordSecretRef v1.SecretKeySelector `json:"domainUserPasswordSecretRef" tf:"-"` + // The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. DomainUsername *string `json:"domainUsername,omitempty" tf:"domain_username,omitempty"` @@ -1177,7 +1207,7 @@ type SparkClusterSecurityProfileParameters struct { DomainName *string `json:"domainName" tf:"domain_name,omitempty"` // The user password of the Azure Active Directory Domain. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional DomainUserPasswordSecretRef v1.SecretKeySelector `json:"domainUserPasswordSecretRef" tf:"-"` // The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. @@ -1248,6 +1278,9 @@ type SparkClusterStorageAccountInitParameters struct { // Is this the Default Storage Account for the HDInsight Hadoop Cluster? Changing this forces a new resource to be created. IsDefault *bool `json:"isDefault,omitempty" tf:"is_default,omitempty"` + // The Access Key which should be used to connect to the Storage Account. Changing this forces a new resource to be created. + StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` + // The ID of the Storage Container. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta1.Container // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID() @@ -1284,7 +1317,7 @@ type SparkClusterStorageAccountParameters struct { IsDefault *bool `json:"isDefault" tf:"is_default,omitempty"` // The Access Key which should be used to connect to the Storage Account. Changing this forces a new resource to be created. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` // The ID of the Storage Container. Changing this forces a new resource to be created. diff --git a/apis/keyvault/v1beta1/zz_certificateissuer_terraformed.go b/apis/keyvault/v1beta1/zz_certificateissuer_terraformed.go index 6c8c1eb8f..797ff3e12 100755 --- a/apis/keyvault/v1beta1/zz_certificateissuer_terraformed.go +++ b/apis/keyvault/v1beta1/zz_certificateissuer_terraformed.go @@ -21,7 +21,7 @@ func (mg *CertificateIssuer) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this CertificateIssuer func (tr *CertificateIssuer) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this CertificateIssuer diff --git a/apis/keyvault/v1beta1/zz_certificateissuer_types.go b/apis/keyvault/v1beta1/zz_certificateissuer_types.go index e1350da47..c618f8572 100755 --- a/apis/keyvault/v1beta1/zz_certificateissuer_types.go +++ b/apis/keyvault/v1beta1/zz_certificateissuer_types.go @@ -86,6 +86,9 @@ type CertificateIssuerInitParameters struct { // The ID of the organization as provided to the issuer. OrgID *string `json:"orgId,omitempty" tf:"org_id,omitempty"` + // The password associated with the account and organization ID at the third-party Certificate Issuer. If not specified, will not overwrite any previous value. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // The name of the third-party Certificate Issuer. Possible values are: DigiCert, GlobalSign, OneCertV2-PrivateCA, OneCertV2-PublicCA and SslAdminV2. ProviderName *string `json:"providerName,omitempty" tf:"provider_name,omitempty"` } diff --git a/apis/keyvault/v1beta1/zz_generated.deepcopy.go b/apis/keyvault/v1beta1/zz_generated.deepcopy.go index 5fc988b16..78056ce36 100644 --- a/apis/keyvault/v1beta1/zz_generated.deepcopy.go +++ b/apis/keyvault/v1beta1/zz_generated.deepcopy.go @@ -1281,6 +1281,11 @@ func (in *CertificateIssuerInitParameters) DeepCopyInto(out *CertificateIssuerIn *out = new(string) **out = **in } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ProviderName != nil { in, out := &in.ProviderName, &out.ProviderName *out = new(string) @@ -4012,6 +4017,7 @@ func (in *SecretInitParameters) DeepCopyInto(out *SecretInitParameters) { (*out)[key] = outVal } } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SecretInitParameters. diff --git a/apis/keyvault/v1beta1/zz_secret_terraformed.go b/apis/keyvault/v1beta1/zz_secret_terraformed.go index 5c13eb277..a0d2bca74 100755 --- a/apis/keyvault/v1beta1/zz_secret_terraformed.go +++ b/apis/keyvault/v1beta1/zz_secret_terraformed.go @@ -21,7 +21,7 @@ func (mg *Secret) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Secret func (tr *Secret) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"value": "spec.forProvider.valueSecretRef"} + return map[string]string{"value": "valueSecretRef"} } // GetObservation of this Secret diff --git a/apis/keyvault/v1beta1/zz_secret_types.go b/apis/keyvault/v1beta1/zz_secret_types.go index 2b142ac01..f814ff20e 100755 --- a/apis/keyvault/v1beta1/zz_secret_types.go +++ b/apis/keyvault/v1beta1/zz_secret_types.go @@ -43,6 +43,9 @@ type SecretInitParameters struct { // A mapping of tags to assign to the resource. // +mapType=granular Tags map[string]*string `json:"tags,omitempty" tf:"tags,omitempty"` + + // Specifies the value of the Key Vault Secret. Changing this will create a new version of the Key Vault Secret. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type SecretObservation struct { diff --git a/apis/keyvault/v1beta2/zz_certificate_terraformed.go b/apis/keyvault/v1beta2/zz_certificate_terraformed.go index 7dec14e3d..289b74c50 100755 --- a/apis/keyvault/v1beta2/zz_certificate_terraformed.go +++ b/apis/keyvault/v1beta2/zz_certificate_terraformed.go @@ -21,7 +21,7 @@ func (mg *Certificate) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Certificate func (tr *Certificate) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"certificate[*].contents": "spec.forProvider.certificate[*].contentsSecretRef", "certificate[*].password": "spec.forProvider.certificate[*].passwordSecretRef"} + return map[string]string{"certificate[*].contents": "certificate[*].contentsSecretRef", "certificate[*].password": "certificate[*].passwordSecretRef"} } // GetObservation of this Certificate diff --git a/apis/keyvault/v1beta2/zz_certificate_types.go b/apis/keyvault/v1beta2/zz_certificate_types.go index 4a77970d8..7372f098f 100755 --- a/apis/keyvault/v1beta2/zz_certificate_types.go +++ b/apis/keyvault/v1beta2/zz_certificate_types.go @@ -60,6 +60,12 @@ type CertificateAttributeParameters struct { } type CertificateCertificateInitParameters struct { + + // The base64-encoded certificate contents. + ContentsSecretRef v1.SecretKeySelector `json:"contentsSecretRef" tf:"-"` + + // The password associated with the certificate. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` } type CertificateCertificateObservation struct { @@ -68,7 +74,7 @@ type CertificateCertificateObservation struct { type CertificateCertificateParameters struct { // The base64-encoded certificate contents. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ContentsSecretRef v1.SecretKeySelector `json:"contentsSecretRef" tf:"-"` // The password associated with the certificate. diff --git a/apis/keyvault/v1beta2/zz_generated.deepcopy.go b/apis/keyvault/v1beta2/zz_generated.deepcopy.go index df34027c4..db01aee80 100644 --- a/apis/keyvault/v1beta2/zz_generated.deepcopy.go +++ b/apis/keyvault/v1beta2/zz_generated.deepcopy.go @@ -357,6 +357,12 @@ func (in *CertificateAttributeParameters) DeepCopy() *CertificateAttributeParame // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *CertificateCertificateInitParameters) DeepCopyInto(out *CertificateCertificateInitParameters) { *out = *in + out.ContentsSecretRef = in.ContentsSecretRef + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new CertificateCertificateInitParameters. @@ -411,7 +417,7 @@ func (in *CertificateInitParameters) DeepCopyInto(out *CertificateInitParameters if in.Certificate != nil { in, out := &in.Certificate, &out.Certificate *out = new(CertificateCertificateInitParameters) - **out = **in + (*in).DeepCopyInto(*out) } if in.CertificatePolicy != nil { in, out := &in.CertificatePolicy, &out.CertificatePolicy diff --git a/apis/labservices/v1beta2/zz_generated.deepcopy.go b/apis/labservices/v1beta2/zz_generated.deepcopy.go index ff60f289f..335c97a19 100644 --- a/apis/labservices/v1beta2/zz_generated.deepcopy.go +++ b/apis/labservices/v1beta2/zz_generated.deepcopy.go @@ -16,6 +16,7 @@ import ( // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *AdminUserInitParameters) DeepCopyInto(out *AdminUserInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -1394,6 +1395,7 @@ func (in *NetworkParameters) DeepCopy() *NetworkParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *NonAdminUserInitParameters) DeepCopyInto(out *NonAdminUserInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) diff --git a/apis/labservices/v1beta2/zz_labservicelab_terraformed.go b/apis/labservices/v1beta2/zz_labservicelab_terraformed.go index 31b439bab..105199dc2 100755 --- a/apis/labservices/v1beta2/zz_labservicelab_terraformed.go +++ b/apis/labservices/v1beta2/zz_labservicelab_terraformed.go @@ -21,7 +21,7 @@ func (mg *LabServiceLab) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LabServiceLab func (tr *LabServiceLab) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"virtual_machine[*].admin_user[*].password": "spec.forProvider.virtualMachine[*].adminUser[*].passwordSecretRef", "virtual_machine[*].non_admin_user[*].password": "spec.forProvider.virtualMachine[*].nonAdminUser[*].passwordSecretRef"} + return map[string]string{"virtual_machine[*].admin_user[*].password": "virtualMachine[*].adminUser[*].passwordSecretRef", "virtual_machine[*].non_admin_user[*].password": "virtualMachine[*].nonAdminUser[*].passwordSecretRef"} } // GetObservation of this LabServiceLab diff --git a/apis/labservices/v1beta2/zz_labservicelab_types.go b/apis/labservices/v1beta2/zz_labservicelab_types.go index 2889c8064..eba601f4f 100755 --- a/apis/labservices/v1beta2/zz_labservicelab_types.go +++ b/apis/labservices/v1beta2/zz_labservicelab_types.go @@ -15,6 +15,9 @@ import ( type AdminUserInitParameters struct { + // The password for the user. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username to use when signing in to Lab Service Lab VMs. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -28,7 +31,7 @@ type AdminUserObservation struct { type AdminUserParameters struct { // The password for the user. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username to use when signing in to Lab Service Lab VMs. @@ -361,6 +364,9 @@ type NetworkParameters struct { type NonAdminUserInitParameters struct { + // The password for the user. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username to use when signing in to Lab Service Lab VMs. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -374,7 +380,7 @@ type NonAdminUserObservation struct { type NonAdminUserParameters struct { // The password for the user. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username to use when signing in to Lab Service Lab VMs. diff --git a/apis/media/v1beta2/zz_contentkeypolicy_terraformed.go b/apis/media/v1beta2/zz_contentkeypolicy_terraformed.go index 12fb92a70..08122faac 100755 --- a/apis/media/v1beta2/zz_contentkeypolicy_terraformed.go +++ b/apis/media/v1beta2/zz_contentkeypolicy_terraformed.go @@ -21,7 +21,7 @@ func (mg *ContentKeyPolicy) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this ContentKeyPolicy func (tr *ContentKeyPolicy) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"policy_option[*].fairplay_configuration[*].ask": "spec.forProvider.policyOption[*].fairplayConfiguration[*].askSecretRef", "policy_option[*].fairplay_configuration[*].pfx": "spec.forProvider.policyOption[*].fairplayConfiguration[*].pfxSecretRef", "policy_option[*].fairplay_configuration[*].pfx_password": "spec.forProvider.policyOption[*].fairplayConfiguration[*].pfxPasswordSecretRef", "policy_option[*].playready_configuration_license[*].grace_period": "spec.forProvider.policyOption[*].playreadyConfigurationLicense[*].gracePeriodSecretRef", "policy_option[*].token_restriction[*].alternate_key[*].rsa_token_key_exponent": "spec.forProvider.policyOption[*].tokenRestriction[*].alternateKey[*].rsaTokenKeyExponentSecretRef", "policy_option[*].token_restriction[*].alternate_key[*].rsa_token_key_modulus": "spec.forProvider.policyOption[*].tokenRestriction[*].alternateKey[*].rsaTokenKeyModulusSecretRef", "policy_option[*].token_restriction[*].alternate_key[*].symmetric_token_key": "spec.forProvider.policyOption[*].tokenRestriction[*].alternateKey[*].symmetricTokenKeySecretRef", "policy_option[*].token_restriction[*].alternate_key[*].x509_token_key_raw": "spec.forProvider.policyOption[*].tokenRestriction[*].alternateKey[*].x509TokenKeyRawSecretRef", "policy_option[*].token_restriction[*].primary_rsa_token_key_exponent": "spec.forProvider.policyOption[*].tokenRestriction[*].primaryRsaTokenKeyExponentSecretRef", "policy_option[*].token_restriction[*].primary_rsa_token_key_modulus": "spec.forProvider.policyOption[*].tokenRestriction[*].primaryRsaTokenKeyModulusSecretRef", "policy_option[*].token_restriction[*].primary_symmetric_token_key": "spec.forProvider.policyOption[*].tokenRestriction[*].primarySymmetricTokenKeySecretRef", "policy_option[*].token_restriction[*].primary_x509_token_key_raw": "spec.forProvider.policyOption[*].tokenRestriction[*].primaryX509TokenKeyRawSecretRef"} + return map[string]string{"policy_option[*].fairplay_configuration[*].ask": "policyOption[*].fairplayConfiguration[*].askSecretRef", "policy_option[*].fairplay_configuration[*].pfx": "policyOption[*].fairplayConfiguration[*].pfxSecretRef", "policy_option[*].fairplay_configuration[*].pfx_password": "policyOption[*].fairplayConfiguration[*].pfxPasswordSecretRef", "policy_option[*].playready_configuration_license[*].grace_period": "policyOption[*].playreadyConfigurationLicense[*].gracePeriodSecretRef", "policy_option[*].token_restriction[*].alternate_key[*].rsa_token_key_exponent": "policyOption[*].tokenRestriction[*].alternateKey[*].rsaTokenKeyExponentSecretRef", "policy_option[*].token_restriction[*].alternate_key[*].rsa_token_key_modulus": "policyOption[*].tokenRestriction[*].alternateKey[*].rsaTokenKeyModulusSecretRef", "policy_option[*].token_restriction[*].alternate_key[*].symmetric_token_key": "policyOption[*].tokenRestriction[*].alternateKey[*].symmetricTokenKeySecretRef", "policy_option[*].token_restriction[*].alternate_key[*].x509_token_key_raw": "policyOption[*].tokenRestriction[*].alternateKey[*].x509TokenKeyRawSecretRef", "policy_option[*].token_restriction[*].primary_rsa_token_key_exponent": "policyOption[*].tokenRestriction[*].primaryRsaTokenKeyExponentSecretRef", "policy_option[*].token_restriction[*].primary_rsa_token_key_modulus": "policyOption[*].tokenRestriction[*].primaryRsaTokenKeyModulusSecretRef", "policy_option[*].token_restriction[*].primary_symmetric_token_key": "policyOption[*].tokenRestriction[*].primarySymmetricTokenKeySecretRef", "policy_option[*].token_restriction[*].primary_x509_token_key_raw": "policyOption[*].tokenRestriction[*].primaryX509TokenKeyRawSecretRef"} } // GetObservation of this ContentKeyPolicy diff --git a/apis/media/v1beta2/zz_contentkeypolicy_types.go b/apis/media/v1beta2/zz_contentkeypolicy_types.go index dfd723d62..099447d6d 100755 --- a/apis/media/v1beta2/zz_contentkeypolicy_types.go +++ b/apis/media/v1beta2/zz_contentkeypolicy_types.go @@ -14,6 +14,18 @@ import ( ) type AlternateKeyInitParameters struct { + + // The RSA parameter exponent. + RsaTokenKeyExponentSecretRef *v1.SecretKeySelector `json:"rsaTokenKeyExponentSecretRef,omitempty" tf:"-"` + + // The RSA parameter modulus. + RsaTokenKeyModulusSecretRef *v1.SecretKeySelector `json:"rsaTokenKeyModulusSecretRef,omitempty" tf:"-"` + + // The key value of the key. Specifies a symmetric key for token validation. + SymmetricTokenKeySecretRef *v1.SecretKeySelector `json:"symmetricTokenKeySecretRef,omitempty" tf:"-"` + + // The raw data field of a certificate in PKCS 12 format (X509Certificate2 in .NET). Specifies a certificate for token validation. + X509TokenKeyRawSecretRef *v1.SecretKeySelector `json:"x509TokenKeyRawSecretRef,omitempty" tf:"-"` } type AlternateKeyObservation struct { @@ -133,9 +145,18 @@ type ExplicitAnalogTelevisionOutputRestrictionParameters struct { type FairplayConfigurationInitParameters struct { + // The key that must be used as FairPlay Application Secret key. + AskSecretRef *v1.SecretKeySelector `json:"askSecretRef,omitempty" tf:"-"` + // A offline_rental_configuration block as defined below. OfflineRentalConfiguration *OfflineRentalConfigurationInitParameters `json:"offlineRentalConfiguration,omitempty" tf:"offline_rental_configuration,omitempty"` + // The password encrypting FairPlay certificate in PKCS 12 (pfx) format. + PfxPasswordSecretRef *v1.SecretKeySelector `json:"pfxPasswordSecretRef,omitempty" tf:"-"` + + // The Base64 representation of FairPlay certificate in PKCS 12 (pfx) format (including private key). + PfxSecretRef *v1.SecretKeySelector `json:"pfxSecretRef,omitempty" tf:"-"` + // The rental and lease key type. Supported values are DualExpiry, PersistentLimited, PersistentUnlimited or Undefined. RentalAndLeaseKeyType *string `json:"rentalAndLeaseKeyType,omitempty" tf:"rental_and_lease_key_type,omitempty"` @@ -370,6 +391,9 @@ type PlayreadyConfigurationLicenseInitParameters struct { // The expiration date of license. ExpirationDate *string `json:"expirationDate,omitempty" tf:"expiration_date,omitempty"` + // The grace period of license. + GracePeriodSecretRef *v1.SecretKeySelector `json:"gracePeriodSecretRef,omitempty" tf:"-"` + // The license type. Supported values are NonPersistent or Persistent. LicenseType *string `json:"licenseType,omitempty" tf:"license_type,omitempty"` @@ -605,6 +629,18 @@ type TokenRestrictionInitParameters struct { // The OpenID connect discovery document. OpenIDConnectDiscoveryDocument *string `json:"openIdConnectDiscoveryDocument,omitempty" tf:"open_id_connect_discovery_document,omitempty"` + // The RSA parameter exponent. + PrimaryRsaTokenKeyExponentSecretRef *v1.SecretKeySelector `json:"primaryRsaTokenKeyExponentSecretRef,omitempty" tf:"-"` + + // The RSA parameter modulus. + PrimaryRsaTokenKeyModulusSecretRef *v1.SecretKeySelector `json:"primaryRsaTokenKeyModulusSecretRef,omitempty" tf:"-"` + + // The key value of the key. Specifies a symmetric key for token validation. + PrimarySymmetricTokenKeySecretRef *v1.SecretKeySelector `json:"primarySymmetricTokenKeySecretRef,omitempty" tf:"-"` + + // The raw data field of a certificate in PKCS 12 format (X509Certificate2 in .NET). Specifies a certificate for token validation. + PrimaryX509TokenKeyRawSecretRef *v1.SecretKeySelector `json:"primaryX509TokenKeyRawSecretRef,omitempty" tf:"-"` + // One or more required_claim blocks as defined above. RequiredClaim []RequiredClaimInitParameters `json:"requiredClaim,omitempty" tf:"required_claim,omitempty"` diff --git a/apis/media/v1beta2/zz_generated.deepcopy.go b/apis/media/v1beta2/zz_generated.deepcopy.go index 90327453c..2dcccdf18 100644 --- a/apis/media/v1beta2/zz_generated.deepcopy.go +++ b/apis/media/v1beta2/zz_generated.deepcopy.go @@ -313,6 +313,26 @@ func (in *AkamaiSignatureHeaderAuthenticationKeyParameters) DeepCopy() *AkamaiSi // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *AlternateKeyInitParameters) DeepCopyInto(out *AlternateKeyInitParameters) { *out = *in + if in.RsaTokenKeyExponentSecretRef != nil { + in, out := &in.RsaTokenKeyExponentSecretRef, &out.RsaTokenKeyExponentSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.RsaTokenKeyModulusSecretRef != nil { + in, out := &in.RsaTokenKeyModulusSecretRef, &out.RsaTokenKeyModulusSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.SymmetricTokenKeySecretRef != nil { + in, out := &in.SymmetricTokenKeySecretRef, &out.SymmetricTokenKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.X509TokenKeyRawSecretRef != nil { + in, out := &in.X509TokenKeyRawSecretRef, &out.X509TokenKeyRawSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AlternateKeyInitParameters. @@ -4118,11 +4138,26 @@ func (in *FadeOutParameters) DeepCopy() *FadeOutParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *FairplayConfigurationInitParameters) DeepCopyInto(out *FairplayConfigurationInitParameters) { *out = *in + if in.AskSecretRef != nil { + in, out := &in.AskSecretRef, &out.AskSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.OfflineRentalConfiguration != nil { in, out := &in.OfflineRentalConfiguration, &out.OfflineRentalConfiguration *out = new(OfflineRentalConfigurationInitParameters) (*in).DeepCopyInto(*out) } + if in.PfxPasswordSecretRef != nil { + in, out := &in.PfxPasswordSecretRef, &out.PfxPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.PfxSecretRef != nil { + in, out := &in.PfxSecretRef, &out.PfxSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.RentalAndLeaseKeyType != nil { in, out := &in.RentalAndLeaseKeyType, &out.RentalAndLeaseKeyType *out = new(string) @@ -7968,6 +8003,11 @@ func (in *PlayreadyConfigurationLicenseInitParameters) DeepCopyInto(out *Playrea *out = new(string) **out = **in } + if in.GracePeriodSecretRef != nil { + in, out := &in.GracePeriodSecretRef, &out.GracePeriodSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.LicenseType != nil { in, out := &in.LicenseType, &out.LicenseType *out = new(string) @@ -11151,7 +11191,9 @@ func (in *TokenRestrictionInitParameters) DeepCopyInto(out *TokenRestrictionInit if in.AlternateKey != nil { in, out := &in.AlternateKey, &out.AlternateKey *out = make([]AlternateKeyInitParameters, len(*in)) - copy(*out, *in) + for i := range *in { + (*in)[i].DeepCopyInto(&(*out)[i]) + } } if in.Audience != nil { in, out := &in.Audience, &out.Audience @@ -11168,6 +11210,26 @@ func (in *TokenRestrictionInitParameters) DeepCopyInto(out *TokenRestrictionInit *out = new(string) **out = **in } + if in.PrimaryRsaTokenKeyExponentSecretRef != nil { + in, out := &in.PrimaryRsaTokenKeyExponentSecretRef, &out.PrimaryRsaTokenKeyExponentSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.PrimaryRsaTokenKeyModulusSecretRef != nil { + in, out := &in.PrimaryRsaTokenKeyModulusSecretRef, &out.PrimaryRsaTokenKeyModulusSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.PrimarySymmetricTokenKeySecretRef != nil { + in, out := &in.PrimarySymmetricTokenKeySecretRef, &out.PrimarySymmetricTokenKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.PrimaryX509TokenKeyRawSecretRef != nil { + in, out := &in.PrimaryX509TokenKeyRawSecretRef, &out.PrimaryX509TokenKeyRawSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.RequiredClaim != nil { in, out := &in.RequiredClaim, &out.RequiredClaim *out = make([]RequiredClaimInitParameters, len(*in)) diff --git a/apis/netapp/v1beta2/zz_account_terraformed.go b/apis/netapp/v1beta2/zz_account_terraformed.go index 0be7cb676..93fa36669 100755 --- a/apis/netapp/v1beta2/zz_account_terraformed.go +++ b/apis/netapp/v1beta2/zz_account_terraformed.go @@ -21,7 +21,7 @@ func (mg *Account) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Account func (tr *Account) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"active_directory[*].password": "spec.forProvider.activeDirectory[*].passwordSecretRef"} + return map[string]string{"active_directory[*].password": "activeDirectory[*].passwordSecretRef"} } // GetObservation of this Account diff --git a/apis/netapp/v1beta2/zz_account_types.go b/apis/netapp/v1beta2/zz_account_types.go index 8e1037c74..06a85b0be 100755 --- a/apis/netapp/v1beta2/zz_account_types.go +++ b/apis/netapp/v1beta2/zz_account_types.go @@ -95,6 +95,9 @@ type ActiveDirectoryInitParameters struct { // The Organizational Unit (OU) within the Active Directory Domain. OrganizationalUnit *string `json:"organizationalUnit,omitempty" tf:"organizational_unit,omitempty"` + // The password associated with the username. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes. SMBServerName *string `json:"smbServerName,omitempty" tf:"smb_server_name,omitempty"` @@ -135,7 +138,7 @@ type ActiveDirectoryParameters struct { OrganizationalUnit *string `json:"organizationalUnit,omitempty" tf:"organizational_unit,omitempty"` // The password associated with the username. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer account in the AD and used to mount volumes. diff --git a/apis/netapp/v1beta2/zz_generated.deepcopy.go b/apis/netapp/v1beta2/zz_generated.deepcopy.go index 70b215e83..b8fc1ffb5 100644 --- a/apis/netapp/v1beta2/zz_generated.deepcopy.go +++ b/apis/netapp/v1beta2/zz_generated.deepcopy.go @@ -294,6 +294,7 @@ func (in *ActiveDirectoryInitParameters) DeepCopyInto(out *ActiveDirectoryInitPa *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.SMBServerName != nil { in, out := &in.SMBServerName, &out.SMBServerName *out = new(string) diff --git a/apis/network/v1beta1/zz_expressroutecircuitconnection_terraformed.go b/apis/network/v1beta1/zz_expressroutecircuitconnection_terraformed.go index c52023970..469ad46c4 100755 --- a/apis/network/v1beta1/zz_expressroutecircuitconnection_terraformed.go +++ b/apis/network/v1beta1/zz_expressroutecircuitconnection_terraformed.go @@ -21,7 +21,7 @@ func (mg *ExpressRouteCircuitConnection) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this ExpressRouteCircuitConnection func (tr *ExpressRouteCircuitConnection) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"authorization_key": "spec.forProvider.authorizationKeySecretRef"} + return map[string]string{"authorization_key": "authorizationKeySecretRef"} } // GetObservation of this ExpressRouteCircuitConnection diff --git a/apis/network/v1beta1/zz_expressroutecircuitconnection_types.go b/apis/network/v1beta1/zz_expressroutecircuitconnection_types.go index c5baa30c9..544ad41e4 100755 --- a/apis/network/v1beta1/zz_expressroutecircuitconnection_types.go +++ b/apis/network/v1beta1/zz_expressroutecircuitconnection_types.go @@ -21,6 +21,9 @@ type ExpressRouteCircuitConnectionInitParameters struct { // The IPv6 address space from which to allocate customer addresses for global reach. AddressPrefixIPv6 *string `json:"addressPrefixIpv6,omitempty" tf:"address_prefix_ipv6,omitempty"` + // The authorization key which is associated with the Express Route Circuit Connection. + AuthorizationKeySecretRef *v1.SecretKeySelector `json:"authorizationKeySecretRef,omitempty" tf:"-"` + // The ID of the peered Express Route Circuit Private Peering. Changing this forces a new Express Route Circuit Connection to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/network/v1beta2.ExpressRouteCircuitPeering // +crossplane:generate:reference:extractor=github.com/upbound/provider-azure/apis/rconfig.ExtractResourceID() diff --git a/apis/network/v1beta1/zz_generated.deepcopy.go b/apis/network/v1beta1/zz_generated.deepcopy.go index 91b766554..f5cbcbb22 100644 --- a/apis/network/v1beta1/zz_generated.deepcopy.go +++ b/apis/network/v1beta1/zz_generated.deepcopy.go @@ -9889,6 +9889,11 @@ func (in *ExpressRouteCircuitConnectionInitParameters) DeepCopyInto(out *Express *out = new(string) **out = **in } + if in.AuthorizationKeySecretRef != nil { + in, out := &in.AuthorizationKeySecretRef, &out.AuthorizationKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.PeerPeeringID != nil { in, out := &in.PeerPeeringID, &out.PeerPeeringID *out = new(string) diff --git a/apis/network/v1beta2/zz_applicationgateway_terraformed.go b/apis/network/v1beta2/zz_applicationgateway_terraformed.go index 3f844206a..6213a41ff 100755 --- a/apis/network/v1beta2/zz_applicationgateway_terraformed.go +++ b/apis/network/v1beta2/zz_applicationgateway_terraformed.go @@ -21,7 +21,7 @@ func (mg *ApplicationGateway) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this ApplicationGateway func (tr *ApplicationGateway) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"authentication_certificate[*].data": "spec.forProvider.authenticationCertificate[*].dataSecretRef", "ssl_certificate[*].data": "spec.forProvider.sslCertificate[*].dataSecretRef", "ssl_certificate[*].password": "spec.forProvider.sslCertificate[*].passwordSecretRef", "trusted_client_certificate[*].data": "spec.forProvider.trustedClientCertificate[*].dataSecretRef", "trusted_root_certificate[*].data": "spec.forProvider.trustedRootCertificate[*].dataSecretRef"} + return map[string]string{"authentication_certificate[*].data": "authenticationCertificate[*].dataSecretRef", "ssl_certificate[*].data": "sslCertificate[*].dataSecretRef", "ssl_certificate[*].password": "sslCertificate[*].passwordSecretRef", "trusted_client_certificate[*].data": "trustedClientCertificate[*].dataSecretRef", "trusted_root_certificate[*].data": "trustedRootCertificate[*].dataSecretRef"} } // GetObservation of this ApplicationGateway diff --git a/apis/network/v1beta2/zz_applicationgateway_types.go b/apis/network/v1beta2/zz_applicationgateway_types.go index 90f335102..4998b75ad 100755 --- a/apis/network/v1beta2/zz_applicationgateway_types.go +++ b/apis/network/v1beta2/zz_applicationgateway_types.go @@ -362,6 +362,9 @@ type ApplicationGatewayParameters struct { type AuthenticationCertificateInitParameters struct { + // The contents of the Authentication Certificate which should be used. + DataSecretRef v1.SecretKeySelector `json:"dataSecretRef" tf:"-"` + // The Name of the Authentication Certificate to use. Name *string `json:"name,omitempty" tf:"name,omitempty"` } @@ -378,7 +381,7 @@ type AuthenticationCertificateObservation struct { type AuthenticationCertificateParameters struct { // The contents of the Authentication Certificate which should be used. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional DataSecretRef v1.SecretKeySelector `json:"dataSecretRef" tf:"-"` // The Name of the Authentication Certificate to use. @@ -1964,11 +1967,17 @@ type RewriteRuleSetParameters struct { type SSLCertificateInitParameters struct { + // The base64-encoded PFX certificate data. Required if key_vault_secret_id is not set. + DataSecretRef *v1.SecretKeySelector `json:"dataSecretRef,omitempty" tf:"-"` + // The Secret ID of (base-64 encoded unencrypted pfx) the Secret or Certificate object stored in Azure KeyVault. You need to enable soft delete for Key Vault to use this feature. Required if data is not set. KeyVaultSecretID *string `json:"keyVaultSecretId,omitempty" tf:"key_vault_secret_id,omitempty"` // The Name of the SSL certificate that is unique within this Application Gateway Name *string `json:"name,omitempty" tf:"name,omitempty"` + + // Password for the pfx file specified in data. Required if data is set. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` } type SSLCertificateObservation struct { @@ -2226,6 +2235,9 @@ type SkuParameters struct { type TrustedClientCertificateInitParameters struct { + // The base-64 encoded certificate. + DataSecretRef v1.SecretKeySelector `json:"dataSecretRef" tf:"-"` + // The name of the Trusted Client Certificate that is unique within this Application Gateway. Name *string `json:"name,omitempty" tf:"name,omitempty"` } @@ -2242,7 +2254,7 @@ type TrustedClientCertificateObservation struct { type TrustedClientCertificateParameters struct { // The base-64 encoded certificate. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional DataSecretRef v1.SecretKeySelector `json:"dataSecretRef" tf:"-"` // The name of the Trusted Client Certificate that is unique within this Application Gateway. @@ -2252,6 +2264,9 @@ type TrustedClientCertificateParameters struct { type TrustedRootCertificateInitParameters struct { + // The contents of the Trusted Root Certificate which should be used. Required if key_vault_secret_id is not set. + DataSecretRef *v1.SecretKeySelector `json:"dataSecretRef,omitempty" tf:"-"` + // The Secret ID of (base-64 encoded unencrypted pfx) Secret or Certificate object stored in Azure KeyVault. You need to enable soft delete for the Key Vault to use this feature. Required if data is not set. KeyVaultSecretID *string `json:"keyVaultSecretId,omitempty" tf:"key_vault_secret_id,omitempty"` diff --git a/apis/network/v1beta2/zz_expressroutecircuit_terraformed.go b/apis/network/v1beta2/zz_expressroutecircuit_terraformed.go index 04456f13f..28a4c1899 100755 --- a/apis/network/v1beta2/zz_expressroutecircuit_terraformed.go +++ b/apis/network/v1beta2/zz_expressroutecircuit_terraformed.go @@ -21,7 +21,7 @@ func (mg *ExpressRouteCircuit) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this ExpressRouteCircuit func (tr *ExpressRouteCircuit) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"authorization_key": "spec.forProvider.authorizationKeySecretRef", "service_key": "status.atProvider.serviceKey"} + return map[string]string{"authorization_key": "authorizationKeySecretRef", "service_key": "status.atProvider.serviceKey"} } // GetObservation of this ExpressRouteCircuit diff --git a/apis/network/v1beta2/zz_expressroutecircuit_types.go b/apis/network/v1beta2/zz_expressroutecircuit_types.go index b736ac84b..008600841 100755 --- a/apis/network/v1beta2/zz_expressroutecircuit_types.go +++ b/apis/network/v1beta2/zz_expressroutecircuit_types.go @@ -18,6 +18,9 @@ type ExpressRouteCircuitInitParameters struct { // Allow the circuit to interact with classic (RDFE) resources. Defaults to false. AllowClassicOperations *bool `json:"allowClassicOperations,omitempty" tf:"allow_classic_operations,omitempty"` + // The authorization key. This can be used to set up an ExpressRoute Circuit with an ExpressRoute Port from another subscription. + AuthorizationKeySecretRef *v1.SecretKeySelector `json:"authorizationKeySecretRef,omitempty" tf:"-"` + // The bandwidth in Gbps of the circuit being created on the Express Route Port. BandwidthInGbps *float64 `json:"bandwidthInGbps,omitempty" tf:"bandwidth_in_gbps,omitempty"` diff --git a/apis/network/v1beta2/zz_expressroutecircuitpeering_terraformed.go b/apis/network/v1beta2/zz_expressroutecircuitpeering_terraformed.go index 0723095fb..833fb15bc 100755 --- a/apis/network/v1beta2/zz_expressroutecircuitpeering_terraformed.go +++ b/apis/network/v1beta2/zz_expressroutecircuitpeering_terraformed.go @@ -21,7 +21,7 @@ func (mg *ExpressRouteCircuitPeering) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this ExpressRouteCircuitPeering func (tr *ExpressRouteCircuitPeering) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"shared_key": "spec.forProvider.sharedKeySecretRef"} + return map[string]string{"shared_key": "sharedKeySecretRef"} } // GetObservation of this ExpressRouteCircuitPeering diff --git a/apis/network/v1beta2/zz_expressroutecircuitpeering_types.go b/apis/network/v1beta2/zz_expressroutecircuitpeering_types.go index 9781223c4..dc6f2dee0 100755 --- a/apis/network/v1beta2/zz_expressroutecircuitpeering_types.go +++ b/apis/network/v1beta2/zz_expressroutecircuitpeering_types.go @@ -36,6 +36,9 @@ type ExpressRouteCircuitPeeringInitParameters struct { // A /30 subnet for the secondary link. Required when config for IPv4. SecondaryPeerAddressPrefix *string `json:"secondaryPeerAddressPrefix,omitempty" tf:"secondary_peer_address_prefix,omitempty"` + // The shared key. Can be a maximum of 25 characters. + SharedKeySecretRef *v1.SecretKeySelector `json:"sharedKeySecretRef,omitempty" tf:"-"` + // A valid VLAN ID to establish this peering on. VlanID *float64 `json:"vlanId,omitempty" tf:"vlan_id,omitempty"` } diff --git a/apis/network/v1beta2/zz_generated.deepcopy.go b/apis/network/v1beta2/zz_generated.deepcopy.go index 5957dad8f..e44afde00 100644 --- a/apis/network/v1beta2/zz_generated.deepcopy.go +++ b/apis/network/v1beta2/zz_generated.deepcopy.go @@ -898,6 +898,7 @@ func (in *ApplicationGatewayStatus) DeepCopy() *ApplicationGatewayStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *AuthenticationCertificateInitParameters) DeepCopyInto(out *AuthenticationCertificateInitParameters) { *out = *in + out.DataSecretRef = in.DataSecretRef if in.Name != nil { in, out := &in.Name, &out.Name *out = new(string) @@ -5519,6 +5520,11 @@ func (in *ExpressRouteCircuitInitParameters) DeepCopyInto(out *ExpressRouteCircu *out = new(bool) **out = **in } + if in.AuthorizationKeySecretRef != nil { + in, out := &in.AuthorizationKeySecretRef, &out.AuthorizationKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.BandwidthInGbps != nil { in, out := &in.BandwidthInGbps, &out.BandwidthInGbps *out = new(float64) @@ -5856,6 +5862,11 @@ func (in *ExpressRouteCircuitPeeringInitParameters) DeepCopyInto(out *ExpressRou *out = new(string) **out = **in } + if in.SharedKeySecretRef != nil { + in, out := &in.SharedKeySecretRef, &out.SharedKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.VlanID != nil { in, out := &in.VlanID, &out.VlanID *out = new(float64) @@ -17892,6 +17903,7 @@ func (in *RadiusServerInitParameters) DeepCopyInto(out *RadiusServerInitParamete *out = new(float64) **out = **in } + out.SecretSecretRef = in.SecretSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new RadiusServerInitParameters. @@ -20737,6 +20749,11 @@ func (in *RuleParameters) DeepCopy() *RuleParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *SSLCertificateInitParameters) DeepCopyInto(out *SSLCertificateInitParameters) { *out = *in + if in.DataSecretRef != nil { + in, out := &in.DataSecretRef, &out.DataSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.KeyVaultSecretID != nil { in, out := &in.KeyVaultSecretID, &out.KeyVaultSecretID *out = new(string) @@ -20747,6 +20764,11 @@ func (in *SSLCertificateInitParameters) DeepCopyInto(out *SSLCertificateInitPara *out = new(string) **out = **in } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new SSLCertificateInitParameters. @@ -21408,6 +21430,7 @@ func (in *ServerInitParameters) DeepCopyInto(out *ServerInitParameters) { *out = new(float64) **out = **in } + out.SecretSecretRef = in.SecretSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ServerInitParameters. @@ -24210,6 +24233,7 @@ func (in *TrafficSelectorPolicyParameters) DeepCopy() *TrafficSelectorPolicyPara // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *TrustedClientCertificateInitParameters) DeepCopyInto(out *TrustedClientCertificateInitParameters) { *out = *in + out.DataSecretRef = in.DataSecretRef if in.Name != nil { in, out := &in.Name, &out.Name *out = new(string) @@ -24276,6 +24300,11 @@ func (in *TrustedClientCertificateParameters) DeepCopy() *TrustedClientCertifica // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *TrustedRootCertificateInitParameters) DeepCopyInto(out *TrustedRootCertificateInitParameters) { *out = *in + if in.DataSecretRef != nil { + in, out := &in.DataSecretRef, &out.DataSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.KeyVaultSecretID != nil { in, out := &in.KeyVaultSecretID, &out.KeyVaultSecretID *out = new(string) @@ -28237,6 +28266,11 @@ func (in *VirtualNetworkGatewayConnection) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *VirtualNetworkGatewayConnectionInitParameters) DeepCopyInto(out *VirtualNetworkGatewayConnectionInitParameters) { *out = *in + if in.AuthorizationKeySecretRef != nil { + in, out := &in.AuthorizationKeySecretRef, &out.AuthorizationKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ConnectionMode != nil { in, out := &in.ConnectionMode, &out.ConnectionMode *out = new(string) @@ -28344,6 +28378,11 @@ func (in *VirtualNetworkGatewayConnectionInitParameters) DeepCopyInto(out *Virtu *out = new(float64) **out = **in } + if in.SharedKeySecretRef != nil { + in, out := &in.SharedKeySecretRef, &out.SharedKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Tags != nil { in, out := &in.Tags, &out.Tags *out = make(map[string]*string, len(*in)) diff --git a/apis/network/v1beta2/zz_virtualnetworkgateway_terraformed.go b/apis/network/v1beta2/zz_virtualnetworkgateway_terraformed.go index 36f59b926..5a2490dec 100755 --- a/apis/network/v1beta2/zz_virtualnetworkgateway_terraformed.go +++ b/apis/network/v1beta2/zz_virtualnetworkgateway_terraformed.go @@ -21,7 +21,7 @@ func (mg *VirtualNetworkGateway) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this VirtualNetworkGateway func (tr *VirtualNetworkGateway) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"vpn_client_configuration[*].radius_server[*].secret": "spec.forProvider.vpnClientConfiguration[*].radiusServer[*].secretSecretRef"} + return map[string]string{"vpn_client_configuration[*].radius_server[*].secret": "vpnClientConfiguration[*].radiusServer[*].secretSecretRef"} } // GetObservation of this VirtualNetworkGateway diff --git a/apis/network/v1beta2/zz_virtualnetworkgateway_types.go b/apis/network/v1beta2/zz_virtualnetworkgateway_types.go index 34a153ffb..c84309469 100755 --- a/apis/network/v1beta2/zz_virtualnetworkgateway_types.go +++ b/apis/network/v1beta2/zz_virtualnetworkgateway_types.go @@ -254,6 +254,9 @@ type RadiusServerInitParameters struct { // The score of the Radius Server determines the priority of the server. Possible values are between 1 and 30. Score *float64 `json:"score,omitempty" tf:"score,omitempty"` + + // The secret that is used to communicate with the Radius Server. + SecretSecretRef v1.SecretKeySelector `json:"secretSecretRef" tf:"-"` } type RadiusServerObservation struct { @@ -276,7 +279,7 @@ type RadiusServerParameters struct { Score *float64 `json:"score" tf:"score,omitempty"` // The secret that is used to communicate with the Radius Server. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional SecretSecretRef v1.SecretKeySelector `json:"secretSecretRef" tf:"-"` } diff --git a/apis/network/v1beta2/zz_virtualnetworkgatewayconnection_terraformed.go b/apis/network/v1beta2/zz_virtualnetworkgatewayconnection_terraformed.go index 7e3324553..2e222236b 100755 --- a/apis/network/v1beta2/zz_virtualnetworkgatewayconnection_terraformed.go +++ b/apis/network/v1beta2/zz_virtualnetworkgatewayconnection_terraformed.go @@ -21,7 +21,7 @@ func (mg *VirtualNetworkGatewayConnection) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this VirtualNetworkGatewayConnection func (tr *VirtualNetworkGatewayConnection) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"authorization_key": "spec.forProvider.authorizationKeySecretRef", "shared_key": "spec.forProvider.sharedKeySecretRef"} + return map[string]string{"authorization_key": "authorizationKeySecretRef", "shared_key": "sharedKeySecretRef"} } // GetObservation of this VirtualNetworkGatewayConnection diff --git a/apis/network/v1beta2/zz_virtualnetworkgatewayconnection_types.go b/apis/network/v1beta2/zz_virtualnetworkgatewayconnection_types.go index 299b20669..bbdf33fc0 100755 --- a/apis/network/v1beta2/zz_virtualnetworkgatewayconnection_types.go +++ b/apis/network/v1beta2/zz_virtualnetworkgatewayconnection_types.go @@ -73,6 +73,9 @@ type TrafficSelectorPolicyParameters struct { type VirtualNetworkGatewayConnectionInitParameters struct { + // The authorization key associated with the Express Route Circuit. This field is required only if the type is an ExpressRoute connection. + AuthorizationKeySecretRef *v1.SecretKeySelector `json:"authorizationKeySecretRef,omitempty" tf:"-"` + // Connection mode to use. Possible values are Default, InitiatorOnly and ResponderOnly. Defaults to Default. Changing this value will force a resource to be created. ConnectionMode *string `json:"connectionMode,omitempty" tf:"connection_mode,omitempty"` @@ -145,6 +148,9 @@ type VirtualNetworkGatewayConnectionInitParameters struct { // The routing weight. Defaults to 10. RoutingWeight *float64 `json:"routingWeight,omitempty" tf:"routing_weight,omitempty"` + // The shared IPSec key. A key could be provided if a Site-to-Site, VNet-to-VNet or ExpressRoute connection is created. + SharedKeySecretRef *v1.SecretKeySelector `json:"sharedKeySecretRef,omitempty" tf:"-"` + // A mapping of tags to assign to the resource. // +mapType=granular Tags map[string]*string `json:"tags,omitempty" tf:"tags,omitempty"` diff --git a/apis/network/v1beta2/zz_vpnserverconfiguration_terraformed.go b/apis/network/v1beta2/zz_vpnserverconfiguration_terraformed.go index ee21c0f98..36f46ed22 100755 --- a/apis/network/v1beta2/zz_vpnserverconfiguration_terraformed.go +++ b/apis/network/v1beta2/zz_vpnserverconfiguration_terraformed.go @@ -21,7 +21,7 @@ func (mg *VPNServerConfiguration) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this VPNServerConfiguration func (tr *VPNServerConfiguration) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"radius[*].server[*].secret": "spec.forProvider.radius[*].server[*].secretSecretRef"} + return map[string]string{"radius[*].server[*].secret": "radius[*].server[*].secretSecretRef"} } // GetObservation of this VPNServerConfiguration diff --git a/apis/network/v1beta2/zz_vpnserverconfiguration_types.go b/apis/network/v1beta2/zz_vpnserverconfiguration_types.go index b0b010f5a..bd176f982 100755 --- a/apis/network/v1beta2/zz_vpnserverconfiguration_types.go +++ b/apis/network/v1beta2/zz_vpnserverconfiguration_types.go @@ -185,6 +185,9 @@ type ServerInitParameters struct { // The Score of the Radius Server determines the priority of the server. Ranges from 1 to 30. Score *float64 `json:"score,omitempty" tf:"score,omitempty"` + + // The Secret used to communicate with the Radius Server. + SecretSecretRef v1.SecretKeySelector `json:"secretSecretRef" tf:"-"` } type ServerObservation struct { @@ -207,7 +210,7 @@ type ServerParameters struct { Score *float64 `json:"score" tf:"score,omitempty"` // The Secret used to communicate with the Radius Server. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional SecretSecretRef v1.SecretKeySelector `json:"secretSecretRef" tf:"-"` } diff --git a/apis/notificationhubs/v1beta2/zz_generated.deepcopy.go b/apis/notificationhubs/v1beta2/zz_generated.deepcopy.go index b44683164..48b9bfa3e 100644 --- a/apis/notificationhubs/v1beta2/zz_generated.deepcopy.go +++ b/apis/notificationhubs/v1beta2/zz_generated.deepcopy.go @@ -36,6 +36,7 @@ func (in *APNSCredentialInitParameters) DeepCopyInto(out *APNSCredentialInitPara *out = new(string) **out = **in } + out.TokenSecretRef = in.TokenSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new APNSCredentialInitParameters. @@ -122,6 +123,7 @@ func (in *APNSCredentialParameters) DeepCopy() *APNSCredentialParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *GCMCredentialInitParameters) DeepCopyInto(out *GCMCredentialInitParameters) { *out = *in + out.APIKeySecretRef = in.APIKeySecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new GCMCredentialInitParameters. diff --git a/apis/notificationhubs/v1beta2/zz_notificationhub_terraformed.go b/apis/notificationhubs/v1beta2/zz_notificationhub_terraformed.go index a1d6a5d65..59951766d 100755 --- a/apis/notificationhubs/v1beta2/zz_notificationhub_terraformed.go +++ b/apis/notificationhubs/v1beta2/zz_notificationhub_terraformed.go @@ -21,7 +21,7 @@ func (mg *NotificationHub) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this NotificationHub func (tr *NotificationHub) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"apns_credential[*].token": "spec.forProvider.apnsCredential[*].tokenSecretRef", "gcm_credential[*].api_key": "spec.forProvider.gcmCredential[*].apiKeySecretRef"} + return map[string]string{"apns_credential[*].token": "apnsCredential[*].tokenSecretRef", "gcm_credential[*].api_key": "gcmCredential[*].apiKeySecretRef"} } // GetObservation of this NotificationHub diff --git a/apis/notificationhubs/v1beta2/zz_notificationhub_types.go b/apis/notificationhubs/v1beta2/zz_notificationhub_types.go index 49e719d99..85ba424da 100755 --- a/apis/notificationhubs/v1beta2/zz_notificationhub_types.go +++ b/apis/notificationhubs/v1beta2/zz_notificationhub_types.go @@ -26,6 +26,9 @@ type APNSCredentialInitParameters struct { // The ID of the team the Token. TeamID *string `json:"teamId,omitempty" tf:"team_id,omitempty"` + + // The Push Token associated with the Apple Developer Account. This is the contents of the key downloaded from the Apple Developer Portal between the -----BEGIN PRIVATE KEY----- and -----END PRIVATE KEY----- blocks. + TokenSecretRef v1.SecretKeySelector `json:"tokenSecretRef" tf:"-"` } type APNSCredentialObservation struct { @@ -62,11 +65,14 @@ type APNSCredentialParameters struct { TeamID *string `json:"teamId" tf:"team_id,omitempty"` // The Push Token associated with the Apple Developer Account. This is the contents of the key downloaded from the Apple Developer Portal between the -----BEGIN PRIVATE KEY----- and -----END PRIVATE KEY----- blocks. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional TokenSecretRef v1.SecretKeySelector `json:"tokenSecretRef" tf:"-"` } type GCMCredentialInitParameters struct { + + // The API Key associated with the Google Cloud Messaging service. + APIKeySecretRef v1.SecretKeySelector `json:"apiKeySecretRef" tf:"-"` } type GCMCredentialObservation struct { @@ -75,7 +81,7 @@ type GCMCredentialObservation struct { type GCMCredentialParameters struct { // The API Key associated with the Google Cloud Messaging service. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional APIKeySecretRef v1.SecretKeySelector `json:"apiKeySecretRef" tf:"-"` } diff --git a/apis/resources/v1beta2/zz_generated.deepcopy.go b/apis/resources/v1beta2/zz_generated.deepcopy.go index c01dcf6a9..7a84cc866 100644 --- a/apis/resources/v1beta2/zz_generated.deepcopy.go +++ b/apis/resources/v1beta2/zz_generated.deepcopy.go @@ -81,6 +81,11 @@ func (in *EnvironmentVariableInitParameters) DeepCopyInto(out *EnvironmentVariab *out = new(string) **out = **in } + if in.SecureValueSecretRef != nil { + in, out := &in.SecureValueSecretRef, &out.SecureValueSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Value != nil { in, out := &in.Value, &out.Value *out = new(string) @@ -846,6 +851,11 @@ func (in *ResourceDeploymentScriptAzurePowerShellEnvironmentVariableInitParamete *out = new(string) **out = **in } + if in.SecureValueSecretRef != nil { + in, out := &in.SecureValueSecretRef, &out.SecureValueSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Value != nil { in, out := &in.Value, &out.Value *out = new(string) @@ -1492,6 +1502,7 @@ func (in *ResourceDeploymentScriptAzurePowerShellStatus) DeepCopy() *ResourceDep // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *ResourceDeploymentScriptAzurePowerShellStorageAccountInitParameters) DeepCopyInto(out *ResourceDeploymentScriptAzurePowerShellStorageAccountInitParameters) { *out = *in + out.KeySecretRef = in.KeySecretRef if in.Name != nil { in, out := &in.Name, &out.Name *out = new(string) @@ -1553,6 +1564,7 @@ func (in *ResourceDeploymentScriptAzurePowerShellStorageAccountParameters) DeepC // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *StorageAccountInitParameters) DeepCopyInto(out *StorageAccountInitParameters) { *out = *in + out.KeySecretRef = in.KeySecretRef if in.Name != nil { in, out := &in.Name, &out.Name *out = new(string) diff --git a/apis/resources/v1beta2/zz_resourcedeploymentscriptazurecli_terraformed.go b/apis/resources/v1beta2/zz_resourcedeploymentscriptazurecli_terraformed.go index b69ce5a79..309834815 100755 --- a/apis/resources/v1beta2/zz_resourcedeploymentscriptazurecli_terraformed.go +++ b/apis/resources/v1beta2/zz_resourcedeploymentscriptazurecli_terraformed.go @@ -21,7 +21,7 @@ func (mg *ResourceDeploymentScriptAzureCli) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this ResourceDeploymentScriptAzureCli func (tr *ResourceDeploymentScriptAzureCli) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"environment_variable[*].secure_value": "spec.forProvider.environmentVariable[*].secureValueSecretRef", "storage_account[*].key": "spec.forProvider.storageAccount[*].keySecretRef"} + return map[string]string{"environment_variable[*].secure_value": "environmentVariable[*].secureValueSecretRef", "storage_account[*].key": "storageAccount[*].keySecretRef"} } // GetObservation of this ResourceDeploymentScriptAzureCli diff --git a/apis/resources/v1beta2/zz_resourcedeploymentscriptazurecli_types.go b/apis/resources/v1beta2/zz_resourcedeploymentscriptazurecli_types.go index 72e6d0abf..71d85e885 100755 --- a/apis/resources/v1beta2/zz_resourcedeploymentscriptazurecli_types.go +++ b/apis/resources/v1beta2/zz_resourcedeploymentscriptazurecli_types.go @@ -37,6 +37,9 @@ type EnvironmentVariableInitParameters struct { // Specifies the name of the environment variable. Name *string `json:"name,omitempty" tf:"name,omitempty"` + // Specifies the value of the secure environment variable. + SecureValueSecretRef *v1.SecretKeySelector `json:"secureValueSecretRef,omitempty" tf:"-"` + // Specifies the value of the environment variable. Value *string `json:"value,omitempty" tf:"value,omitempty"` } @@ -325,6 +328,9 @@ type ResourceDeploymentScriptAzureCliParameters struct { type StorageAccountInitParameters struct { + // Specifies the storage account access key. + KeySecretRef v1.SecretKeySelector `json:"keySecretRef" tf:"-"` + // Specifies the storage account name. Name *string `json:"name,omitempty" tf:"name,omitempty"` } @@ -338,7 +344,7 @@ type StorageAccountObservation struct { type StorageAccountParameters struct { // Specifies the storage account access key. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional KeySecretRef v1.SecretKeySelector `json:"keySecretRef" tf:"-"` // Specifies the storage account name. diff --git a/apis/resources/v1beta2/zz_resourcedeploymentscriptazurepowershell_terraformed.go b/apis/resources/v1beta2/zz_resourcedeploymentscriptazurepowershell_terraformed.go index aab1b641c..5d9567186 100755 --- a/apis/resources/v1beta2/zz_resourcedeploymentscriptazurepowershell_terraformed.go +++ b/apis/resources/v1beta2/zz_resourcedeploymentscriptazurepowershell_terraformed.go @@ -21,7 +21,7 @@ func (mg *ResourceDeploymentScriptAzurePowerShell) GetTerraformResourceType() st // GetConnectionDetailsMapping for this ResourceDeploymentScriptAzurePowerShell func (tr *ResourceDeploymentScriptAzurePowerShell) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"environment_variable[*].secure_value": "spec.forProvider.environmentVariable[*].secureValueSecretRef", "storage_account[*].key": "spec.forProvider.storageAccount[*].keySecretRef"} + return map[string]string{"environment_variable[*].secure_value": "environmentVariable[*].secureValueSecretRef", "storage_account[*].key": "storageAccount[*].keySecretRef"} } // GetObservation of this ResourceDeploymentScriptAzurePowerShell diff --git a/apis/resources/v1beta2/zz_resourcedeploymentscriptazurepowershell_types.go b/apis/resources/v1beta2/zz_resourcedeploymentscriptazurepowershell_types.go index f49981838..56e1a07f4 100755 --- a/apis/resources/v1beta2/zz_resourcedeploymentscriptazurepowershell_types.go +++ b/apis/resources/v1beta2/zz_resourcedeploymentscriptazurepowershell_types.go @@ -37,6 +37,9 @@ type ResourceDeploymentScriptAzurePowerShellEnvironmentVariableInitParameters st // Specifies the name of the environment variable. Name *string `json:"name,omitempty" tf:"name,omitempty"` + // Specifies the value of the secure environment variable. + SecureValueSecretRef *v1.SecretKeySelector `json:"secureValueSecretRef,omitempty" tf:"-"` + // Specifies the value of the environment variable. Value *string `json:"value,omitempty" tf:"value,omitempty"` } @@ -325,6 +328,9 @@ type ResourceDeploymentScriptAzurePowerShellParameters struct { type ResourceDeploymentScriptAzurePowerShellStorageAccountInitParameters struct { + // Specifies the storage account access key. + KeySecretRef v1.SecretKeySelector `json:"keySecretRef" tf:"-"` + // Specifies the storage account name. Name *string `json:"name,omitempty" tf:"name,omitempty"` } @@ -338,7 +344,7 @@ type ResourceDeploymentScriptAzurePowerShellStorageAccountObservation struct { type ResourceDeploymentScriptAzurePowerShellStorageAccountParameters struct { // Specifies the storage account access key. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional KeySecretRef v1.SecretKeySelector `json:"keySecretRef" tf:"-"` // Specifies the storage account name. diff --git a/apis/servicefabric/v1beta2/zz_generated.deepcopy.go b/apis/servicefabric/v1beta2/zz_generated.deepcopy.go index ae6368f2c..42ce66bbb 100644 --- a/apis/servicefabric/v1beta2/zz_generated.deepcopy.go +++ b/apis/servicefabric/v1beta2/zz_generated.deepcopy.go @@ -2248,6 +2248,11 @@ func (in *ManagedClusterInitParameters) DeepCopyInto(out *ManagedClusterInitPara (*in)[i].DeepCopyInto(&(*out)[i]) } } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Sku != nil { in, out := &in.Sku, &out.Sku *out = new(string) diff --git a/apis/servicefabric/v1beta2/zz_managedcluster_terraformed.go b/apis/servicefabric/v1beta2/zz_managedcluster_terraformed.go index 384ee38a1..08528a43e 100755 --- a/apis/servicefabric/v1beta2/zz_managedcluster_terraformed.go +++ b/apis/servicefabric/v1beta2/zz_managedcluster_terraformed.go @@ -21,7 +21,7 @@ func (mg *ManagedCluster) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this ManagedCluster func (tr *ManagedCluster) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this ManagedCluster diff --git a/apis/servicefabric/v1beta2/zz_managedcluster_types.go b/apis/servicefabric/v1beta2/zz_managedcluster_types.go index c28c485fd..6f9bdebdb 100755 --- a/apis/servicefabric/v1beta2/zz_managedcluster_types.go +++ b/apis/servicefabric/v1beta2/zz_managedcluster_types.go @@ -279,6 +279,9 @@ type ManagedClusterInitParameters struct { // One or more node_type blocks as defined below. NodeType []ManagedClusterNodeTypeInitParameters `json:"nodeType,omitempty" tf:"node_type,omitempty"` + // Administrator password for the VMs that will be created as part of this cluster. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // SKU for this cluster. Changing this forces a new resource to be created. Default is Basic, allowed values are either Basic or Standard. Sku *string `json:"sku,omitempty" tf:"sku,omitempty"` diff --git a/apis/servicelinker/v1beta2/zz_generated.deepcopy.go b/apis/servicelinker/v1beta2/zz_generated.deepcopy.go index 46783e977..1cd4a8733 100644 --- a/apis/servicelinker/v1beta2/zz_generated.deepcopy.go +++ b/apis/servicelinker/v1beta2/zz_generated.deepcopy.go @@ -16,6 +16,11 @@ import ( // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *AuthenticationInitParameters) DeepCopyInto(out *AuthenticationInitParameters) { *out = *in + if in.CertificateSecretRef != nil { + in, out := &in.CertificateSecretRef, &out.CertificateSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientID != nil { in, out := &in.ClientID, &out.ClientID *out = new(string) @@ -31,6 +36,11 @@ func (in *AuthenticationInitParameters) DeepCopyInto(out *AuthenticationInitPara *out = new(string) **out = **in } + if in.SecretSecretRef != nil { + in, out := &in.SecretSecretRef, &out.SecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SubscriptionID != nil { in, out := &in.SubscriptionID, &out.SubscriptionID *out = new(string) diff --git a/apis/servicelinker/v1beta2/zz_springcloudconnection_terraformed.go b/apis/servicelinker/v1beta2/zz_springcloudconnection_terraformed.go index f71865bda..b1f771e1c 100755 --- a/apis/servicelinker/v1beta2/zz_springcloudconnection_terraformed.go +++ b/apis/servicelinker/v1beta2/zz_springcloudconnection_terraformed.go @@ -21,7 +21,7 @@ func (mg *SpringCloudConnection) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this SpringCloudConnection func (tr *SpringCloudConnection) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"authentication[*].certificate": "spec.forProvider.authentication[*].certificateSecretRef", "authentication[*].secret": "spec.forProvider.authentication[*].secretSecretRef"} + return map[string]string{"authentication[*].certificate": "authentication[*].certificateSecretRef", "authentication[*].secret": "authentication[*].secretSecretRef"} } // GetObservation of this SpringCloudConnection diff --git a/apis/servicelinker/v1beta2/zz_springcloudconnection_types.go b/apis/servicelinker/v1beta2/zz_springcloudconnection_types.go index b6f8c55ee..6ae66c5b5 100755 --- a/apis/servicelinker/v1beta2/zz_springcloudconnection_types.go +++ b/apis/servicelinker/v1beta2/zz_springcloudconnection_types.go @@ -15,6 +15,9 @@ import ( type AuthenticationInitParameters struct { + // Service principal certificate for servicePrincipal auth. Should be specified when type is set to servicePrincipalCertificate. + CertificateSecretRef *v1.SecretKeySelector `json:"certificateSecretRef,omitempty" tf:"-"` + // Client ID for userAssignedIdentity or servicePrincipal auth. Should be specified when type is set to servicePrincipalSecret or servicePrincipalCertificate. When type is set to userAssignedIdentity, client_id and subscription_id should be either both specified or both not specified. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` @@ -24,6 +27,9 @@ type AuthenticationInitParameters struct { // Principal ID for servicePrincipal auth. Should be specified when type is set to servicePrincipalSecret or servicePrincipalCertificate. PrincipalID *string `json:"principalId,omitempty" tf:"principal_id,omitempty"` + // Password or account key for secret auth. secret and name should be either both specified or both not specified when type is set to secret. + SecretSecretRef *v1.SecretKeySelector `json:"secretSecretRef,omitempty" tf:"-"` + // Subscription ID for userAssignedIdentity. subscription_id and client_id should be either both specified or both not specified. SubscriptionID *string `json:"subscriptionId,omitempty" tf:"subscription_id,omitempty"` diff --git a/apis/sql/v1beta1/zz_generated.deepcopy.go b/apis/sql/v1beta1/zz_generated.deepcopy.go index 6c958f71f..fd8442b5c 100644 --- a/apis/sql/v1beta1/zz_generated.deepcopy.go +++ b/apis/sql/v1beta1/zz_generated.deepcopy.go @@ -648,6 +648,11 @@ func (in *MSSQLDatabaseExtendedAuditingPolicyInitParameters) DeepCopyInto(out *M *out = new(bool) **out = **in } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageEndpoint != nil { in, out := &in.StorageEndpoint, &out.StorageEndpoint *out = new(string) @@ -3013,6 +3018,7 @@ func (in *MSSQLJobCredential) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *MSSQLJobCredentialInitParameters) DeepCopyInto(out *MSSQLJobCredentialInitParameters) { *out = *in + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) @@ -5572,6 +5578,16 @@ func (in *MSSQLServerMicrosoftSupportAuditingPolicyInitParameters) DeepCopyInto( *out = new(bool) **out = **in } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.StorageAccountSubscriptionIDSecretRef != nil { + in, out := &in.StorageAccountSubscriptionIDSecretRef, &out.StorageAccountSubscriptionIDSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MSSQLServerMicrosoftSupportAuditingPolicyInitParameters. @@ -6069,6 +6085,11 @@ func (in *MSSQLServerSecurityAlertPolicyInitParameters) DeepCopyInto(out *MSSQLS *out = new(string) **out = **in } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageEndpoint != nil { in, out := &in.StorageEndpoint, &out.StorageEndpoint *out = new(string) diff --git a/apis/sql/v1beta1/zz_mssqldatabaseextendedauditingpolicy_terraformed.go b/apis/sql/v1beta1/zz_mssqldatabaseextendedauditingpolicy_terraformed.go index 33f5cdf46..f5ec903ce 100755 --- a/apis/sql/v1beta1/zz_mssqldatabaseextendedauditingpolicy_terraformed.go +++ b/apis/sql/v1beta1/zz_mssqldatabaseextendedauditingpolicy_terraformed.go @@ -21,7 +21,7 @@ func (mg *MSSQLDatabaseExtendedAuditingPolicy) GetTerraformResourceType() string // GetConnectionDetailsMapping for this MSSQLDatabaseExtendedAuditingPolicy func (tr *MSSQLDatabaseExtendedAuditingPolicy) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this MSSQLDatabaseExtendedAuditingPolicy diff --git a/apis/sql/v1beta1/zz_mssqldatabaseextendedauditingpolicy_types.go b/apis/sql/v1beta1/zz_mssqldatabaseextendedauditingpolicy_types.go index 09c276865..c6648fe63 100755 --- a/apis/sql/v1beta1/zz_mssqldatabaseextendedauditingpolicy_types.go +++ b/apis/sql/v1beta1/zz_mssqldatabaseextendedauditingpolicy_types.go @@ -27,6 +27,9 @@ type MSSQLDatabaseExtendedAuditingPolicyInitParameters struct { // Is storage_account_access_key value the storage's secondary key? StorageAccountAccessKeyIsSecondary *bool `json:"storageAccountAccessKeyIsSecondary,omitempty" tf:"storage_account_access_key_is_secondary,omitempty"` + // The access key to use for the auditing storage account. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // The blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all extended auditing logs. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("primary_blob_endpoint",true) diff --git a/apis/sql/v1beta1/zz_mssqljobcredential_terraformed.go b/apis/sql/v1beta1/zz_mssqljobcredential_terraformed.go index 817d5fc23..62d66e878 100755 --- a/apis/sql/v1beta1/zz_mssqljobcredential_terraformed.go +++ b/apis/sql/v1beta1/zz_mssqljobcredential_terraformed.go @@ -21,7 +21,7 @@ func (mg *MSSQLJobCredential) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this MSSQLJobCredential func (tr *MSSQLJobCredential) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this MSSQLJobCredential diff --git a/apis/sql/v1beta1/zz_mssqljobcredential_types.go b/apis/sql/v1beta1/zz_mssqljobcredential_types.go index e61e4b33b..a4730f933 100755 --- a/apis/sql/v1beta1/zz_mssqljobcredential_types.go +++ b/apis/sql/v1beta1/zz_mssqljobcredential_types.go @@ -15,6 +15,9 @@ import ( type MSSQLJobCredentialInitParameters struct { + // The password part of the credential. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username part of the credential. Username *string `json:"username,omitempty" tf:"username,omitempty"` } diff --git a/apis/sql/v1beta1/zz_mssqlservermicrosoftsupportauditingpolicy_terraformed.go b/apis/sql/v1beta1/zz_mssqlservermicrosoftsupportauditingpolicy_terraformed.go index d19d626a4..33e5fc914 100755 --- a/apis/sql/v1beta1/zz_mssqlservermicrosoftsupportauditingpolicy_terraformed.go +++ b/apis/sql/v1beta1/zz_mssqlservermicrosoftsupportauditingpolicy_terraformed.go @@ -21,7 +21,7 @@ func (mg *MSSQLServerMicrosoftSupportAuditingPolicy) GetTerraformResourceType() // GetConnectionDetailsMapping for this MSSQLServerMicrosoftSupportAuditingPolicy func (tr *MSSQLServerMicrosoftSupportAuditingPolicy) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef", "storage_account_subscription_id": "spec.forProvider.storageAccountSubscriptionIdSecretRef"} + return map[string]string{"storage_account_access_key": "storageAccountAccessKeySecretRef", "storage_account_subscription_id": "storageAccountSubscriptionIdSecretRef"} } // GetObservation of this MSSQLServerMicrosoftSupportAuditingPolicy diff --git a/apis/sql/v1beta1/zz_mssqlservermicrosoftsupportauditingpolicy_types.go b/apis/sql/v1beta1/zz_mssqlservermicrosoftsupportauditingpolicy_types.go index ba058b296..96737720f 100755 --- a/apis/sql/v1beta1/zz_mssqlservermicrosoftsupportauditingpolicy_types.go +++ b/apis/sql/v1beta1/zz_mssqlservermicrosoftsupportauditingpolicy_types.go @@ -33,6 +33,12 @@ type MSSQLServerMicrosoftSupportAuditingPolicyInitParameters struct { // Enable audit events to Azure Monitor? To enable server audit events to Azure Monitor, please enable its main database audit events to Azure Monitor. Defaults to true. LogMonitoringEnabled *bool `json:"logMonitoringEnabled,omitempty" tf:"log_monitoring_enabled,omitempty"` + + // The access key to use for the auditing storage account. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + + // The ID of the Subscription containing the Storage Account. + StorageAccountSubscriptionIDSecretRef *v1.SecretKeySelector `json:"storageAccountSubscriptionIdSecretRef,omitempty" tf:"-"` } type MSSQLServerMicrosoftSupportAuditingPolicyObservation struct { diff --git a/apis/sql/v1beta1/zz_mssqlserversecurityalertpolicy_terraformed.go b/apis/sql/v1beta1/zz_mssqlserversecurityalertpolicy_terraformed.go index 68ff30d19..57aee2583 100755 --- a/apis/sql/v1beta1/zz_mssqlserversecurityalertpolicy_terraformed.go +++ b/apis/sql/v1beta1/zz_mssqlserversecurityalertpolicy_terraformed.go @@ -21,7 +21,7 @@ func (mg *MSSQLServerSecurityAlertPolicy) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this MSSQLServerSecurityAlertPolicy func (tr *MSSQLServerSecurityAlertPolicy) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this MSSQLServerSecurityAlertPolicy diff --git a/apis/sql/v1beta1/zz_mssqlserversecurityalertpolicy_types.go b/apis/sql/v1beta1/zz_mssqlserversecurityalertpolicy_types.go index 74d77f706..5fc9eec38 100755 --- a/apis/sql/v1beta1/zz_mssqlserversecurityalertpolicy_types.go +++ b/apis/sql/v1beta1/zz_mssqlserversecurityalertpolicy_types.go @@ -32,6 +32,9 @@ type MSSQLServerSecurityAlertPolicyInitParameters struct { // Specifies the state of the policy, whether it is enabled or disabled or a policy has not been applied yet on the specific database server. Possible values are Disabled, Enabled and New. State *string `json:"state,omitempty" tf:"state,omitempty"` + // Specifies the identifier key of the Threat Detection audit storage account. This is mandatory when you use storage_endpoint to specify a storage account blob endpoint. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("primary_blob_endpoint",true) diff --git a/apis/sql/v1beta2/zz_generated.deepcopy.go b/apis/sql/v1beta2/zz_generated.deepcopy.go index 661926489..323884b31 100644 --- a/apis/sql/v1beta2/zz_generated.deepcopy.go +++ b/apis/sql/v1beta2/zz_generated.deepcopy.go @@ -259,6 +259,7 @@ func (in *ImportInitParameters) DeepCopyInto(out *ImportInitParameters) { *out = new(string) **out = **in } + out.AdministratorLoginPasswordSecretRef = in.AdministratorLoginPasswordSecretRef if in.AuthenticationType != nil { in, out := &in.AuthenticationType, &out.AuthenticationType *out = new(string) @@ -269,6 +270,7 @@ func (in *ImportInitParameters) DeepCopyInto(out *ImportInitParameters) { *out = new(string) **out = **in } + out.StorageKeySecretRef = in.StorageKeySecretRef if in.StorageKeyType != nil { in, out := &in.StorageKeyType, &out.StorageKeyType *out = new(string) @@ -2685,6 +2687,7 @@ func (in *MSSQLManagedInstanceInitParameters) DeepCopyInto(out *MSSQLManagedInst *out = new(string) **out = **in } + out.AdministratorLoginPasswordSecretRef = in.AdministratorLoginPasswordSecretRef if in.Collation != nil { in, out := &in.Collation, &out.Collation *out = new(string) @@ -3203,11 +3206,21 @@ func (in *MSSQLManagedInstanceVulnerabilityAssessmentInitParameters) DeepCopyInt *out = new(RecurringScansInitParameters) (*in).DeepCopyInto(*out) } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageContainerPath != nil { in, out := &in.StorageContainerPath, &out.StorageContainerPath *out = new(string) **out = **in } + if in.StorageContainerSASKeySecretRef != nil { + in, out := &in.StorageContainerSASKeySecretRef, &out.StorageContainerSASKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MSSQLManagedInstanceVulnerabilityAssessmentInitParameters. @@ -3510,6 +3523,11 @@ func (in *MSSQLServerInitParameters) DeepCopyInto(out *MSSQLServerInitParameters *out = new(string) **out = **in } + if in.AdministratorLoginPasswordSecretRef != nil { + in, out := &in.AdministratorLoginPasswordSecretRef, &out.AdministratorLoginPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AzureadAdministrator != nil { in, out := &in.AzureadAdministrator, &out.AzureadAdministrator *out = new(AzureadAdministratorInitParameters) @@ -3963,11 +3981,21 @@ func (in *MSSQLServerVulnerabilityAssessmentInitParameters) DeepCopyInto(out *MS *out = new(v1.Selector) (*in).DeepCopyInto(*out) } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageContainerPath != nil { in, out := &in.StorageContainerPath, &out.StorageContainerPath *out = new(string) **out = **in } + if in.StorageContainerSASKeySecretRef != nil { + in, out := &in.StorageContainerSASKeySecretRef, &out.StorageContainerSASKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new MSSQLServerVulnerabilityAssessmentInitParameters. @@ -4938,6 +4966,11 @@ func (in *ThreatDetectionPolicyInitParameters) DeepCopyInto(out *ThreatDetection *out = new(string) **out = **in } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageEndpoint != nil { in, out := &in.StorageEndpoint, &out.StorageEndpoint *out = new(string) diff --git a/apis/sql/v1beta2/zz_mssqldatabase_terraformed.go b/apis/sql/v1beta2/zz_mssqldatabase_terraformed.go index 067fbd5a3..551c3972f 100755 --- a/apis/sql/v1beta2/zz_mssqldatabase_terraformed.go +++ b/apis/sql/v1beta2/zz_mssqldatabase_terraformed.go @@ -21,7 +21,7 @@ func (mg *MSSQLDatabase) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this MSSQLDatabase func (tr *MSSQLDatabase) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"import[*].administrator_login_password": "spec.forProvider.import[*].administratorLoginPasswordSecretRef", "import[*].storage_key": "spec.forProvider.import[*].storageKeySecretRef", "threat_detection_policy[*].storage_account_access_key": "spec.forProvider.threatDetectionPolicy[*].storageAccountAccessKeySecretRef"} + return map[string]string{"import[*].administrator_login_password": "import[*].administratorLoginPasswordSecretRef", "import[*].storage_key": "import[*].storageKeySecretRef", "threat_detection_policy[*].storage_account_access_key": "threatDetectionPolicy[*].storageAccountAccessKeySecretRef"} } // GetObservation of this MSSQLDatabase diff --git a/apis/sql/v1beta2/zz_mssqldatabase_types.go b/apis/sql/v1beta2/zz_mssqldatabase_types.go index 3358237e7..47bff0c52 100755 --- a/apis/sql/v1beta2/zz_mssqldatabase_types.go +++ b/apis/sql/v1beta2/zz_mssqldatabase_types.go @@ -50,12 +50,18 @@ type ImportInitParameters struct { // Specifies the name of the SQL administrator. AdministratorLogin *string `json:"administratorLogin,omitempty" tf:"administrator_login,omitempty"` + // Specifies the password of the SQL administrator. + AdministratorLoginPasswordSecretRef v1.SecretKeySelector `json:"administratorLoginPasswordSecretRef" tf:"-"` + // Specifies the type of authentication used to access the server. Valid values are SQL or ADPassword. AuthenticationType *string `json:"authenticationType,omitempty" tf:"authentication_type,omitempty"` // The resource id for the storage account used to store BACPAC file. If set, private endpoint connection will be created for the storage account. Must match storage account used for storage_uri parameter. StorageAccountID *string `json:"storageAccountId,omitempty" tf:"storage_account_id,omitempty"` + // Specifies the access key for the storage account. + StorageKeySecretRef v1.SecretKeySelector `json:"storageKeySecretRef" tf:"-"` + // Specifies the type of access key for the storage account. Valid values are StorageAccessKey or SharedAccessKey. StorageKeyType *string `json:"storageKeyType,omitempty" tf:"storage_key_type,omitempty"` @@ -88,7 +94,7 @@ type ImportParameters struct { AdministratorLogin *string `json:"administratorLogin" tf:"administrator_login,omitempty"` // Specifies the password of the SQL administrator. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AdministratorLoginPasswordSecretRef v1.SecretKeySelector `json:"administratorLoginPasswordSecretRef" tf:"-"` // Specifies the type of authentication used to access the server. Valid values are SQL or ADPassword. @@ -100,7 +106,7 @@ type ImportParameters struct { StorageAccountID *string `json:"storageAccountId,omitempty" tf:"storage_account_id,omitempty"` // Specifies the access key for the storage account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageKeySecretRef v1.SecretKeySelector `json:"storageKeySecretRef" tf:"-"` // Specifies the type of access key for the storage account. Valid values are StorageAccessKey or SharedAccessKey. @@ -591,6 +597,9 @@ type ThreatDetectionPolicyInitParameters struct { // The State of the Policy. Possible values are Enabled or Disabled. Defaults to Disabled. State *string `json:"state,omitempty" tf:"state,omitempty"` + // Specifies the identifier key of the Threat Detection audit storage account. Required if state is Enabled. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. Required if state is Enabled. StorageEndpoint *string `json:"storageEndpoint,omitempty" tf:"storage_endpoint,omitempty"` } diff --git a/apis/sql/v1beta2/zz_mssqlmanagedinstance_terraformed.go b/apis/sql/v1beta2/zz_mssqlmanagedinstance_terraformed.go index 3f934ec74..d448bde24 100755 --- a/apis/sql/v1beta2/zz_mssqlmanagedinstance_terraformed.go +++ b/apis/sql/v1beta2/zz_mssqlmanagedinstance_terraformed.go @@ -21,7 +21,7 @@ func (mg *MSSQLManagedInstance) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this MSSQLManagedInstance func (tr *MSSQLManagedInstance) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"administrator_login_password": "spec.forProvider.administratorLoginPasswordSecretRef"} + return map[string]string{"administrator_login_password": "administratorLoginPasswordSecretRef"} } // GetObservation of this MSSQLManagedInstance diff --git a/apis/sql/v1beta2/zz_mssqlmanagedinstance_types.go b/apis/sql/v1beta2/zz_mssqlmanagedinstance_types.go index d4928c3bf..d144b899c 100755 --- a/apis/sql/v1beta2/zz_mssqlmanagedinstance_types.go +++ b/apis/sql/v1beta2/zz_mssqlmanagedinstance_types.go @@ -56,6 +56,9 @@ type MSSQLManagedInstanceInitParameters struct { // The administrator login name for the new SQL Managed Instance. Changing this forces a new resource to be created. AdministratorLogin *string `json:"administratorLogin,omitempty" tf:"administrator_login,omitempty"` + // The password associated with the administrator_login user. Needs to comply with Azure's Password Policy + AdministratorLoginPasswordSecretRef v1.SecretKeySelector `json:"administratorLoginPasswordSecretRef" tf:"-"` + // Specifies how the SQL Managed Instance will be collated. Default value is SQL_Latin1_General_CP1_CI_AS. Changing this forces a new resource to be created. Collation *string `json:"collation,omitempty" tf:"collation,omitempty"` diff --git a/apis/sql/v1beta2/zz_mssqlmanagedinstancevulnerabilityassessment_terraformed.go b/apis/sql/v1beta2/zz_mssqlmanagedinstancevulnerabilityassessment_terraformed.go index bd92d0b30..9885e5468 100755 --- a/apis/sql/v1beta2/zz_mssqlmanagedinstancevulnerabilityassessment_terraformed.go +++ b/apis/sql/v1beta2/zz_mssqlmanagedinstancevulnerabilityassessment_terraformed.go @@ -21,7 +21,7 @@ func (mg *MSSQLManagedInstanceVulnerabilityAssessment) GetTerraformResourceType( // GetConnectionDetailsMapping for this MSSQLManagedInstanceVulnerabilityAssessment func (tr *MSSQLManagedInstanceVulnerabilityAssessment) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef", "storage_container_sas_key": "spec.forProvider.storageContainerSasKeySecretRef"} + return map[string]string{"storage_account_access_key": "storageAccountAccessKeySecretRef", "storage_container_sas_key": "storageContainerSasKeySecretRef"} } // GetObservation of this MSSQLManagedInstanceVulnerabilityAssessment diff --git a/apis/sql/v1beta2/zz_mssqlmanagedinstancevulnerabilityassessment_types.go b/apis/sql/v1beta2/zz_mssqlmanagedinstancevulnerabilityassessment_types.go index 0821c8e5b..814a1e36f 100755 --- a/apis/sql/v1beta2/zz_mssqlmanagedinstancevulnerabilityassessment_types.go +++ b/apis/sql/v1beta2/zz_mssqlmanagedinstancevulnerabilityassessment_types.go @@ -18,8 +18,14 @@ type MSSQLManagedInstanceVulnerabilityAssessmentInitParameters struct { // The recurring scans settings. The recurring_scans block supports fields documented below. RecurringScans *RecurringScansInitParameters `json:"recurringScans,omitempty" tf:"recurring_scans,omitempty"` + // Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/). StorageContainerPath *string `json:"storageContainerPath,omitempty" tf:"storage_container_path,omitempty"` + + // A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required. + StorageContainerSASKeySecretRef *v1.SecretKeySelector `json:"storageContainerSasKeySecretRef,omitempty" tf:"-"` } type MSSQLManagedInstanceVulnerabilityAssessmentObservation struct { diff --git a/apis/sql/v1beta2/zz_mssqlserver_terraformed.go b/apis/sql/v1beta2/zz_mssqlserver_terraformed.go index e6655754d..6d688cab8 100755 --- a/apis/sql/v1beta2/zz_mssqlserver_terraformed.go +++ b/apis/sql/v1beta2/zz_mssqlserver_terraformed.go @@ -21,7 +21,7 @@ func (mg *MSSQLServer) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this MSSQLServer func (tr *MSSQLServer) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"administrator_login_password": "spec.forProvider.administratorLoginPasswordSecretRef"} + return map[string]string{"administrator_login_password": "administratorLoginPasswordSecretRef"} } // GetObservation of this MSSQLServer diff --git a/apis/sql/v1beta2/zz_mssqlserver_types.go b/apis/sql/v1beta2/zz_mssqlserver_types.go index ada46a4a6..2a8d7cade 100755 --- a/apis/sql/v1beta2/zz_mssqlserver_types.go +++ b/apis/sql/v1beta2/zz_mssqlserver_types.go @@ -145,6 +145,9 @@ type MSSQLServerInitParameters struct { // The administrator login name for the new server. Required unless azuread_authentication_only in the azuread_administrator block is true. When omitted, Azure will generate a default username which cannot be subsequently changed. Changing this forces a new resource to be created. AdministratorLogin *string `json:"administratorLogin,omitempty" tf:"administrator_login,omitempty"` + // The password associated with the administrator_login user. Needs to comply with Azure's Password Policy. Required unless azuread_authentication_only in the azuread_administrator block is true. + AdministratorLoginPasswordSecretRef *v1.SecretKeySelector `json:"administratorLoginPasswordSecretRef,omitempty" tf:"-"` + // An azuread_administrator block as defined below. AzureadAdministrator *AzureadAdministratorInitParameters `json:"azureadAdministrator,omitempty" tf:"azuread_administrator,omitempty"` diff --git a/apis/sql/v1beta2/zz_mssqlservervulnerabilityassessment_terraformed.go b/apis/sql/v1beta2/zz_mssqlservervulnerabilityassessment_terraformed.go index 4d9063fc0..0fdbc8b4e 100755 --- a/apis/sql/v1beta2/zz_mssqlservervulnerabilityassessment_terraformed.go +++ b/apis/sql/v1beta2/zz_mssqlservervulnerabilityassessment_terraformed.go @@ -21,7 +21,7 @@ func (mg *MSSQLServerVulnerabilityAssessment) GetTerraformResourceType() string // GetConnectionDetailsMapping for this MSSQLServerVulnerabilityAssessment func (tr *MSSQLServerVulnerabilityAssessment) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef", "storage_container_sas_key": "spec.forProvider.storageContainerSasKeySecretRef"} + return map[string]string{"storage_account_access_key": "storageAccountAccessKeySecretRef", "storage_container_sas_key": "storageContainerSasKeySecretRef"} } // GetObservation of this MSSQLServerVulnerabilityAssessment diff --git a/apis/sql/v1beta2/zz_mssqlservervulnerabilityassessment_types.go b/apis/sql/v1beta2/zz_mssqlservervulnerabilityassessment_types.go index 244ab7440..1a38fcf23 100755 --- a/apis/sql/v1beta2/zz_mssqlservervulnerabilityassessment_types.go +++ b/apis/sql/v1beta2/zz_mssqlservervulnerabilityassessment_types.go @@ -31,8 +31,14 @@ type MSSQLServerVulnerabilityAssessmentInitParameters struct { // +kubebuilder:validation:Optional ServerSecurityAlertPolicyIDSelector *v1.Selector `json:"serverSecurityAlertPolicyIdSelector,omitempty" tf:"-"` + // Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/). StorageContainerPath *string `json:"storageContainerPath,omitempty" tf:"storage_container_path,omitempty"` + + // A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required. + StorageContainerSASKeySecretRef *v1.SecretKeySelector `json:"storageContainerSasKeySecretRef,omitempty" tf:"-"` } type MSSQLServerVulnerabilityAssessmentObservation struct { diff --git a/apis/storagecache/v1beta2/zz_generated.deepcopy.go b/apis/storagecache/v1beta2/zz_generated.deepcopy.go index 896edff17..47a71b426 100644 --- a/apis/storagecache/v1beta2/zz_generated.deepcopy.go +++ b/apis/storagecache/v1beta2/zz_generated.deepcopy.go @@ -186,6 +186,7 @@ func (in *BindInitParameters) DeepCopyInto(out *BindInitParameters) { *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new BindInitParameters. @@ -426,6 +427,7 @@ func (in *DirectoryActiveDirectoryInitParameters) DeepCopyInto(out *DirectoryAct *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Username != nil { in, out := &in.Username, &out.Username *out = new(string) diff --git a/apis/storagecache/v1beta2/zz_hpccache_terraformed.go b/apis/storagecache/v1beta2/zz_hpccache_terraformed.go index 9e95e05d3..ae6234639 100755 --- a/apis/storagecache/v1beta2/zz_hpccache_terraformed.go +++ b/apis/storagecache/v1beta2/zz_hpccache_terraformed.go @@ -21,7 +21,7 @@ func (mg *HPCCache) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this HPCCache func (tr *HPCCache) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"directory_active_directory[*].password": "spec.forProvider.directoryActiveDirectory[*].passwordSecretRef", "directory_ldap[*].bind[*].password": "spec.forProvider.directoryLdap[*].bind[*].passwordSecretRef"} + return map[string]string{"directory_active_directory[*].password": "directoryActiveDirectory[*].passwordSecretRef", "directory_ldap[*].bind[*].password": "directoryLdap[*].bind[*].passwordSecretRef"} } // GetObservation of this HPCCache diff --git a/apis/storagecache/v1beta2/zz_hpccache_types.go b/apis/storagecache/v1beta2/zz_hpccache_types.go index 630e6ffc3..426619378 100755 --- a/apis/storagecache/v1beta2/zz_hpccache_types.go +++ b/apis/storagecache/v1beta2/zz_hpccache_types.go @@ -106,6 +106,9 @@ type BindInitParameters struct { // The Bind Distinguished Name (DN) identity to be used in the secure LDAP connection. Dn *string `json:"dn,omitempty" tf:"dn,omitempty"` + + // The password of the Active Directory domain administrator. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` } type BindObservation struct { @@ -121,7 +124,7 @@ type BindParameters struct { Dn *string `json:"dn" tf:"dn,omitempty"` // The password of the Active Directory domain administrator. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` } @@ -190,6 +193,9 @@ type DirectoryActiveDirectoryInitParameters struct { // The Active Directory domain's NetBIOS name. DomainNetbiosName *string `json:"domainNetbiosName,omitempty" tf:"domain_netbios_name,omitempty"` + // The password of the Active Directory domain administrator. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The username of the Active Directory domain administrator. Username *string `json:"username,omitempty" tf:"username,omitempty"` } @@ -238,7 +244,7 @@ type DirectoryActiveDirectoryParameters struct { DomainNetbiosName *string `json:"domainNetbiosName" tf:"domain_netbios_name,omitempty"` // The password of the Active Directory domain administrator. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` // The username of the Active Directory domain administrator. diff --git a/apis/streamanalytics/v1beta1/zz_generated.deepcopy.go b/apis/streamanalytics/v1beta1/zz_generated.deepcopy.go index f67c91893..134103922 100644 --- a/apis/streamanalytics/v1beta1/zz_generated.deepcopy.go +++ b/apis/streamanalytics/v1beta1/zz_generated.deepcopy.go @@ -2316,6 +2316,7 @@ func (in *OutputFunction) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *OutputFunctionInitParameters) DeepCopyInto(out *OutputFunctionInitParameters) { *out = *in + out.APIKeySecretRef = in.APIKeySecretRef if in.BatchMaxCount != nil { in, out := &in.BatchMaxCount, &out.BatchMaxCount *out = new(float64) @@ -2641,6 +2642,11 @@ func (in *OutputMSSQLInitParameters) DeepCopyInto(out *OutputMSSQLInitParameters *out = new(string) **out = **in } + if in.PasswordSecretRef != nil { + in, out := &in.PasswordSecretRef, &out.PasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ResourceGroupName != nil { in, out := &in.ResourceGroupName, &out.ResourceGroupName *out = new(string) @@ -4391,6 +4397,7 @@ func (in *OutputSynapseInitParameters) DeepCopyInto(out *OutputSynapseInitParame *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.Server != nil { in, out := &in.Server, &out.Server *out = new(string) @@ -4677,6 +4684,7 @@ func (in *OutputTableInitParameters) DeepCopyInto(out *OutputTableInitParameters *out = new(string) **out = **in } + out.StorageAccountKeySecretRef = in.StorageAccountKeySecretRef if in.StorageAccountName != nil { in, out := &in.StorageAccountName, &out.StorageAccountName *out = new(string) @@ -5474,6 +5482,7 @@ func (in *ReferenceInputMSSQLInitParameters) DeepCopyInto(out *ReferenceInputMSS *out = new(string) **out = **in } + out.PasswordSecretRef = in.PasswordSecretRef if in.RefreshIntervalDuration != nil { in, out := &in.RefreshIntervalDuration, &out.RefreshIntervalDuration *out = new(string) diff --git a/apis/streamanalytics/v1beta1/zz_outputfunction_terraformed.go b/apis/streamanalytics/v1beta1/zz_outputfunction_terraformed.go index 28c28c2a3..c30509ed6 100755 --- a/apis/streamanalytics/v1beta1/zz_outputfunction_terraformed.go +++ b/apis/streamanalytics/v1beta1/zz_outputfunction_terraformed.go @@ -21,7 +21,7 @@ func (mg *OutputFunction) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this OutputFunction func (tr *OutputFunction) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"api_key": "spec.forProvider.apiKeySecretRef"} + return map[string]string{"api_key": "apiKeySecretRef"} } // GetObservation of this OutputFunction diff --git a/apis/streamanalytics/v1beta1/zz_outputfunction_types.go b/apis/streamanalytics/v1beta1/zz_outputfunction_types.go index 5068323ff..e7efdbf59 100755 --- a/apis/streamanalytics/v1beta1/zz_outputfunction_types.go +++ b/apis/streamanalytics/v1beta1/zz_outputfunction_types.go @@ -15,6 +15,9 @@ import ( type OutputFunctionInitParameters struct { + // The API key for the Function. + APIKeySecretRef v1.SecretKeySelector `json:"apiKeySecretRef" tf:"-"` + // The maximum number of events in each batch that's sent to the function. Defaults to 100. BatchMaxCount *float64 `json:"batchMaxCount,omitempty" tf:"batch_max_count,omitempty"` diff --git a/apis/streamanalytics/v1beta1/zz_outputmssql_terraformed.go b/apis/streamanalytics/v1beta1/zz_outputmssql_terraformed.go index af3d55df1..61a3b4e4d 100755 --- a/apis/streamanalytics/v1beta1/zz_outputmssql_terraformed.go +++ b/apis/streamanalytics/v1beta1/zz_outputmssql_terraformed.go @@ -21,7 +21,7 @@ func (mg *OutputMSSQL) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this OutputMSSQL func (tr *OutputMSSQL) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this OutputMSSQL diff --git a/apis/streamanalytics/v1beta1/zz_outputmssql_types.go b/apis/streamanalytics/v1beta1/zz_outputmssql_types.go index 1bd4254a9..e82128bd8 100755 --- a/apis/streamanalytics/v1beta1/zz_outputmssql_types.go +++ b/apis/streamanalytics/v1beta1/zz_outputmssql_types.go @@ -30,6 +30,9 @@ type OutputMSSQLInitParameters struct { // The name of the Stream Output. Changing this forces a new resource to be created. Name *string `json:"name,omitempty" tf:"name,omitempty"` + // Password used together with username, to login to the Microsoft SQL Server. Required if authentication_mode is ConnectionString. + PasswordSecretRef *v1.SecretKeySelector `json:"passwordSecretRef,omitempty" tf:"-"` + // The name of the Resource Group where the Stream Analytics Job exists. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/azure/v1beta1.ResourceGroup ResourceGroupName *string `json:"resourceGroupName,omitempty" tf:"resource_group_name,omitempty"` diff --git a/apis/streamanalytics/v1beta1/zz_outputsynapse_terraformed.go b/apis/streamanalytics/v1beta1/zz_outputsynapse_terraformed.go index 88f0b3f32..7b3f09291 100755 --- a/apis/streamanalytics/v1beta1/zz_outputsynapse_terraformed.go +++ b/apis/streamanalytics/v1beta1/zz_outputsynapse_terraformed.go @@ -21,7 +21,7 @@ func (mg *OutputSynapse) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this OutputSynapse func (tr *OutputSynapse) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this OutputSynapse diff --git a/apis/streamanalytics/v1beta1/zz_outputsynapse_types.go b/apis/streamanalytics/v1beta1/zz_outputsynapse_types.go index ae2176b31..c81c0bf50 100755 --- a/apis/streamanalytics/v1beta1/zz_outputsynapse_types.go +++ b/apis/streamanalytics/v1beta1/zz_outputsynapse_types.go @@ -18,6 +18,9 @@ type OutputSynapseInitParameters struct { // The name of the Azure SQL database. Changing this forces a new resource to be created. Database *string `json:"database,omitempty" tf:"database,omitempty"` + // The password that will be used to connect to the Azure SQL database. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The name of the SQL server containing the Azure SQL database. Changing this forces a new resource to be created. Server *string `json:"server,omitempty" tf:"server,omitempty"` diff --git a/apis/streamanalytics/v1beta1/zz_outputtable_terraformed.go b/apis/streamanalytics/v1beta1/zz_outputtable_terraformed.go index 886f93110..5c21b4143 100755 --- a/apis/streamanalytics/v1beta1/zz_outputtable_terraformed.go +++ b/apis/streamanalytics/v1beta1/zz_outputtable_terraformed.go @@ -21,7 +21,7 @@ func (mg *OutputTable) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this OutputTable func (tr *OutputTable) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_key": "spec.forProvider.storageAccountKeySecretRef"} + return map[string]string{"storage_account_key": "storageAccountKeySecretRef"} } // GetObservation of this OutputTable diff --git a/apis/streamanalytics/v1beta1/zz_outputtable_types.go b/apis/streamanalytics/v1beta1/zz_outputtable_types.go index 8d1cdf1eb..2762f8f34 100755 --- a/apis/streamanalytics/v1beta1/zz_outputtable_types.go +++ b/apis/streamanalytics/v1beta1/zz_outputtable_types.go @@ -27,6 +27,9 @@ type OutputTableInitParameters struct { // The name of the output column that contains the row key. RowKey *string `json:"rowKey,omitempty" tf:"row_key,omitempty"` + // The Access Key which should be used to connect to this Storage Account. + StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` + // The name of the Storage Account. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account StorageAccountName *string `json:"storageAccountName,omitempty" tf:"storage_account_name,omitempty"` diff --git a/apis/streamanalytics/v1beta1/zz_referenceinputmssql_terraformed.go b/apis/streamanalytics/v1beta1/zz_referenceinputmssql_terraformed.go index ad47b9311..8172e91c7 100755 --- a/apis/streamanalytics/v1beta1/zz_referenceinputmssql_terraformed.go +++ b/apis/streamanalytics/v1beta1/zz_referenceinputmssql_terraformed.go @@ -21,7 +21,7 @@ func (mg *ReferenceInputMSSQL) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this ReferenceInputMSSQL func (tr *ReferenceInputMSSQL) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"password": "spec.forProvider.passwordSecretRef"} + return map[string]string{"password": "passwordSecretRef"} } // GetObservation of this ReferenceInputMSSQL diff --git a/apis/streamanalytics/v1beta1/zz_referenceinputmssql_types.go b/apis/streamanalytics/v1beta1/zz_referenceinputmssql_types.go index 1ae402333..531da2064 100755 --- a/apis/streamanalytics/v1beta1/zz_referenceinputmssql_types.go +++ b/apis/streamanalytics/v1beta1/zz_referenceinputmssql_types.go @@ -33,6 +33,9 @@ type ReferenceInputMSSQLInitParameters struct { // The query used to retrieve the reference data from the MS SQL database. FullSnapshotQuery *string `json:"fullSnapshotQuery,omitempty" tf:"full_snapshot_query,omitempty"` + // The password to connect to the MS SQL database. + PasswordSecretRef v1.SecretKeySelector `json:"passwordSecretRef" tf:"-"` + // The frequency in hh:mm:ss with which the reference data should be retrieved from the MS SQL database e.g. 00:20:00 for every 20 minutes. Must be set when refresh_type is RefreshPeriodicallyWithFull or RefreshPeriodicallyWithDelta. RefreshIntervalDuration *string `json:"refreshIntervalDuration,omitempty" tf:"refresh_interval_duration,omitempty"` diff --git a/apis/streamanalytics/v1beta2/zz_generated.deepcopy.go b/apis/streamanalytics/v1beta2/zz_generated.deepcopy.go index 958b83d17..1b49febfe 100644 --- a/apis/streamanalytics/v1beta2/zz_generated.deepcopy.go +++ b/apis/streamanalytics/v1beta2/zz_generated.deepcopy.go @@ -872,6 +872,7 @@ func (in *JobStatus) DeepCopy() *JobStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *JobStorageAccountInitParameters) DeepCopyInto(out *JobStorageAccountInitParameters) { *out = *in + out.AccountKeySecretRef = in.AccountKeySecretRef if in.AccountName != nil { in, out := &in.AccountName, &out.AccountName *out = new(string) @@ -1010,6 +1011,11 @@ func (in *OutputBlobInitParameters) DeepCopyInto(out *OutputBlobInitParameters) *out = new(SerializationInitParameters) (*in).DeepCopyInto(*out) } + if in.StorageAccountKeySecretRef != nil { + in, out := &in.StorageAccountKeySecretRef, &out.StorageAccountKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageAccountName != nil { in, out := &in.StorageAccountName, &out.StorageAccountName *out = new(string) @@ -1425,6 +1431,11 @@ func (in *OutputEventHubInitParameters) DeepCopyInto(out *OutputEventHubInitPara *out = new(v1.Selector) (*in).DeepCopyInto(*out) } + if in.SharedAccessPolicyKeySecretRef != nil { + in, out := &in.SharedAccessPolicyKeySecretRef, &out.SharedAccessPolicyKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SharedAccessPolicyName != nil { in, out := &in.SharedAccessPolicyName, &out.SharedAccessPolicyName *out = new(string) @@ -1947,6 +1958,11 @@ func (in *OutputServiceBusQueueInitParameters) DeepCopyInto(out *OutputServiceBu *out = new(v1.Selector) (*in).DeepCopyInto(*out) } + if in.SharedAccessPolicyKeySecretRef != nil { + in, out := &in.SharedAccessPolicyKeySecretRef, &out.SharedAccessPolicyKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SharedAccessPolicyName != nil { in, out := &in.SharedAccessPolicyName, &out.SharedAccessPolicyName *out = new(string) @@ -2467,6 +2483,11 @@ func (in *OutputServiceBusTopicInitParameters) DeepCopyInto(out *OutputServiceBu *out = new(v1.Selector) (*in).DeepCopyInto(*out) } + if in.SharedAccessPolicyKeySecretRef != nil { + in, out := &in.SharedAccessPolicyKeySecretRef, &out.SharedAccessPolicyKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SharedAccessPolicyName != nil { in, out := &in.SharedAccessPolicyName, &out.SharedAccessPolicyName *out = new(string) @@ -2986,6 +3007,11 @@ func (in *ReferenceInputBlobInitParameters) DeepCopyInto(out *ReferenceInputBlob *out = new(ReferenceInputBlobSerializationInitParameters) (*in).DeepCopyInto(*out) } + if in.StorageAccountKeySecretRef != nil { + in, out := &in.StorageAccountKeySecretRef, &out.StorageAccountKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageAccountName != nil { in, out := &in.StorageAccountName, &out.StorageAccountName *out = new(string) @@ -3555,6 +3581,7 @@ func (in *StreamInputBlobInitParameters) DeepCopyInto(out *StreamInputBlobInitPa *out = new(StreamInputBlobSerializationInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountKeySecretRef = in.StorageAccountKeySecretRef if in.StorageAccountName != nil { in, out := &in.StorageAccountName, &out.StorageAccountName *out = new(string) @@ -4050,6 +4077,11 @@ func (in *StreamInputEventHubInitParameters) DeepCopyInto(out *StreamInputEventH *out = new(v1.Selector) (*in).DeepCopyInto(*out) } + if in.SharedAccessPolicyKeySecretRef != nil { + in, out := &in.SharedAccessPolicyKeySecretRef, &out.SharedAccessPolicyKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SharedAccessPolicyName != nil { in, out := &in.SharedAccessPolicyName, &out.SharedAccessPolicyName *out = new(string) @@ -4519,6 +4551,7 @@ func (in *StreamInputIOTHubInitParameters) DeepCopyInto(out *StreamInputIOTHubIn *out = new(StreamInputIOTHubSerializationInitParameters) (*in).DeepCopyInto(*out) } + out.SharedAccessPolicyKeySecretRef = in.SharedAccessPolicyKeySecretRef if in.SharedAccessPolicyName != nil { in, out := &in.SharedAccessPolicyName, &out.SharedAccessPolicyName *out = new(string) diff --git a/apis/streamanalytics/v1beta2/zz_job_terraformed.go b/apis/streamanalytics/v1beta2/zz_job_terraformed.go index 0abd18d80..edb30468a 100755 --- a/apis/streamanalytics/v1beta2/zz_job_terraformed.go +++ b/apis/streamanalytics/v1beta2/zz_job_terraformed.go @@ -21,7 +21,7 @@ func (mg *Job) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Job func (tr *Job) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"job_storage_account[*].account_key": "spec.forProvider.jobStorageAccount[*].accountKeySecretRef"} + return map[string]string{"job_storage_account[*].account_key": "jobStorageAccount[*].accountKeySecretRef"} } // GetObservation of this Job diff --git a/apis/streamanalytics/v1beta2/zz_job_types.go b/apis/streamanalytics/v1beta2/zz_job_types.go index 2d9198afa..9ae6712a6 100755 --- a/apis/streamanalytics/v1beta2/zz_job_types.go +++ b/apis/streamanalytics/v1beta2/zz_job_types.go @@ -247,6 +247,9 @@ type JobParameters struct { type JobStorageAccountInitParameters struct { + // The account key for the Azure storage account. + AccountKeySecretRef v1.SecretKeySelector `json:"accountKeySecretRef" tf:"-"` + // The name of the Azure storage account. AccountName *string `json:"accountName,omitempty" tf:"account_name,omitempty"` @@ -266,7 +269,7 @@ type JobStorageAccountObservation struct { type JobStorageAccountParameters struct { // The account key for the Azure storage account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AccountKeySecretRef v1.SecretKeySelector `json:"accountKeySecretRef" tf:"-"` // The name of the Azure storage account. diff --git a/apis/streamanalytics/v1beta2/zz_outputblob_terraformed.go b/apis/streamanalytics/v1beta2/zz_outputblob_terraformed.go index f49584d9c..58f3c822a 100755 --- a/apis/streamanalytics/v1beta2/zz_outputblob_terraformed.go +++ b/apis/streamanalytics/v1beta2/zz_outputblob_terraformed.go @@ -21,7 +21,7 @@ func (mg *OutputBlob) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this OutputBlob func (tr *OutputBlob) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_key": "spec.forProvider.storageAccountKeySecretRef"} + return map[string]string{"storage_account_key": "storageAccountKeySecretRef"} } // GetObservation of this OutputBlob diff --git a/apis/streamanalytics/v1beta2/zz_outputblob_types.go b/apis/streamanalytics/v1beta2/zz_outputblob_types.go index 95ad93287..e0692a502 100755 --- a/apis/streamanalytics/v1beta2/zz_outputblob_types.go +++ b/apis/streamanalytics/v1beta2/zz_outputblob_types.go @@ -36,6 +36,9 @@ type OutputBlobInitParameters struct { // A serialization block as defined below. Serialization *SerializationInitParameters `json:"serialization,omitempty" tf:"serialization,omitempty"` + // The Access Key which should be used to connect to this Storage Account. + StorageAccountKeySecretRef *v1.SecretKeySelector `json:"storageAccountKeySecretRef,omitempty" tf:"-"` + // The name of the Storage Account. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account StorageAccountName *string `json:"storageAccountName,omitempty" tf:"storage_account_name,omitempty"` diff --git a/apis/streamanalytics/v1beta2/zz_outputeventhub_terraformed.go b/apis/streamanalytics/v1beta2/zz_outputeventhub_terraformed.go index 99748ea0d..a69b2299b 100755 --- a/apis/streamanalytics/v1beta2/zz_outputeventhub_terraformed.go +++ b/apis/streamanalytics/v1beta2/zz_outputeventhub_terraformed.go @@ -21,7 +21,7 @@ func (mg *OutputEventHub) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this OutputEventHub func (tr *OutputEventHub) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"shared_access_policy_key": "spec.forProvider.sharedAccessPolicyKeySecretRef"} + return map[string]string{"shared_access_policy_key": "sharedAccessPolicyKeySecretRef"} } // GetObservation of this OutputEventHub diff --git a/apis/streamanalytics/v1beta2/zz_outputeventhub_types.go b/apis/streamanalytics/v1beta2/zz_outputeventhub_types.go index e50d6b1f2..8f80fba6b 100755 --- a/apis/streamanalytics/v1beta2/zz_outputeventhub_types.go +++ b/apis/streamanalytics/v1beta2/zz_outputeventhub_types.go @@ -51,6 +51,9 @@ type OutputEventHubInitParameters struct { // +kubebuilder:validation:Optional ServiceBusNamespaceSelector *v1.Selector `json:"servicebusNamespaceSelector,omitempty" tf:"-"` + // The shared access policy key for the specified shared access policy. Required when authentication_mode is set to ConnectionString. + SharedAccessPolicyKeySecretRef *v1.SecretKeySelector `json:"sharedAccessPolicyKeySecretRef,omitempty" tf:"-"` + // The shared access policy name for the Event Hub, Service Bus Queue, Service Bus Topic, etc. Required when authentication_mode is set to ConnectionString. SharedAccessPolicyName *string `json:"sharedAccessPolicyName,omitempty" tf:"shared_access_policy_name,omitempty"` } diff --git a/apis/streamanalytics/v1beta2/zz_outputservicebusqueue_terraformed.go b/apis/streamanalytics/v1beta2/zz_outputservicebusqueue_terraformed.go index 08ed0d1f9..0592ce6ee 100755 --- a/apis/streamanalytics/v1beta2/zz_outputservicebusqueue_terraformed.go +++ b/apis/streamanalytics/v1beta2/zz_outputservicebusqueue_terraformed.go @@ -21,7 +21,7 @@ func (mg *OutputServiceBusQueue) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this OutputServiceBusQueue func (tr *OutputServiceBusQueue) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"shared_access_policy_key": "spec.forProvider.sharedAccessPolicyKeySecretRef"} + return map[string]string{"shared_access_policy_key": "sharedAccessPolicyKeySecretRef"} } // GetObservation of this OutputServiceBusQueue diff --git a/apis/streamanalytics/v1beta2/zz_outputservicebusqueue_types.go b/apis/streamanalytics/v1beta2/zz_outputservicebusqueue_types.go index f83d2a854..f69f2fc20 100755 --- a/apis/streamanalytics/v1beta2/zz_outputservicebusqueue_types.go +++ b/apis/streamanalytics/v1beta2/zz_outputservicebusqueue_types.go @@ -63,6 +63,9 @@ type OutputServiceBusQueueInitParameters struct { // +kubebuilder:validation:Optional ServiceBusNamespaceSelector *v1.Selector `json:"servicebusNamespaceSelector,omitempty" tf:"-"` + // The shared access policy key for the specified shared access policy. Required if authentication_mode is ConnectionString. + SharedAccessPolicyKeySecretRef *v1.SecretKeySelector `json:"sharedAccessPolicyKeySecretRef,omitempty" tf:"-"` + // The shared access policy name for the Event Hub, Service Bus Queue, Service Bus Topic, etc. Required if authentication_mode is ConnectionString. SharedAccessPolicyName *string `json:"sharedAccessPolicyName,omitempty" tf:"shared_access_policy_name,omitempty"` diff --git a/apis/streamanalytics/v1beta2/zz_outputservicebustopic_terraformed.go b/apis/streamanalytics/v1beta2/zz_outputservicebustopic_terraformed.go index ed8c3ca0f..d53b282e1 100755 --- a/apis/streamanalytics/v1beta2/zz_outputservicebustopic_terraformed.go +++ b/apis/streamanalytics/v1beta2/zz_outputservicebustopic_terraformed.go @@ -21,7 +21,7 @@ func (mg *OutputServiceBusTopic) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this OutputServiceBusTopic func (tr *OutputServiceBusTopic) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"shared_access_policy_key": "spec.forProvider.sharedAccessPolicyKeySecretRef"} + return map[string]string{"shared_access_policy_key": "sharedAccessPolicyKeySecretRef"} } // GetObservation of this OutputServiceBusTopic diff --git a/apis/streamanalytics/v1beta2/zz_outputservicebustopic_types.go b/apis/streamanalytics/v1beta2/zz_outputservicebustopic_types.go index 21f10b47a..7f26a1327 100755 --- a/apis/streamanalytics/v1beta2/zz_outputservicebustopic_types.go +++ b/apis/streamanalytics/v1beta2/zz_outputservicebustopic_types.go @@ -51,6 +51,9 @@ type OutputServiceBusTopicInitParameters struct { // +kubebuilder:validation:Optional ServiceBusNamespaceSelector *v1.Selector `json:"servicebusNamespaceSelector,omitempty" tf:"-"` + // The shared access policy key for the specified shared access policy. Required if authentication_mode is ConnectionString. + SharedAccessPolicyKeySecretRef *v1.SecretKeySelector `json:"sharedAccessPolicyKeySecretRef,omitempty" tf:"-"` + // The shared access policy name for the Event Hub, Service Bus Queue, Service Bus Topic, etc. Required if authentication_mode is ConnectionString. SharedAccessPolicyName *string `json:"sharedAccessPolicyName,omitempty" tf:"shared_access_policy_name,omitempty"` diff --git a/apis/streamanalytics/v1beta2/zz_referenceinputblob_terraformed.go b/apis/streamanalytics/v1beta2/zz_referenceinputblob_terraformed.go index e45a5dc64..6e150b434 100755 --- a/apis/streamanalytics/v1beta2/zz_referenceinputblob_terraformed.go +++ b/apis/streamanalytics/v1beta2/zz_referenceinputblob_terraformed.go @@ -21,7 +21,7 @@ func (mg *ReferenceInputBlob) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this ReferenceInputBlob func (tr *ReferenceInputBlob) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_key": "spec.forProvider.storageAccountKeySecretRef"} + return map[string]string{"storage_account_key": "storageAccountKeySecretRef"} } // GetObservation of this ReferenceInputBlob diff --git a/apis/streamanalytics/v1beta2/zz_referenceinputblob_types.go b/apis/streamanalytics/v1beta2/zz_referenceinputblob_types.go index 3460db99d..6d89ed499 100755 --- a/apis/streamanalytics/v1beta2/zz_referenceinputblob_types.go +++ b/apis/streamanalytics/v1beta2/zz_referenceinputblob_types.go @@ -42,6 +42,9 @@ type ReferenceInputBlobInitParameters struct { // A serialization block as defined below. Serialization *ReferenceInputBlobSerializationInitParameters `json:"serialization,omitempty" tf:"serialization,omitempty"` + // The Access Key which should be used to connect to this Storage Account. Required if authentication_mode is ConnectionString. + StorageAccountKeySecretRef *v1.SecretKeySelector `json:"storageAccountKeySecretRef,omitempty" tf:"-"` + // The name of the Storage Account that has the blob container with reference data. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account StorageAccountName *string `json:"storageAccountName,omitempty" tf:"storage_account_name,omitempty"` diff --git a/apis/streamanalytics/v1beta2/zz_streaminputblob_terraformed.go b/apis/streamanalytics/v1beta2/zz_streaminputblob_terraformed.go index 205960d0d..a019cc3dc 100755 --- a/apis/streamanalytics/v1beta2/zz_streaminputblob_terraformed.go +++ b/apis/streamanalytics/v1beta2/zz_streaminputblob_terraformed.go @@ -21,7 +21,7 @@ func (mg *StreamInputBlob) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this StreamInputBlob func (tr *StreamInputBlob) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_key": "spec.forProvider.storageAccountKeySecretRef"} + return map[string]string{"storage_account_key": "storageAccountKeySecretRef"} } // GetObservation of this StreamInputBlob diff --git a/apis/streamanalytics/v1beta2/zz_streaminputblob_types.go b/apis/streamanalytics/v1beta2/zz_streaminputblob_types.go index dfa7e947b..00cf28a14 100755 --- a/apis/streamanalytics/v1beta2/zz_streaminputblob_types.go +++ b/apis/streamanalytics/v1beta2/zz_streaminputblob_types.go @@ -39,6 +39,9 @@ type StreamInputBlobInitParameters struct { // A serialization block as defined below. Serialization *StreamInputBlobSerializationInitParameters `json:"serialization,omitempty" tf:"serialization,omitempty"` + // The Access Key which should be used to connect to this Storage Account. + StorageAccountKeySecretRef v1.SecretKeySelector `json:"storageAccountKeySecretRef" tf:"-"` + // The name of the Storage Account. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account StorageAccountName *string `json:"storageAccountName,omitempty" tf:"storage_account_name,omitempty"` diff --git a/apis/streamanalytics/v1beta2/zz_streaminputeventhub_terraformed.go b/apis/streamanalytics/v1beta2/zz_streaminputeventhub_terraformed.go index afb461f62..7d9094eff 100755 --- a/apis/streamanalytics/v1beta2/zz_streaminputeventhub_terraformed.go +++ b/apis/streamanalytics/v1beta2/zz_streaminputeventhub_terraformed.go @@ -21,7 +21,7 @@ func (mg *StreamInputEventHub) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this StreamInputEventHub func (tr *StreamInputEventHub) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"shared_access_policy_key": "spec.forProvider.sharedAccessPolicyKeySecretRef"} + return map[string]string{"shared_access_policy_key": "sharedAccessPolicyKeySecretRef"} } // GetObservation of this StreamInputEventHub diff --git a/apis/streamanalytics/v1beta2/zz_streaminputeventhub_types.go b/apis/streamanalytics/v1beta2/zz_streaminputeventhub_types.go index 7dba4b38b..a2a92fdfc 100755 --- a/apis/streamanalytics/v1beta2/zz_streaminputeventhub_types.go +++ b/apis/streamanalytics/v1beta2/zz_streaminputeventhub_types.go @@ -75,6 +75,9 @@ type StreamInputEventHubInitParameters struct { // +kubebuilder:validation:Optional ServiceBusNamespaceSelector *v1.Selector `json:"servicebusNamespaceSelector,omitempty" tf:"-"` + // The shared access policy key for the specified shared access policy. + SharedAccessPolicyKeySecretRef *v1.SecretKeySelector `json:"sharedAccessPolicyKeySecretRef,omitempty" tf:"-"` + // The shared access policy name for the Event Hub, Service Bus Queue, Service Bus Topic, etc. SharedAccessPolicyName *string `json:"sharedAccessPolicyName,omitempty" tf:"shared_access_policy_name,omitempty"` diff --git a/apis/streamanalytics/v1beta2/zz_streaminputiothub_terraformed.go b/apis/streamanalytics/v1beta2/zz_streaminputiothub_terraformed.go index 4fa149a1f..24b064cfe 100755 --- a/apis/streamanalytics/v1beta2/zz_streaminputiothub_terraformed.go +++ b/apis/streamanalytics/v1beta2/zz_streaminputiothub_terraformed.go @@ -21,7 +21,7 @@ func (mg *StreamInputIOTHub) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this StreamInputIOTHub func (tr *StreamInputIOTHub) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"shared_access_policy_key": "spec.forProvider.sharedAccessPolicyKeySecretRef"} + return map[string]string{"shared_access_policy_key": "sharedAccessPolicyKeySecretRef"} } // GetObservation of this StreamInputIOTHub diff --git a/apis/streamanalytics/v1beta2/zz_streaminputiothub_types.go b/apis/streamanalytics/v1beta2/zz_streaminputiothub_types.go index c5f5fdadb..9f6d7d907 100755 --- a/apis/streamanalytics/v1beta2/zz_streaminputiothub_types.go +++ b/apis/streamanalytics/v1beta2/zz_streaminputiothub_types.go @@ -60,6 +60,9 @@ type StreamInputIOTHubInitParameters struct { // A serialization block as defined below. Serialization *StreamInputIOTHubSerializationInitParameters `json:"serialization,omitempty" tf:"serialization,omitempty"` + // The shared access policy key for the specified shared access policy. Changing this forces a new resource to be created. + SharedAccessPolicyKeySecretRef v1.SecretKeySelector `json:"sharedAccessPolicyKeySecretRef" tf:"-"` + // The shared access policy name for the Event Hub, Service Bus Queue, Service Bus Topic, etc. SharedAccessPolicyName *string `json:"sharedAccessPolicyName,omitempty" tf:"shared_access_policy_name,omitempty"` diff --git a/apis/synapse/v1beta1/zz_generated.deepcopy.go b/apis/synapse/v1beta1/zz_generated.deepcopy.go index f868d2041..403a4f2d0 100644 --- a/apis/synapse/v1beta1/zz_generated.deepcopy.go +++ b/apis/synapse/v1beta1/zz_generated.deepcopy.go @@ -2975,6 +2975,11 @@ func (in *SQLPoolExtendedAuditingPolicyInitParameters) DeepCopyInto(out *SQLPool *out = new(bool) **out = **in } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageEndpoint != nil { in, out := &in.StorageEndpoint, &out.StorageEndpoint *out = new(string) @@ -3522,6 +3527,11 @@ func (in *SQLPoolSecurityAlertPolicyInitParameters) DeepCopyInto(out *SQLPoolSec *out = new(float64) **out = **in } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageEndpoint != nil { in, out := &in.StorageEndpoint, &out.StorageEndpoint *out = new(string) @@ -5145,6 +5155,11 @@ func (in *WorkspaceExtendedAuditingPolicyInitParameters) DeepCopyInto(out *Works *out = new(bool) **out = **in } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageEndpoint != nil { in, out := &in.StorageEndpoint, &out.StorageEndpoint *out = new(string) @@ -6195,6 +6210,11 @@ func (in *WorkspaceSecurityAlertPolicyInitParameters) DeepCopyInto(out *Workspac *out = new(float64) **out = **in } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageEndpoint != nil { in, out := &in.StorageEndpoint, &out.StorageEndpoint *out = new(string) diff --git a/apis/synapse/v1beta1/zz_sqlpoolextendedauditingpolicy_terraformed.go b/apis/synapse/v1beta1/zz_sqlpoolextendedauditingpolicy_terraformed.go index 80bcbd873..60af25b78 100755 --- a/apis/synapse/v1beta1/zz_sqlpoolextendedauditingpolicy_terraformed.go +++ b/apis/synapse/v1beta1/zz_sqlpoolextendedauditingpolicy_terraformed.go @@ -21,7 +21,7 @@ func (mg *SQLPoolExtendedAuditingPolicy) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this SQLPoolExtendedAuditingPolicy func (tr *SQLPoolExtendedAuditingPolicy) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this SQLPoolExtendedAuditingPolicy diff --git a/apis/synapse/v1beta1/zz_sqlpoolextendedauditingpolicy_types.go b/apis/synapse/v1beta1/zz_sqlpoolextendedauditingpolicy_types.go index ad13b66ff..f863bf1c5 100755 --- a/apis/synapse/v1beta1/zz_sqlpoolextendedauditingpolicy_types.go +++ b/apis/synapse/v1beta1/zz_sqlpoolextendedauditingpolicy_types.go @@ -24,6 +24,9 @@ type SQLPoolExtendedAuditingPolicyInitParameters struct { // Is storage_account_access_key value the storage's secondary key? StorageAccountAccessKeyIsSecondary *bool `json:"storageAccountAccessKeyIsSecondary,omitempty" tf:"storage_account_access_key_is_secondary,omitempty"` + // The access key to use for the auditing storage account. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // The blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all extended auditing logs. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("primary_blob_endpoint",true) diff --git a/apis/synapse/v1beta1/zz_sqlpoolsecurityalertpolicy_terraformed.go b/apis/synapse/v1beta1/zz_sqlpoolsecurityalertpolicy_terraformed.go index 7da4794e1..6e09e99f0 100755 --- a/apis/synapse/v1beta1/zz_sqlpoolsecurityalertpolicy_terraformed.go +++ b/apis/synapse/v1beta1/zz_sqlpoolsecurityalertpolicy_terraformed.go @@ -21,7 +21,7 @@ func (mg *SQLPoolSecurityAlertPolicy) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this SQLPoolSecurityAlertPolicy func (tr *SQLPoolSecurityAlertPolicy) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this SQLPoolSecurityAlertPolicy diff --git a/apis/synapse/v1beta1/zz_sqlpoolsecurityalertpolicy_types.go b/apis/synapse/v1beta1/zz_sqlpoolsecurityalertpolicy_types.go index 96696c979..71be59b8c 100755 --- a/apis/synapse/v1beta1/zz_sqlpoolsecurityalertpolicy_types.go +++ b/apis/synapse/v1beta1/zz_sqlpoolsecurityalertpolicy_types.go @@ -32,6 +32,9 @@ type SQLPoolSecurityAlertPolicyInitParameters struct { // Specifies the number of days to keep in the Threat Detection audit logs. Defaults to 0. RetentionDays *float64 `json:"retentionDays,omitempty" tf:"retention_days,omitempty"` + // Specifies the identifier key of the Threat Detection audit storage account. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("primary_blob_endpoint",true) diff --git a/apis/synapse/v1beta1/zz_workspaceextendedauditingpolicy_terraformed.go b/apis/synapse/v1beta1/zz_workspaceextendedauditingpolicy_terraformed.go index 2dac3ee17..eed39a677 100755 --- a/apis/synapse/v1beta1/zz_workspaceextendedauditingpolicy_terraformed.go +++ b/apis/synapse/v1beta1/zz_workspaceextendedauditingpolicy_terraformed.go @@ -21,7 +21,7 @@ func (mg *WorkspaceExtendedAuditingPolicy) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this WorkspaceExtendedAuditingPolicy func (tr *WorkspaceExtendedAuditingPolicy) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this WorkspaceExtendedAuditingPolicy diff --git a/apis/synapse/v1beta1/zz_workspaceextendedauditingpolicy_types.go b/apis/synapse/v1beta1/zz_workspaceextendedauditingpolicy_types.go index 7096596b5..085a7b7fa 100755 --- a/apis/synapse/v1beta1/zz_workspaceextendedauditingpolicy_types.go +++ b/apis/synapse/v1beta1/zz_workspaceextendedauditingpolicy_types.go @@ -24,6 +24,9 @@ type WorkspaceExtendedAuditingPolicyInitParameters struct { // Is storage_account_access_key value the storage's secondary key? StorageAccountAccessKeyIsSecondary *bool `json:"storageAccountAccessKeyIsSecondary,omitempty" tf:"storage_account_access_key_is_secondary,omitempty"` + // The access key to use for the auditing storage account. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // The blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all extended auditing logs. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("primary_blob_endpoint",true) diff --git a/apis/synapse/v1beta1/zz_workspacesecurityalertpolicy_terraformed.go b/apis/synapse/v1beta1/zz_workspacesecurityalertpolicy_terraformed.go index c51b3ae1e..5308fb539 100755 --- a/apis/synapse/v1beta1/zz_workspacesecurityalertpolicy_terraformed.go +++ b/apis/synapse/v1beta1/zz_workspacesecurityalertpolicy_terraformed.go @@ -21,7 +21,7 @@ func (mg *WorkspaceSecurityAlertPolicy) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this WorkspaceSecurityAlertPolicy func (tr *WorkspaceSecurityAlertPolicy) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this WorkspaceSecurityAlertPolicy diff --git a/apis/synapse/v1beta1/zz_workspacesecurityalertpolicy_types.go b/apis/synapse/v1beta1/zz_workspacesecurityalertpolicy_types.go index 0e3e29d03..c2b33e451 100755 --- a/apis/synapse/v1beta1/zz_workspacesecurityalertpolicy_types.go +++ b/apis/synapse/v1beta1/zz_workspacesecurityalertpolicy_types.go @@ -32,6 +32,9 @@ type WorkspaceSecurityAlertPolicyInitParameters struct { // Specifies the number of days to keep in the Threat Detection audit logs. Defaults to 0. RetentionDays *float64 `json:"retentionDays,omitempty" tf:"retention_days,omitempty"` + // Specifies the identifier key of the Threat Detection audit storage account. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractParamPath("primary_blob_endpoint",true) diff --git a/apis/synapse/v1beta2/zz_generated.deepcopy.go b/apis/synapse/v1beta2/zz_generated.deepcopy.go index 795772511..333dfb866 100644 --- a/apis/synapse/v1beta2/zz_generated.deepcopy.go +++ b/apis/synapse/v1beta2/zz_generated.deepcopy.go @@ -2560,6 +2560,11 @@ func (in *WorkspaceInitParameters) DeepCopyInto(out *WorkspaceInitParameters) { *out = new(string) **out = **in } + if in.SQLAdministratorLoginPasswordSecretRef != nil { + in, out := &in.SQLAdministratorLoginPasswordSecretRef, &out.SQLAdministratorLoginPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.SQLIdentityControlEnabled != nil { in, out := &in.SQLIdentityControlEnabled, &out.SQLIdentityControlEnabled *out = new(bool) @@ -3040,11 +3045,21 @@ func (in *WorkspaceVulnerabilityAssessmentInitParameters) DeepCopyInto(out *Work *out = new(RecurringScansInitParameters) (*in).DeepCopyInto(*out) } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageContainerPath != nil { in, out := &in.StorageContainerPath, &out.StorageContainerPath *out = new(string) **out = **in } + if in.StorageContainerSASKeySecretRef != nil { + in, out := &in.StorageContainerSASKeySecretRef, &out.StorageContainerSASKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.WorkspaceSecurityAlertPolicyID != nil { in, out := &in.WorkspaceSecurityAlertPolicyID, &out.WorkspaceSecurityAlertPolicyID *out = new(string) diff --git a/apis/synapse/v1beta2/zz_workspace_terraformed.go b/apis/synapse/v1beta2/zz_workspace_terraformed.go index ff1092993..d712c40f3 100755 --- a/apis/synapse/v1beta2/zz_workspace_terraformed.go +++ b/apis/synapse/v1beta2/zz_workspace_terraformed.go @@ -21,7 +21,7 @@ func (mg *Workspace) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Workspace func (tr *Workspace) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"sql_administrator_login_password": "spec.forProvider.sqlAdministratorLoginPasswordSecretRef"} + return map[string]string{"sql_administrator_login_password": "sqlAdministratorLoginPasswordSecretRef"} } // GetObservation of this Workspace diff --git a/apis/synapse/v1beta2/zz_workspace_types.go b/apis/synapse/v1beta2/zz_workspace_types.go index 48ec5b1bc..d4678e3da 100755 --- a/apis/synapse/v1beta2/zz_workspace_types.go +++ b/apis/synapse/v1beta2/zz_workspace_types.go @@ -405,6 +405,9 @@ type WorkspaceInitParameters struct { // Specifies The login name of the SQL administrator. Changing this forces a new resource to be created. If this is not provided aad_admin or customer_managed_key must be provided. SQLAdministratorLogin *string `json:"sqlAdministratorLogin,omitempty" tf:"sql_administrator_login,omitempty"` + // The Password associated with the sql_administrator_login for the SQL administrator. If this is not provided aad_admin or customer_managed_key must be provided. + SQLAdministratorLoginPasswordSecretRef *v1.SecretKeySelector `json:"sqlAdministratorLoginPasswordSecretRef,omitempty" tf:"-"` + // Are pipelines (running as workspace's system assigned identity) allowed to access SQL pools? SQLIdentityControlEnabled *bool `json:"sqlIdentityControlEnabled,omitempty" tf:"sql_identity_control_enabled,omitempty"` diff --git a/apis/synapse/v1beta2/zz_workspacevulnerabilityassessment_terraformed.go b/apis/synapse/v1beta2/zz_workspacevulnerabilityassessment_terraformed.go index 805ddf451..12ae9cc9a 100755 --- a/apis/synapse/v1beta2/zz_workspacevulnerabilityassessment_terraformed.go +++ b/apis/synapse/v1beta2/zz_workspacevulnerabilityassessment_terraformed.go @@ -21,7 +21,7 @@ func (mg *WorkspaceVulnerabilityAssessment) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this WorkspaceVulnerabilityAssessment func (tr *WorkspaceVulnerabilityAssessment) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef", "storage_container_sas_key": "spec.forProvider.storageContainerSasKeySecretRef"} + return map[string]string{"storage_account_access_key": "storageAccountAccessKeySecretRef", "storage_container_sas_key": "storageContainerSasKeySecretRef"} } // GetObservation of this WorkspaceVulnerabilityAssessment diff --git a/apis/synapse/v1beta2/zz_workspacevulnerabilityassessment_types.go b/apis/synapse/v1beta2/zz_workspacevulnerabilityassessment_types.go index f4843f8b0..0f5a40928 100755 --- a/apis/synapse/v1beta2/zz_workspacevulnerabilityassessment_types.go +++ b/apis/synapse/v1beta2/zz_workspacevulnerabilityassessment_types.go @@ -57,9 +57,15 @@ type WorkspaceVulnerabilityAssessmentInitParameters struct { // The recurring scans settings. The recurring_scans block supports fields documented below. RecurringScans *RecurringScansInitParameters `json:"recurringScans,omitempty" tf:"recurring_scans,omitempty"` + // Specifies the identifier key of the storage account for vulnerability assessment scan results. If storage_container_sas_key isn't specified, storage_account_access_key is required. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/). StorageContainerPath *string `json:"storageContainerPath,omitempty" tf:"storage_container_path,omitempty"` + // A shared access signature (SAS Key) that has write access to the blob container specified in storage_container_path parameter. If storage_account_access_key isn't specified, storage_container_sas_key is required. + StorageContainerSASKeySecretRef *v1.SecretKeySelector `json:"storageContainerSasKeySecretRef,omitempty" tf:"-"` + // The ID of the security alert policy of the Synapse Workspace. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/synapse/v1beta1.WorkspaceSecurityAlertPolicy // +crossplane:generate:reference:extractor=github.com/crossplane/upjet/pkg/resource.ExtractResourceID() diff --git a/apis/timeseriesinsights/v1beta1/zz_eventsourceeventhub_terraformed.go b/apis/timeseriesinsights/v1beta1/zz_eventsourceeventhub_terraformed.go index 103fbd684..67f29aa53 100755 --- a/apis/timeseriesinsights/v1beta1/zz_eventsourceeventhub_terraformed.go +++ b/apis/timeseriesinsights/v1beta1/zz_eventsourceeventhub_terraformed.go @@ -21,7 +21,7 @@ func (mg *EventSourceEventHub) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this EventSourceEventHub func (tr *EventSourceEventHub) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"shared_access_key": "spec.forProvider.sharedAccessKeySecretRef"} + return map[string]string{"shared_access_key": "sharedAccessKeySecretRef"} } // GetObservation of this EventSourceEventHub diff --git a/apis/timeseriesinsights/v1beta1/zz_eventsourceeventhub_types.go b/apis/timeseriesinsights/v1beta1/zz_eventsourceeventhub_types.go index be35bd29a..6aeb34384 100755 --- a/apis/timeseriesinsights/v1beta1/zz_eventsourceeventhub_types.go +++ b/apis/timeseriesinsights/v1beta1/zz_eventsourceeventhub_types.go @@ -79,6 +79,9 @@ type EventSourceEventHubInitParameters struct { // +kubebuilder:validation:Optional SharedAccessKeyNameSelector *v1.Selector `json:"sharedAccessKeyNameSelector,omitempty" tf:"-"` + // Specifies the value of the Shared Access Policy key that grants the Time Series Insights service read access to the EventHub. + SharedAccessKeySecretRef v1.SecretKeySelector `json:"sharedAccessKeySecretRef" tf:"-"` + // A mapping of tags to assign to the resource. // +mapType=granular Tags map[string]*string `json:"tags,omitempty" tf:"tags,omitempty"` diff --git a/apis/timeseriesinsights/v1beta1/zz_eventsourceiothub_terraformed.go b/apis/timeseriesinsights/v1beta1/zz_eventsourceiothub_terraformed.go index 8e507c5fe..019ddabc3 100755 --- a/apis/timeseriesinsights/v1beta1/zz_eventsourceiothub_terraformed.go +++ b/apis/timeseriesinsights/v1beta1/zz_eventsourceiothub_terraformed.go @@ -21,7 +21,7 @@ func (mg *EventSourceIOTHub) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this EventSourceIOTHub func (tr *EventSourceIOTHub) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"shared_access_key": "spec.forProvider.sharedAccessKeySecretRef"} + return map[string]string{"shared_access_key": "sharedAccessKeySecretRef"} } // GetObservation of this EventSourceIOTHub diff --git a/apis/timeseriesinsights/v1beta1/zz_eventsourceiothub_types.go b/apis/timeseriesinsights/v1beta1/zz_eventsourceiothub_types.go index 3f87e8d32..80adf4a13 100755 --- a/apis/timeseriesinsights/v1beta1/zz_eventsourceiothub_types.go +++ b/apis/timeseriesinsights/v1beta1/zz_eventsourceiothub_types.go @@ -58,6 +58,9 @@ type EventSourceIOTHubInitParameters struct { // Specifies the name of the Shared Access key that grants the Event Source access to the IotHub. SharedAccessKeyName *string `json:"sharedAccessKeyName,omitempty" tf:"shared_access_key_name,omitempty"` + // Specifies the value of the Shared Access Policy key that grants the Time Series Insights service read access to the IotHub. + SharedAccessKeySecretRef v1.SecretKeySelector `json:"sharedAccessKeySecretRef" tf:"-"` + // A mapping of tags to assign to the resource. // +mapType=granular Tags map[string]*string `json:"tags,omitempty" tf:"tags,omitempty"` diff --git a/apis/timeseriesinsights/v1beta1/zz_generated.deepcopy.go b/apis/timeseriesinsights/v1beta1/zz_generated.deepcopy.go index 74ce4505f..c9903f2ed 100644 --- a/apis/timeseriesinsights/v1beta1/zz_generated.deepcopy.go +++ b/apis/timeseriesinsights/v1beta1/zz_generated.deepcopy.go @@ -123,6 +123,7 @@ func (in *EventSourceEventHubInitParameters) DeepCopyInto(out *EventSourceEventH *out = new(v1.Selector) (*in).DeepCopyInto(*out) } + out.SharedAccessKeySecretRef = in.SharedAccessKeySecretRef if in.Tags != nil { in, out := &in.Tags, &out.Tags *out = make(map[string]*string, len(*in)) @@ -516,6 +517,7 @@ func (in *EventSourceIOTHubInitParameters) DeepCopyInto(out *EventSourceIOTHubIn *out = new(string) **out = **in } + out.SharedAccessKeySecretRef = in.SharedAccessKeySecretRef if in.Tags != nil { in, out := &in.Tags, &out.Tags *out = make(map[string]*string, len(*in)) diff --git a/apis/timeseriesinsights/v1beta2/zz_gen2environment_terraformed.go b/apis/timeseriesinsights/v1beta2/zz_gen2environment_terraformed.go index 98868e6d0..cd1485f62 100755 --- a/apis/timeseriesinsights/v1beta2/zz_gen2environment_terraformed.go +++ b/apis/timeseriesinsights/v1beta2/zz_gen2environment_terraformed.go @@ -21,7 +21,7 @@ func (mg *Gen2Environment) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this Gen2Environment func (tr *Gen2Environment) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"storage[*].key": "spec.forProvider.storage[*].keySecretRef"} + return map[string]string{"storage[*].key": "storage[*].keySecretRef"} } // GetObservation of this Gen2Environment diff --git a/apis/timeseriesinsights/v1beta2/zz_gen2environment_types.go b/apis/timeseriesinsights/v1beta2/zz_gen2environment_types.go index db4a9b8e2..62b30be68 100755 --- a/apis/timeseriesinsights/v1beta2/zz_gen2environment_types.go +++ b/apis/timeseriesinsights/v1beta2/zz_gen2environment_types.go @@ -109,6 +109,9 @@ type Gen2EnvironmentParameters struct { type StorageInitParameters struct { + // Access key of storage account for Azure IoT Time Series Insights Gen2 Environment + KeySecretRef v1.SecretKeySelector `json:"keySecretRef" tf:"-"` + // Name of storage account for Azure IoT Time Series Insights Gen2 Environment. Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account Name *string `json:"name,omitempty" tf:"name,omitempty"` @@ -131,7 +134,7 @@ type StorageObservation struct { type StorageParameters struct { // Access key of storage account for Azure IoT Time Series Insights Gen2 Environment - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional KeySecretRef v1.SecretKeySelector `json:"keySecretRef" tf:"-"` // Name of storage account for Azure IoT Time Series Insights Gen2 Environment. Changing this forces a new resource to be created. diff --git a/apis/timeseriesinsights/v1beta2/zz_generated.deepcopy.go b/apis/timeseriesinsights/v1beta2/zz_generated.deepcopy.go index a4d56f6a4..322725397 100644 --- a/apis/timeseriesinsights/v1beta2/zz_generated.deepcopy.go +++ b/apis/timeseriesinsights/v1beta2/zz_generated.deepcopy.go @@ -326,6 +326,7 @@ func (in *Gen2EnvironmentStatus) DeepCopy() *Gen2EnvironmentStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *StorageInitParameters) DeepCopyInto(out *StorageInitParameters) { *out = *in + out.KeySecretRef = in.KeySecretRef if in.Name != nil { in, out := &in.Name, &out.Name *out = new(string) diff --git a/apis/web/v1beta1/zz_generated.deepcopy.go b/apis/web/v1beta1/zz_generated.deepcopy.go index 3187ab7ba..018d05089 100644 --- a/apis/web/v1beta1/zz_generated.deepcopy.go +++ b/apis/web/v1beta1/zz_generated.deepcopy.go @@ -34796,6 +34796,12 @@ func (in *SourceControlToken) DeepCopyObject() runtime.Object { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *SourceControlTokenInitParameters) DeepCopyInto(out *SourceControlTokenInitParameters) { *out = *in + out.TokenSecretRef = in.TokenSecretRef + if in.TokenSecretSecretRef != nil { + in, out := &in.TokenSecretSecretRef, &out.TokenSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.Type != nil { in, out := &in.Type, &out.Type *out = new(string) diff --git a/apis/web/v1beta1/zz_sourcecontroltoken_terraformed.go b/apis/web/v1beta1/zz_sourcecontroltoken_terraformed.go index 30b2fe07c..b1e1e6b94 100755 --- a/apis/web/v1beta1/zz_sourcecontroltoken_terraformed.go +++ b/apis/web/v1beta1/zz_sourcecontroltoken_terraformed.go @@ -21,7 +21,7 @@ func (mg *SourceControlToken) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this SourceControlToken func (tr *SourceControlToken) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"token": "spec.forProvider.tokenSecretRef", "token_secret": "spec.forProvider.tokenSecretSecretRef"} + return map[string]string{"token": "tokenSecretRef", "token_secret": "tokenSecretSecretRef"} } // GetObservation of this SourceControlToken diff --git a/apis/web/v1beta1/zz_sourcecontroltoken_types.go b/apis/web/v1beta1/zz_sourcecontroltoken_types.go index 4703ac113..9dea983ed 100755 --- a/apis/web/v1beta1/zz_sourcecontroltoken_types.go +++ b/apis/web/v1beta1/zz_sourcecontroltoken_types.go @@ -15,6 +15,12 @@ import ( type SourceControlTokenInitParameters struct { + // The Access Token. + TokenSecretRef v1.SecretKeySelector `json:"tokenSecretRef" tf:"-"` + + // The Access Token Secret. + TokenSecretSecretRef *v1.SecretKeySelector `json:"tokenSecretSecretRef,omitempty" tf:"-"` + // The Token type. Possible values include Bitbucket, Dropbox, Github, and OneDrive. Type *string `json:"type,omitempty" tf:"type,omitempty"` } diff --git a/apis/web/v1beta2/zz_functionapp_terraformed.go b/apis/web/v1beta2/zz_functionapp_terraformed.go index 1251f56d4..d5e21db83 100755 --- a/apis/web/v1beta2/zz_functionapp_terraformed.go +++ b/apis/web/v1beta2/zz_functionapp_terraformed.go @@ -21,7 +21,7 @@ func (mg *FunctionApp) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this FunctionApp func (tr *FunctionApp) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"auth_settings[*].active_directory[*].client_secret": "spec.forProvider.authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "spec.forProvider.authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].google[*].client_secret": "spec.forProvider.authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "spec.forProvider.authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "spec.forProvider.authSettings[*].twitter[*].consumerSecretSecretRef", "connection_string[*].value": "spec.forProvider.connectionString[*].valueSecretRef", "storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"auth_settings[*].active_directory[*].client_secret": "authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].google[*].client_secret": "authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "authSettings[*].twitter[*].consumerSecretSecretRef", "connection_string[*].value": "connectionString[*].valueSecretRef", "storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this FunctionApp diff --git a/apis/web/v1beta2/zz_functionapp_types.go b/apis/web/v1beta2/zz_functionapp_types.go index 832cf7a07..fe8ea1422 100755 --- a/apis/web/v1beta2/zz_functionapp_types.go +++ b/apis/web/v1beta2/zz_functionapp_types.go @@ -20,6 +20,9 @@ type ActiveDirectoryInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + + // The OAuth 2.0 client secret that was created for the app used for authentication. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` } type ActiveDirectoryObservation struct { @@ -205,6 +208,9 @@ type ConnectionStringInitParameters struct { // The type of the Connection String. Possible values are APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure and SQLServer. Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // The value for the Connection String. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type ConnectionStringObservation struct { @@ -227,7 +233,7 @@ type ConnectionStringParameters struct { Type *string `json:"type" tf:"type,omitempty"` // The value for the Connection String. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } @@ -268,6 +274,9 @@ type FacebookInitParameters struct { // The App ID of the Facebook app used for login AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // The App Secret of the Facebook app used for Facebook login. + AppSecretSecretRef v1.SecretKeySelector `json:"appSecretSecretRef" tf:"-"` + // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx OauthScopes []*string `json:"oauthScopes,omitempty" tf:"oauth_scopes,omitempty"` } @@ -288,7 +297,7 @@ type FacebookParameters struct { AppID *string `json:"appId" tf:"app_id,omitempty"` // The App Secret of the Facebook app used for Facebook login. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AppSecretSecretRef v1.SecretKeySelector `json:"appSecretSecretRef" tf:"-"` // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx @@ -369,6 +378,9 @@ type FunctionAppInitParameters struct { // A source_control block, as defined below. SourceControl *SourceControlInitParameters `json:"sourceControl,omitempty" tf:"source_control,omitempty"` + // The access key which will be used to access the backend storage account for the Function App. + StorageAccountAccessKeySecretRef v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef" tf:"-"` + // The backend storage account name which will be used by this Function App (such as the dashboard, logs). Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account StorageAccountName *string `json:"storageAccountName,omitempty" tf:"storage_account_name,omitempty"` @@ -597,6 +609,9 @@ type GoogleInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` + // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx OauthScopes []*string `json:"oauthScopes,omitempty" tf:"oauth_scopes,omitempty"` } @@ -617,7 +632,7 @@ type GoogleParameters struct { ClientID *string `json:"clientId" tf:"client_id,omitempty"` // The OAuth 2.0 client secret that was created for the app used for authentication. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx @@ -828,6 +843,9 @@ type MicrosoftInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` + // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx OauthScopes []*string `json:"oauthScopes,omitempty" tf:"oauth_scopes,omitempty"` } @@ -848,7 +866,7 @@ type MicrosoftParameters struct { ClientID *string `json:"clientId" tf:"client_id,omitempty"` // The OAuth 2.0 client secret that was created for the app used for authentication. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx @@ -1313,6 +1331,9 @@ type TwitterInitParameters struct { // The OAuth 1.0a consumer key of the Twitter application used for sign-in. ConsumerKey *string `json:"consumerKey,omitempty" tf:"consumer_key,omitempty"` + + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. + ConsumerSecretSecretRef v1.SecretKeySelector `json:"consumerSecretSecretRef" tf:"-"` } type TwitterObservation struct { @@ -1328,7 +1349,7 @@ type TwitterParameters struct { ConsumerKey *string `json:"consumerKey" tf:"consumer_key,omitempty"` // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ConsumerSecretSecretRef v1.SecretKeySelector `json:"consumerSecretSecretRef" tf:"-"` } diff --git a/apis/web/v1beta2/zz_functionappslot_terraformed.go b/apis/web/v1beta2/zz_functionappslot_terraformed.go index 5e4eb773d..3ef08d63a 100755 --- a/apis/web/v1beta2/zz_functionappslot_terraformed.go +++ b/apis/web/v1beta2/zz_functionappslot_terraformed.go @@ -21,7 +21,7 @@ func (mg *FunctionAppSlot) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this FunctionAppSlot func (tr *FunctionAppSlot) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"auth_settings[*].active_directory[*].client_secret": "spec.forProvider.authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "spec.forProvider.authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].google[*].client_secret": "spec.forProvider.authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "spec.forProvider.authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "spec.forProvider.authSettings[*].twitter[*].consumerSecretSecretRef", "connection_string[*].value": "spec.forProvider.connectionString[*].valueSecretRef", "storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"auth_settings[*].active_directory[*].client_secret": "authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].google[*].client_secret": "authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "authSettings[*].twitter[*].consumerSecretSecretRef", "connection_string[*].value": "connectionString[*].valueSecretRef", "storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this FunctionAppSlot diff --git a/apis/web/v1beta2/zz_functionappslot_types.go b/apis/web/v1beta2/zz_functionappslot_types.go index 599068d81..94615d542 100755 --- a/apis/web/v1beta2/zz_functionappslot_types.go +++ b/apis/web/v1beta2/zz_functionappslot_types.go @@ -20,6 +20,9 @@ type AuthSettingsActiveDirectoryInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + + // The OAuth 2.0 client secret that was created for the app used for authentication. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` } type AuthSettingsActiveDirectoryObservation struct { @@ -51,6 +54,9 @@ type AuthSettingsFacebookInitParameters struct { // The App ID of the Facebook app used for login AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // The App Secret of the Facebook app used for Facebook login. + AppSecretSecretRef v1.SecretKeySelector `json:"appSecretSecretRef" tf:"-"` + // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx OauthScopes []*string `json:"oauthScopes,omitempty" tf:"oauth_scopes,omitempty"` } @@ -71,7 +77,7 @@ type AuthSettingsFacebookParameters struct { AppID *string `json:"appId" tf:"app_id,omitempty"` // The App Secret of the Facebook app used for Facebook login. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AppSecretSecretRef v1.SecretKeySelector `json:"appSecretSecretRef" tf:"-"` // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx @@ -84,6 +90,9 @@ type AuthSettingsGoogleInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` + // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx OauthScopes []*string `json:"oauthScopes,omitempty" tf:"oauth_scopes,omitempty"` } @@ -104,7 +113,7 @@ type AuthSettingsGoogleParameters struct { ClientID *string `json:"clientId" tf:"client_id,omitempty"` // The OAuth 2.0 client secret that was created for the app used for authentication. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx @@ -117,6 +126,9 @@ type AuthSettingsMicrosoftInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. + ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` + // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx OauthScopes []*string `json:"oauthScopes,omitempty" tf:"oauth_scopes,omitempty"` } @@ -137,7 +149,7 @@ type AuthSettingsMicrosoftParameters struct { ClientID *string `json:"clientId" tf:"client_id,omitempty"` // The OAuth 2.0 client secret that was created for the app used for authentication. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ClientSecretSecretRef v1.SecretKeySelector `json:"clientSecretSecretRef" tf:"-"` // The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx @@ -149,6 +161,9 @@ type AuthSettingsTwitterInitParameters struct { // The OAuth 1.0a consumer key of the Twitter application used for sign-in. ConsumerKey *string `json:"consumerKey,omitempty" tf:"consumer_key,omitempty"` + + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. + ConsumerSecretSecretRef v1.SecretKeySelector `json:"consumerSecretSecretRef" tf:"-"` } type AuthSettingsTwitterObservation struct { @@ -164,7 +179,7 @@ type AuthSettingsTwitterParameters struct { ConsumerKey *string `json:"consumerKey" tf:"consumer_key,omitempty"` // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ConsumerSecretSecretRef v1.SecretKeySelector `json:"consumerSecretSecretRef" tf:"-"` } @@ -327,6 +342,9 @@ type FunctionAppSlotConnectionStringInitParameters struct { // The type of the Connection String. Possible values are APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure and SQLServer. Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // The value for the Connection String. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type FunctionAppSlotConnectionStringObservation struct { @@ -349,7 +367,7 @@ type FunctionAppSlotConnectionStringParameters struct { Type *string `json:"type" tf:"type,omitempty"` // The value for the Connection String. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } @@ -440,6 +458,9 @@ type FunctionAppSlotInitParameters struct { // A site_config object as defined below. SiteConfig *FunctionAppSlotSiteConfigInitParameters `json:"siteConfig,omitempty" tf:"site_config,omitempty"` + // The access key which will be used to access the backend storage account for the Function App. + StorageAccountAccessKeySecretRef v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef" tf:"-"` + // The backend storage account name which will be used by the Function App (such as the dashboard, logs). Changing this forces a new resource to be created. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account StorageAccountName *string `json:"storageAccountName,omitempty" tf:"storage_account_name,omitempty"` diff --git a/apis/web/v1beta2/zz_generated.deepcopy.go b/apis/web/v1beta2/zz_generated.deepcopy.go index c2eb89ea7..5f09dd725 100644 --- a/apis/web/v1beta2/zz_generated.deepcopy.go +++ b/apis/web/v1beta2/zz_generated.deepcopy.go @@ -182,6 +182,11 @@ func (in *ActiveDirectoryInitParameters) DeepCopyInto(out *ActiveDirectoryInitPa *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ActiveDirectoryInitParameters. @@ -1318,11 +1323,21 @@ func (in *ApplicationStackDockerInitParameters) DeepCopyInto(out *ApplicationSta *out = new(string) **out = **in } + if in.RegistryPasswordSecretRef != nil { + in, out := &in.RegistryPasswordSecretRef, &out.RegistryPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.RegistryURL != nil { in, out := &in.RegistryURL, &out.RegistryURL *out = new(string) **out = **in } + if in.RegistryUsernameSecretRef != nil { + in, out := &in.RegistryUsernameSecretRef, &out.RegistryUsernameSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ApplicationStackDockerInitParameters. @@ -1595,6 +1610,11 @@ func (in *AuthSettingsActiveDirectoryInitParameters) DeepCopyInto(out *AuthSetti *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthSettingsActiveDirectoryInitParameters. @@ -1682,6 +1702,7 @@ func (in *AuthSettingsFacebookInitParameters) DeepCopyInto(out *AuthSettingsFace *out = new(string) **out = **in } + out.AppSecretSecretRef = in.AppSecretSecretRef if in.OauthScopes != nil { in, out := &in.OauthScopes, &out.OauthScopes *out = make([]*string, len(*in)) @@ -1776,6 +1797,11 @@ func (in *AuthSettingsGithubInitParameters) DeepCopyInto(out *AuthSettingsGithub *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -1889,6 +1915,7 @@ func (in *AuthSettingsGoogleInitParameters) DeepCopyInto(out *AuthSettingsGoogle *out = new(string) **out = **in } + out.ClientSecretSecretRef = in.ClientSecretSecretRef if in.OauthScopes != nil { in, out := &in.OauthScopes, &out.OauthScopes *out = make([]*string, len(*in)) @@ -2085,6 +2112,7 @@ func (in *AuthSettingsMicrosoftInitParameters) DeepCopyInto(out *AuthSettingsMic *out = new(string) **out = **in } + out.ClientSecretSecretRef = in.ClientSecretSecretRef if in.OauthScopes != nil { in, out := &in.OauthScopes, &out.OauthScopes *out = make([]*string, len(*in)) @@ -2383,6 +2411,7 @@ func (in *AuthSettingsTwitterInitParameters) DeepCopyInto(out *AuthSettingsTwitt *out = new(string) **out = **in } + out.ConsumerSecretSecretRef = in.ConsumerSecretSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new AuthSettingsTwitterInitParameters. @@ -5060,6 +5089,7 @@ func (in *BackupInitParameters) DeepCopyInto(out *BackupInitParameters) { *out = new(ScheduleInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountURLSecretRef = in.StorageAccountURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new BackupInitParameters. @@ -5271,6 +5301,7 @@ func (in *ConnectionStringInitParameters) DeepCopyInto(out *ConnectionStringInit *out = new(string) **out = **in } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new ConnectionStringInitParameters. @@ -5683,11 +5714,21 @@ func (in *DockerInitParameters) DeepCopyInto(out *DockerInitParameters) { *out = new(string) **out = **in } + if in.RegistryPasswordSecretRef != nil { + in, out := &in.RegistryPasswordSecretRef, &out.RegistryPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.RegistryURL != nil { in, out := &in.RegistryURL, &out.RegistryURL *out = new(string) **out = **in } + if in.RegistryUsernameSecretRef != nil { + in, out := &in.RegistryUsernameSecretRef, &out.RegistryUsernameSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new DockerInitParameters. @@ -5778,6 +5819,7 @@ func (in *FacebookInitParameters) DeepCopyInto(out *FacebookInitParameters) { *out = new(string) **out = **in } + out.AppSecretSecretRef = in.AppSecretSecretRef if in.OauthScopes != nil { in, out := &in.OauthScopes, &out.OauthScopes *out = make([]*string, len(*in)) @@ -6210,6 +6252,7 @@ func (in *FunctionAppInitParameters) DeepCopyInto(out *FunctionAppInitParameters *out = new(SourceControlInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountAccessKeySecretRef = in.StorageAccountAccessKeySecretRef if in.StorageAccountName != nil { in, out := &in.StorageAccountName, &out.StorageAccountName *out = new(string) @@ -6982,6 +7025,7 @@ func (in *FunctionAppSlotConnectionStringInitParameters) DeepCopyInto(out *Funct *out = new(string) **out = **in } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new FunctionAppSlotConnectionStringInitParameters. @@ -7234,6 +7278,7 @@ func (in *FunctionAppSlotInitParameters) DeepCopyInto(out *FunctionAppSlotInitPa *out = new(FunctionAppSlotSiteConfigInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountAccessKeySecretRef = in.StorageAccountAccessKeySecretRef if in.StorageAccountName != nil { in, out := &in.StorageAccountName, &out.StorageAccountName *out = new(string) @@ -8140,6 +8185,11 @@ func (in *GithubInitParameters) DeepCopyInto(out *GithubInitParameters) { *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -8361,6 +8411,7 @@ func (in *GoogleInitParameters) DeepCopyInto(out *GoogleInitParameters) { *out = new(string) **out = **in } + out.ClientSecretSecretRef = in.ClientSecretSecretRef if in.OauthScopes != nil { in, out := &in.OauthScopes, &out.OauthScopes *out = make([]*string, len(*in)) @@ -8596,6 +8647,7 @@ func (in *HTTPLogsAzureBlobStorageInitParameters) DeepCopyInto(out *HTTPLogsAzur *out = new(float64) **out = **in } + out.SASURLSecretRef = in.SASURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new HTTPLogsAzureBlobStorageInitParameters. @@ -9472,6 +9524,11 @@ func (in *LinuxFunctionAppAuthSettingsActiveDirectoryInitParameters) DeepCopyInt *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -9574,6 +9631,11 @@ func (in *LinuxFunctionAppAuthSettingsFacebookInitParameters) DeepCopyInto(out * *out = new(string) **out = **in } + if in.AppSecretSecretRef != nil { + in, out := &in.AppSecretSecretRef, &out.AppSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AppSecretSettingName != nil { in, out := &in.AppSecretSettingName, &out.AppSecretSettingName *out = new(string) @@ -9687,6 +9749,11 @@ func (in *LinuxFunctionAppAuthSettingsGoogleInitParameters) DeepCopyInto(out *Li *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -9907,6 +9974,11 @@ func (in *LinuxFunctionAppAuthSettingsMicrosoftInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -10234,6 +10306,11 @@ func (in *LinuxFunctionAppAuthSettingsTwitterInitParameters) DeepCopyInto(out *L *out = new(string) **out = **in } + if in.ConsumerSecretSecretRef != nil { + in, out := &in.ConsumerSecretSecretRef, &out.ConsumerSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ConsumerSecretSettingName != nil { in, out := &in.ConsumerSecretSettingName, &out.ConsumerSecretSettingName *out = new(string) @@ -10319,6 +10396,7 @@ func (in *LinuxFunctionAppConnectionStringInitParameters) DeepCopyInto(out *Linu *out = new(string) **out = **in } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LinuxFunctionAppConnectionStringInitParameters. @@ -10648,6 +10726,11 @@ func (in *LinuxFunctionAppInitParameters) DeepCopyInto(out *LinuxFunctionAppInit (*in)[i].DeepCopyInto(&(*out)[i]) } } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageAccountName != nil { in, out := &in.StorageAccountName, &out.StorageAccountName *out = new(string) @@ -11568,6 +11651,16 @@ func (in *LinuxFunctionAppSiteConfigInitParameters) DeepCopyInto(out *LinuxFunct *out = new(AppServiceLogsInitParameters) (*in).DeepCopyInto(*out) } + if in.ApplicationInsightsConnectionStringSecretRef != nil { + in, out := &in.ApplicationInsightsConnectionStringSecretRef, &out.ApplicationInsightsConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.ApplicationInsightsKeySecretRef != nil { + in, out := &in.ApplicationInsightsKeySecretRef, &out.ApplicationInsightsKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ApplicationStack != nil { in, out := &in.ApplicationStack, &out.ApplicationStack *out = new(ApplicationStackInitParameters) @@ -12593,6 +12686,11 @@ func (in *LinuxFunctionAppSlotAuthSettingsActiveDirectoryInitParameters) DeepCop *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -12695,6 +12793,11 @@ func (in *LinuxFunctionAppSlotAuthSettingsFacebookInitParameters) DeepCopyInto(o *out = new(string) **out = **in } + if in.AppSecretSecretRef != nil { + in, out := &in.AppSecretSecretRef, &out.AppSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AppSecretSettingName != nil { in, out := &in.AppSecretSettingName, &out.AppSecretSettingName *out = new(string) @@ -12808,6 +12911,11 @@ func (in *LinuxFunctionAppSlotAuthSettingsGoogleInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -13028,6 +13136,11 @@ func (in *LinuxFunctionAppSlotAuthSettingsMicrosoftInitParameters) DeepCopyInto( *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -13355,6 +13468,11 @@ func (in *LinuxFunctionAppSlotAuthSettingsTwitterInitParameters) DeepCopyInto(ou *out = new(string) **out = **in } + if in.ConsumerSecretSecretRef != nil { + in, out := &in.ConsumerSecretSecretRef, &out.ConsumerSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ConsumerSecretSettingName != nil { in, out := &in.ConsumerSecretSettingName, &out.ConsumerSecretSettingName *out = new(string) @@ -13844,6 +13962,7 @@ func (in *LinuxFunctionAppSlotBackupInitParameters) DeepCopyInto(out *LinuxFunct *out = new(BackupScheduleInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountURLSecretRef = in.StorageAccountURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LinuxFunctionAppSlotBackupInitParameters. @@ -13930,6 +14049,7 @@ func (in *LinuxFunctionAppSlotConnectionStringInitParameters) DeepCopyInto(out * *out = new(string) **out = **in } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LinuxFunctionAppSlotConnectionStringInitParameters. @@ -14219,6 +14339,11 @@ func (in *LinuxFunctionAppSlotInitParameters) DeepCopyInto(out *LinuxFunctionApp (*in)[i].DeepCopyInto(&(*out)[i]) } } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageAccountName != nil { in, out := &in.StorageAccountName, &out.StorageAccountName *out = new(string) @@ -15261,6 +15386,16 @@ func (in *LinuxFunctionAppSlotSiteConfigInitParameters) DeepCopyInto(out *LinuxF *out = new(SiteConfigAppServiceLogsInitParameters) (*in).DeepCopyInto(*out) } + if in.ApplicationInsightsConnectionStringSecretRef != nil { + in, out := &in.ApplicationInsightsConnectionStringSecretRef, &out.ApplicationInsightsConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.ApplicationInsightsKeySecretRef != nil { + in, out := &in.ApplicationInsightsKeySecretRef, &out.ApplicationInsightsKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ApplicationStack != nil { in, out := &in.ApplicationStack, &out.ApplicationStack *out = new(SiteConfigApplicationStackInitParameters) @@ -16293,6 +16428,7 @@ func (in *LinuxFunctionAppSlotStatus) DeepCopy() *LinuxFunctionAppSlotStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *LinuxFunctionAppSlotStorageAccountInitParameters) DeepCopyInto(out *LinuxFunctionAppSlotStorageAccountInitParameters) { *out = *in + out.AccessKeySecretRef = in.AccessKeySecretRef if in.AccountName != nil { in, out := &in.AccountName, &out.AccountName *out = new(string) @@ -16492,6 +16628,11 @@ func (in *LinuxWebAppAuthSettingsActiveDirectoryInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -16594,6 +16735,11 @@ func (in *LinuxWebAppAuthSettingsFacebookInitParameters) DeepCopyInto(out *Linux *out = new(string) **out = **in } + if in.AppSecretSecretRef != nil { + in, out := &in.AppSecretSecretRef, &out.AppSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AppSecretSettingName != nil { in, out := &in.AppSecretSettingName, &out.AppSecretSettingName *out = new(string) @@ -16707,6 +16853,11 @@ func (in *LinuxWebAppAuthSettingsGithubInitParameters) DeepCopyInto(out *LinuxWe *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -16820,6 +16971,11 @@ func (in *LinuxWebAppAuthSettingsGoogleInitParameters) DeepCopyInto(out *LinuxWe *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -17040,6 +17196,11 @@ func (in *LinuxWebAppAuthSettingsMicrosoftInitParameters) DeepCopyInto(out *Linu *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -17367,6 +17528,11 @@ func (in *LinuxWebAppAuthSettingsTwitterInitParameters) DeepCopyInto(out *LinuxW *out = new(string) **out = **in } + if in.ConsumerSecretSecretRef != nil { + in, out := &in.ConsumerSecretSecretRef, &out.ConsumerSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ConsumerSecretSettingName != nil { in, out := &in.ConsumerSecretSettingName, &out.ConsumerSecretSettingName *out = new(string) @@ -19352,6 +19518,7 @@ func (in *LinuxWebAppBackupInitParameters) DeepCopyInto(out *LinuxWebAppBackupIn *out = new(LinuxWebAppBackupScheduleInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountURLSecretRef = in.StorageAccountURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LinuxWebAppBackupInitParameters. @@ -19563,6 +19730,7 @@ func (in *LinuxWebAppConnectionStringInitParameters) DeepCopyInto(out *LinuxWebA *out = new(string) **out = **in } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LinuxWebAppConnectionStringInitParameters. @@ -20389,6 +20557,11 @@ func (in *LinuxWebAppSiteConfigApplicationStackInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + if in.DockerRegistryPasswordSecretRef != nil { + in, out := &in.DockerRegistryPasswordSecretRef, &out.DockerRegistryPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DockerRegistryURL != nil { in, out := &in.DockerRegistryURL, &out.DockerRegistryURL *out = new(string) @@ -22104,6 +22277,11 @@ func (in *LinuxWebAppSlotAuthSettingsActiveDirectoryInitParameters) DeepCopyInto *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -22206,6 +22384,11 @@ func (in *LinuxWebAppSlotAuthSettingsFacebookInitParameters) DeepCopyInto(out *L *out = new(string) **out = **in } + if in.AppSecretSecretRef != nil { + in, out := &in.AppSecretSecretRef, &out.AppSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AppSecretSettingName != nil { in, out := &in.AppSecretSettingName, &out.AppSecretSettingName *out = new(string) @@ -22319,6 +22502,11 @@ func (in *LinuxWebAppSlotAuthSettingsGithubInitParameters) DeepCopyInto(out *Lin *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -22432,6 +22620,11 @@ func (in *LinuxWebAppSlotAuthSettingsGoogleInitParameters) DeepCopyInto(out *Lin *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -22652,6 +22845,11 @@ func (in *LinuxWebAppSlotAuthSettingsMicrosoftInitParameters) DeepCopyInto(out * *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -22979,6 +23177,11 @@ func (in *LinuxWebAppSlotAuthSettingsTwitterInitParameters) DeepCopyInto(out *Li *out = new(string) **out = **in } + if in.ConsumerSecretSecretRef != nil { + in, out := &in.ConsumerSecretSecretRef, &out.ConsumerSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ConsumerSecretSettingName != nil { in, out := &in.ConsumerSecretSettingName, &out.ConsumerSecretSettingName *out = new(string) @@ -24964,6 +25167,7 @@ func (in *LinuxWebAppSlotBackupInitParameters) DeepCopyInto(out *LinuxWebAppSlot *out = new(LinuxWebAppSlotBackupScheduleInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountURLSecretRef = in.StorageAccountURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LinuxWebAppSlotBackupInitParameters. @@ -25175,6 +25379,7 @@ func (in *LinuxWebAppSlotConnectionStringInitParameters) DeepCopyInto(out *Linux *out = new(string) **out = **in } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LinuxWebAppSlotConnectionStringInitParameters. @@ -26102,6 +26307,11 @@ func (in *LinuxWebAppSlotSiteConfigApplicationStackInitParameters) DeepCopyInto( *out = new(string) **out = **in } + if in.DockerRegistryPasswordSecretRef != nil { + in, out := &in.DockerRegistryPasswordSecretRef, &out.DockerRegistryPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DockerRegistryURL != nil { in, out := &in.DockerRegistryURL, &out.DockerRegistryURL *out = new(string) @@ -27824,6 +28034,7 @@ func (in *LinuxWebAppSlotStatus) DeepCopy() *LinuxWebAppSlotStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *LinuxWebAppSlotStorageAccountInitParameters) DeepCopyInto(out *LinuxWebAppSlotStorageAccountInitParameters) { *out = *in + out.AccessKeySecretRef = in.AccessKeySecretRef if in.AccountName != nil { in, out := &in.AccountName, &out.AccountName *out = new(string) @@ -28091,6 +28302,7 @@ func (in *LinuxWebAppStickySettingsParameters) DeepCopy() *LinuxWebAppStickySett // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *LinuxWebAppStorageAccountInitParameters) DeepCopyInto(out *LinuxWebAppStorageAccountInitParameters) { *out = *in + out.AccessKeySecretRef = in.AccessKeySecretRef if in.AccountName != nil { in, out := &in.AccountName, &out.AccountName *out = new(string) @@ -28610,6 +28822,7 @@ func (in *LogsHTTPLogsAzureBlobStorageInitParameters) DeepCopyInto(out *LogsHTTP *out = new(float64) **out = **in } + out.SASURLSecretRef = in.SASURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new LogsHTTPLogsAzureBlobStorageInitParameters. @@ -28926,6 +29139,7 @@ func (in *MicrosoftInitParameters) DeepCopyInto(out *MicrosoftInitParameters) { *out = new(string) **out = **in } + out.ClientSecretSecretRef = in.ClientSecretSecretRef if in.OauthScopes != nil { in, out := &in.OauthScopes, &out.OauthScopes *out = make([]*string, len(*in)) @@ -32854,6 +33068,7 @@ func (in *StickySettingsParameters) DeepCopy() *StickySettingsParameters { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *StorageAccountInitParameters) DeepCopyInto(out *StorageAccountInitParameters) { *out = *in + out.AccessKeySecretRef = in.AccessKeySecretRef if in.AccountName != nil { in, out := &in.AccountName, &out.AccountName *out = new(string) @@ -33391,6 +33606,7 @@ func (in *TwitterInitParameters) DeepCopyInto(out *TwitterInitParameters) { *out = new(string) **out = **in } + out.ConsumerSecretSecretRef = in.ConsumerSecretSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new TwitterInitParameters. @@ -33826,6 +34042,11 @@ func (in *WindowsFunctionAppAuthSettingsActiveDirectoryInitParameters) DeepCopyI *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -33928,6 +34149,11 @@ func (in *WindowsFunctionAppAuthSettingsFacebookInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + if in.AppSecretSecretRef != nil { + in, out := &in.AppSecretSecretRef, &out.AppSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AppSecretSettingName != nil { in, out := &in.AppSecretSettingName, &out.AppSecretSettingName *out = new(string) @@ -34041,6 +34267,11 @@ func (in *WindowsFunctionAppAuthSettingsGithubInitParameters) DeepCopyInto(out * *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -34154,6 +34385,11 @@ func (in *WindowsFunctionAppAuthSettingsGoogleInitParameters) DeepCopyInto(out * *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -34374,6 +34610,11 @@ func (in *WindowsFunctionAppAuthSettingsMicrosoftInitParameters) DeepCopyInto(ou *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -34701,6 +34942,11 @@ func (in *WindowsFunctionAppAuthSettingsTwitterInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + if in.ConsumerSecretSecretRef != nil { + in, out := &in.ConsumerSecretSecretRef, &out.ConsumerSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ConsumerSecretSettingName != nil { in, out := &in.ConsumerSecretSettingName, &out.ConsumerSecretSettingName *out = new(string) @@ -36686,6 +36932,7 @@ func (in *WindowsFunctionAppBackupInitParameters) DeepCopyInto(out *WindowsFunct *out = new(WindowsFunctionAppBackupScheduleInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountURLSecretRef = in.StorageAccountURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WindowsFunctionAppBackupInitParameters. @@ -36897,6 +37144,7 @@ func (in *WindowsFunctionAppConnectionStringInitParameters) DeepCopyInto(out *Wi *out = new(string) **out = **in } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WindowsFunctionAppConnectionStringInitParameters. @@ -37206,6 +37454,11 @@ func (in *WindowsFunctionAppInitParameters) DeepCopyInto(out *WindowsFunctionApp (*in)[i].DeepCopyInto(&(*out)[i]) } } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageAccountName != nil { in, out := &in.StorageAccountName, &out.StorageAccountName *out = new(string) @@ -38503,6 +38756,16 @@ func (in *WindowsFunctionAppSiteConfigInitParameters) DeepCopyInto(out *WindowsF *out = new(WindowsFunctionAppSiteConfigAppServiceLogsInitParameters) (*in).DeepCopyInto(*out) } + if in.ApplicationInsightsConnectionStringSecretRef != nil { + in, out := &in.ApplicationInsightsConnectionStringSecretRef, &out.ApplicationInsightsConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.ApplicationInsightsKeySecretRef != nil { + in, out := &in.ApplicationInsightsKeySecretRef, &out.ApplicationInsightsKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ApplicationStack != nil { in, out := &in.ApplicationStack, &out.ApplicationStack *out = new(WindowsFunctionAppSiteConfigApplicationStackInitParameters) @@ -39498,6 +39761,11 @@ func (in *WindowsFunctionAppSlotAuthSettingsActiveDirectoryInitParameters) DeepC *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -39600,6 +39868,11 @@ func (in *WindowsFunctionAppSlotAuthSettingsFacebookInitParameters) DeepCopyInto *out = new(string) **out = **in } + if in.AppSecretSecretRef != nil { + in, out := &in.AppSecretSecretRef, &out.AppSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AppSecretSettingName != nil { in, out := &in.AppSecretSettingName, &out.AppSecretSettingName *out = new(string) @@ -39713,6 +39986,11 @@ func (in *WindowsFunctionAppSlotAuthSettingsGithubInitParameters) DeepCopyInto(o *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -39826,6 +40104,11 @@ func (in *WindowsFunctionAppSlotAuthSettingsGoogleInitParameters) DeepCopyInto(o *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -40046,6 +40329,11 @@ func (in *WindowsFunctionAppSlotAuthSettingsMicrosoftInitParameters) DeepCopyInt *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -40373,6 +40661,11 @@ func (in *WindowsFunctionAppSlotAuthSettingsTwitterInitParameters) DeepCopyInto( *out = new(string) **out = **in } + if in.ConsumerSecretSecretRef != nil { + in, out := &in.ConsumerSecretSecretRef, &out.ConsumerSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ConsumerSecretSettingName != nil { in, out := &in.ConsumerSecretSettingName, &out.ConsumerSecretSettingName *out = new(string) @@ -42358,6 +42651,7 @@ func (in *WindowsFunctionAppSlotBackupInitParameters) DeepCopyInto(out *WindowsF *out = new(WindowsFunctionAppSlotBackupScheduleInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountURLSecretRef = in.StorageAccountURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WindowsFunctionAppSlotBackupInitParameters. @@ -42569,6 +42863,7 @@ func (in *WindowsFunctionAppSlotConnectionStringInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WindowsFunctionAppSlotConnectionStringInitParameters. @@ -42858,6 +43153,11 @@ func (in *WindowsFunctionAppSlotInitParameters) DeepCopyInto(out *WindowsFunctio (*in)[i].DeepCopyInto(&(*out)[i]) } } + if in.StorageAccountAccessKeySecretRef != nil { + in, out := &in.StorageAccountAccessKeySecretRef, &out.StorageAccountAccessKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.StorageAccountName != nil { in, out := &in.StorageAccountName, &out.StorageAccountName *out = new(string) @@ -44110,6 +44410,16 @@ func (in *WindowsFunctionAppSlotSiteConfigInitParameters) DeepCopyInto(out *Wind *out = new(WindowsFunctionAppSlotSiteConfigAppServiceLogsInitParameters) (*in).DeepCopyInto(*out) } + if in.ApplicationInsightsConnectionStringSecretRef != nil { + in, out := &in.ApplicationInsightsConnectionStringSecretRef, &out.ApplicationInsightsConnectionStringSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } + if in.ApplicationInsightsKeySecretRef != nil { + in, out := &in.ApplicationInsightsKeySecretRef, &out.ApplicationInsightsKeySecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ApplicationStack != nil { in, out := &in.ApplicationStack, &out.ApplicationStack *out = new(WindowsFunctionAppSlotSiteConfigApplicationStackInitParameters) @@ -45112,6 +45422,7 @@ func (in *WindowsFunctionAppSlotStatus) DeepCopy() *WindowsFunctionAppSlotStatus // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *WindowsFunctionAppSlotStorageAccountInitParameters) DeepCopyInto(out *WindowsFunctionAppSlotStorageAccountInitParameters) { *out = *in + out.AccessKeySecretRef = in.AccessKeySecretRef if in.AccountName != nil { in, out := &in.AccountName, &out.AccountName *out = new(string) @@ -45379,6 +45690,7 @@ func (in *WindowsFunctionAppStickySettingsParameters) DeepCopy() *WindowsFunctio // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *WindowsFunctionAppStorageAccountInitParameters) DeepCopyInto(out *WindowsFunctionAppStorageAccountInitParameters) { *out = *in + out.AccessKeySecretRef = in.AccessKeySecretRef if in.AccountName != nil { in, out := &in.AccountName, &out.AccountName *out = new(string) @@ -45543,6 +45855,11 @@ func (in *WindowsWebAppAuthSettingsActiveDirectoryInitParameters) DeepCopyInto(o *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -45645,6 +45962,11 @@ func (in *WindowsWebAppAuthSettingsFacebookInitParameters) DeepCopyInto(out *Win *out = new(string) **out = **in } + if in.AppSecretSecretRef != nil { + in, out := &in.AppSecretSecretRef, &out.AppSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AppSecretSettingName != nil { in, out := &in.AppSecretSettingName, &out.AppSecretSettingName *out = new(string) @@ -45758,6 +46080,11 @@ func (in *WindowsWebAppAuthSettingsGithubInitParameters) DeepCopyInto(out *Windo *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -45871,6 +46198,11 @@ func (in *WindowsWebAppAuthSettingsGoogleInitParameters) DeepCopyInto(out *Windo *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -46091,6 +46423,11 @@ func (in *WindowsWebAppAuthSettingsMicrosoftInitParameters) DeepCopyInto(out *Wi *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -46418,6 +46755,11 @@ func (in *WindowsWebAppAuthSettingsTwitterInitParameters) DeepCopyInto(out *Wind *out = new(string) **out = **in } + if in.ConsumerSecretSecretRef != nil { + in, out := &in.ConsumerSecretSecretRef, &out.ConsumerSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ConsumerSecretSettingName != nil { in, out := &in.ConsumerSecretSettingName, &out.ConsumerSecretSettingName *out = new(string) @@ -48403,6 +48745,7 @@ func (in *WindowsWebAppBackupInitParameters) DeepCopyInto(out *WindowsWebAppBack *out = new(WindowsWebAppBackupScheduleInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountURLSecretRef = in.StorageAccountURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WindowsWebAppBackupInitParameters. @@ -48614,6 +48957,7 @@ func (in *WindowsWebAppConnectionStringInitParameters) DeepCopyInto(out *Windows *out = new(string) **out = **in } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WindowsWebAppConnectionStringInitParameters. @@ -49081,6 +49425,7 @@ func (in *WindowsWebAppLogsHTTPLogsAzureBlobStorageInitParameters) DeepCopyInto( *out = new(float64) **out = **in } + out.SASURLSecretRef = in.SASURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WindowsWebAppLogsHTTPLogsAzureBlobStorageInitParameters. @@ -49766,6 +50111,11 @@ func (in *WindowsWebAppSiteConfigApplicationStackInitParameters) DeepCopyInto(ou *out = new(string) **out = **in } + if in.DockerRegistryPasswordSecretRef != nil { + in, out := &in.DockerRegistryPasswordSecretRef, &out.DockerRegistryPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DockerRegistryURL != nil { in, out := &in.DockerRegistryURL, &out.DockerRegistryURL *out = new(string) @@ -51632,6 +51982,11 @@ func (in *WindowsWebAppSlotAuthSettingsActiveDirectoryInitParameters) DeepCopyIn *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -51734,6 +52089,11 @@ func (in *WindowsWebAppSlotAuthSettingsFacebookInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + if in.AppSecretSecretRef != nil { + in, out := &in.AppSecretSecretRef, &out.AppSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.AppSecretSettingName != nil { in, out := &in.AppSecretSettingName, &out.AppSecretSettingName *out = new(string) @@ -51847,6 +52207,11 @@ func (in *WindowsWebAppSlotAuthSettingsGithubInitParameters) DeepCopyInto(out *W *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -51960,6 +52325,11 @@ func (in *WindowsWebAppSlotAuthSettingsGoogleInitParameters) DeepCopyInto(out *W *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -52180,6 +52550,11 @@ func (in *WindowsWebAppSlotAuthSettingsMicrosoftInitParameters) DeepCopyInto(out *out = new(string) **out = **in } + if in.ClientSecretSecretRef != nil { + in, out := &in.ClientSecretSecretRef, &out.ClientSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ClientSecretSettingName != nil { in, out := &in.ClientSecretSettingName, &out.ClientSecretSettingName *out = new(string) @@ -52507,6 +52882,11 @@ func (in *WindowsWebAppSlotAuthSettingsTwitterInitParameters) DeepCopyInto(out * *out = new(string) **out = **in } + if in.ConsumerSecretSecretRef != nil { + in, out := &in.ConsumerSecretSecretRef, &out.ConsumerSecretSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.ConsumerSecretSettingName != nil { in, out := &in.ConsumerSecretSettingName, &out.ConsumerSecretSettingName *out = new(string) @@ -54492,6 +54872,7 @@ func (in *WindowsWebAppSlotBackupInitParameters) DeepCopyInto(out *WindowsWebApp *out = new(WindowsWebAppSlotBackupScheduleInitParameters) (*in).DeepCopyInto(*out) } + out.StorageAccountURLSecretRef = in.StorageAccountURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WindowsWebAppSlotBackupInitParameters. @@ -54703,6 +55084,7 @@ func (in *WindowsWebAppSlotConnectionStringInitParameters) DeepCopyInto(out *Win *out = new(string) **out = **in } + out.ValueSecretRef = in.ValueSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WindowsWebAppSlotConnectionStringInitParameters. @@ -55240,6 +55622,7 @@ func (in *WindowsWebAppSlotLogsHTTPLogsAzureBlobStorageInitParameters) DeepCopyI *out = new(float64) **out = **in } + out.SASURLSecretRef = in.SASURLSecretRef } // DeepCopy is an autogenerated deepcopy function, copying the receiver, creating a new WindowsWebAppSlotLogsHTTPLogsAzureBlobStorageInitParameters. @@ -55970,6 +56353,11 @@ func (in *WindowsWebAppSlotSiteConfigApplicationStackInitParameters) DeepCopyInt *out = new(string) **out = **in } + if in.DockerRegistryPasswordSecretRef != nil { + in, out := &in.DockerRegistryPasswordSecretRef, &out.DockerRegistryPasswordSecretRef + *out = new(v1.SecretKeySelector) + **out = **in + } if in.DockerRegistryURL != nil { in, out := &in.DockerRegistryURL, &out.DockerRegistryURL *out = new(string) @@ -58039,6 +58427,7 @@ func (in *WindowsWebAppSlotStatus) DeepCopy() *WindowsWebAppSlotStatus { // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *WindowsWebAppSlotStorageAccountInitParameters) DeepCopyInto(out *WindowsWebAppSlotStorageAccountInitParameters) { *out = *in + out.AccessKeySecretRef = in.AccessKeySecretRef if in.AccountName != nil { in, out := &in.AccountName, &out.AccountName *out = new(string) @@ -58306,6 +58695,7 @@ func (in *WindowsWebAppStickySettingsParameters) DeepCopy() *WindowsWebAppSticky // DeepCopyInto is an autogenerated deepcopy function, copying the receiver, writing into out. in must be non-nil. func (in *WindowsWebAppStorageAccountInitParameters) DeepCopyInto(out *WindowsWebAppStorageAccountInitParameters) { *out = *in + out.AccessKeySecretRef = in.AccessKeySecretRef if in.AccountName != nil { in, out := &in.AccountName, &out.AccountName *out = new(string) diff --git a/apis/web/v1beta2/zz_linuxfunctionapp_terraformed.go b/apis/web/v1beta2/zz_linuxfunctionapp_terraformed.go index 2fbf7c6fd..fd45b2afe 100755 --- a/apis/web/v1beta2/zz_linuxfunctionapp_terraformed.go +++ b/apis/web/v1beta2/zz_linuxfunctionapp_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinuxFunctionApp) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinuxFunctionApp func (tr *LinuxFunctionApp) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"auth_settings[*].active_directory[*].client_secret": "spec.forProvider.authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "spec.forProvider.authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "spec.forProvider.authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "spec.forProvider.authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "spec.forProvider.authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "spec.forProvider.authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "spec.forProvider.backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "spec.forProvider.connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "site_config[*].application_insights_connection_string": "spec.forProvider.siteConfig[*].applicationInsightsConnectionStringSecretRef", "site_config[*].application_insights_key": "spec.forProvider.siteConfig[*].applicationInsightsKeySecretRef", "site_config[*].application_stack[*].docker[*].registry_password": "spec.forProvider.siteConfig[*].applicationStack[*].docker[*].registryPasswordSecretRef", "site_config[*].application_stack[*].docker[*].registry_username": "spec.forProvider.siteConfig[*].applicationStack[*].docker[*].registryUsernameSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "spec.forProvider.storageAccount[*].accessKeySecretRef", "storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"auth_settings[*].active_directory[*].client_secret": "authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "site_config[*].application_insights_connection_string": "siteConfig[*].applicationInsightsConnectionStringSecretRef", "site_config[*].application_insights_key": "siteConfig[*].applicationInsightsKeySecretRef", "site_config[*].application_stack[*].docker[*].registry_password": "siteConfig[*].applicationStack[*].docker[*].registryPasswordSecretRef", "site_config[*].application_stack[*].docker[*].registry_username": "siteConfig[*].applicationStack[*].docker[*].registryUsernameSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "storageAccount[*].accessKeySecretRef", "storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this LinuxFunctionApp diff --git a/apis/web/v1beta2/zz_linuxfunctionapp_types.go b/apis/web/v1beta2/zz_linuxfunctionapp_types.go index db734d94b..75344bbd2 100755 --- a/apis/web/v1beta2/zz_linuxfunctionapp_types.go +++ b/apis/web/v1beta2/zz_linuxfunctionapp_types.go @@ -663,6 +663,10 @@ type BackupInitParameters struct { // A schedule block as defined below. Schedule *ScheduleInitParameters `json:"schedule,omitempty" tf:"schedule,omitempty"` + + // The SAS URL to the container. + // The SAS URL to the container. + StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } type BackupObservation struct { @@ -697,7 +701,7 @@ type BackupParameters struct { // The SAS URL to the container. // The SAS URL to the container. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } @@ -809,9 +813,17 @@ type DockerInitParameters struct { // The image tag of the image to use. ImageTag *string `json:"imageTag,omitempty" tf:"image_tag,omitempty"` + // The password for the account to use to connect to the registry. + // The password for the account to use to connect to the registry. + RegistryPasswordSecretRef *v1.SecretKeySelector `json:"registryPasswordSecretRef,omitempty" tf:"-"` + // The URL of the docker registry. // The URL of the docker registry. RegistryURL *string `json:"registryUrl,omitempty" tf:"registry_url,omitempty"` + + // The username to use for connections to the registry. + // The username to use for connections to the registry. + RegistryUsernameSecretRef *v1.SecretKeySelector `json:"registryUsernameSecretRef,omitempty" tf:"-"` } type DockerObservation struct { @@ -924,6 +936,10 @@ type GithubInitParameters struct { // The ID of the GitHub app used for login. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for GitHub Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -1090,6 +1106,10 @@ type LinuxFunctionAppAuthSettingsActiveDirectoryInitParameters struct { // The ID of the Client to use to authenticate with Azure Active Directory. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The App Setting name that contains the client secret of the Client. Cannot be used with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -1139,6 +1159,10 @@ type LinuxFunctionAppAuthSettingsFacebookInitParameters struct { // The App ID of the Facebook app used for login. AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + // The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + AppSecretSecretRef *v1.SecretKeySelector `json:"appSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the app_secret value used for Facebook Login. // The app setting name that contains the `app_secret` value used for Facebook Login. Cannot be specified with `app_secret`. AppSecretSettingName *string `json:"appSecretSettingName,omitempty" tf:"app_secret_setting_name,omitempty"` @@ -1192,6 +1216,10 @@ type LinuxFunctionAppAuthSettingsGoogleInitParameters struct { // The OpenID Connect Client ID for the Google web application. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for Google Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -1303,6 +1331,10 @@ type LinuxFunctionAppAuthSettingsMicrosoftInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -1487,6 +1519,10 @@ type LinuxFunctionAppAuthSettingsTwitterInitParameters struct { // The OAuth 1.0a consumer key of the Twitter application used for sign-in. ConsumerKey *string `json:"consumerKey,omitempty" tf:"consumer_key,omitempty"` + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + ConsumerSecretSecretRef *v1.SecretKeySelector `json:"consumerSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret`. ConsumerSecretSettingName *string `json:"consumerSecretSettingName,omitempty" tf:"consumer_secret_setting_name,omitempty"` @@ -1530,6 +1566,10 @@ type LinuxFunctionAppConnectionStringInitParameters struct { // Type of database. Possible values include: MySQL, SQLServer, SQLAzure, Custom, NotificationHub, ServiceBus, EventHub, APIHub, DocDb, RedisCache, and PostgreSQL. // Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // The connection string value. + // The connection string value. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type LinuxFunctionAppConnectionStringObservation struct { @@ -1557,7 +1597,7 @@ type LinuxFunctionAppConnectionStringParameters struct { // The connection string value. // The connection string value. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } @@ -1709,6 +1749,10 @@ type LinuxFunctionAppInitParameters struct { // One or more storage_account blocks as defined below. StorageAccount []StorageAccountInitParameters `json:"storageAccount,omitempty" tf:"storage_account,omitempty"` + // The access key which will be used to access the backend storage account for the Function App. Conflicts with storage_uses_managed_identity. + // The access key which will be used to access the storage account for the Function App. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // The backend storage account name which will be used by this Function App. // The backend storage account name which will be used by this Function App. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account @@ -2283,6 +2327,14 @@ type LinuxFunctionAppSiteConfigInitParameters struct { // An app_service_logs block as defined above. AppServiceLogs *AppServiceLogsInitParameters `json:"appServiceLogs,omitempty" tf:"app_service_logs,omitempty"` + // The Connection String for linking the Linux Function App to Application Insights. + // The Connection String for linking the Linux Function App to Application Insights. + ApplicationInsightsConnectionStringSecretRef *v1.SecretKeySelector `json:"applicationInsightsConnectionStringSecretRef,omitempty" tf:"-"` + + // The Instrumentation Key for connecting the Linux Function App to Application Insights. + // The Instrumentation Key for connecting the Linux Function App to Application Insights. + ApplicationInsightsKeySecretRef *v1.SecretKeySelector `json:"applicationInsightsKeySecretRef,omitempty" tf:"-"` + // An application_stack block as defined above. ApplicationStack *ApplicationStackInitParameters `json:"applicationStack,omitempty" tf:"application_stack,omitempty"` @@ -3259,6 +3311,9 @@ type StickySettingsParameters struct { type StorageAccountInitParameters struct { + // The Access key for the storage account. + AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` + // The Name of the Storage Account. AccountName *string `json:"accountName,omitempty" tf:"account_name,omitempty"` @@ -3296,7 +3351,7 @@ type StorageAccountObservation struct { type StorageAccountParameters struct { // The Access key for the storage account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` // The Name of the Storage Account. diff --git a/apis/web/v1beta2/zz_linuxfunctionappslot_terraformed.go b/apis/web/v1beta2/zz_linuxfunctionappslot_terraformed.go index 240103f46..8cbdba142 100755 --- a/apis/web/v1beta2/zz_linuxfunctionappslot_terraformed.go +++ b/apis/web/v1beta2/zz_linuxfunctionappslot_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinuxFunctionAppSlot) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinuxFunctionAppSlot func (tr *LinuxFunctionAppSlot) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"auth_settings[*].active_directory[*].client_secret": "spec.forProvider.authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "spec.forProvider.authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "spec.forProvider.authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "spec.forProvider.authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "spec.forProvider.authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "spec.forProvider.authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "spec.forProvider.backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "spec.forProvider.connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "site_config[*].application_insights_connection_string": "spec.forProvider.siteConfig[*].applicationInsightsConnectionStringSecretRef", "site_config[*].application_insights_key": "spec.forProvider.siteConfig[*].applicationInsightsKeySecretRef", "site_config[*].application_stack[*].docker[*].registry_password": "spec.forProvider.siteConfig[*].applicationStack[*].docker[*].registryPasswordSecretRef", "site_config[*].application_stack[*].docker[*].registry_username": "spec.forProvider.siteConfig[*].applicationStack[*].docker[*].registryUsernameSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "spec.forProvider.storageAccount[*].accessKeySecretRef", "storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"auth_settings[*].active_directory[*].client_secret": "authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "site_config[*].application_insights_connection_string": "siteConfig[*].applicationInsightsConnectionStringSecretRef", "site_config[*].application_insights_key": "siteConfig[*].applicationInsightsKeySecretRef", "site_config[*].application_stack[*].docker[*].registry_password": "siteConfig[*].applicationStack[*].docker[*].registryPasswordSecretRef", "site_config[*].application_stack[*].docker[*].registry_username": "siteConfig[*].applicationStack[*].docker[*].registryUsernameSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "storageAccount[*].accessKeySecretRef", "storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this LinuxFunctionAppSlot diff --git a/apis/web/v1beta2/zz_linuxfunctionappslot_types.go b/apis/web/v1beta2/zz_linuxfunctionappslot_types.go index 4eaf75aa7..7ecb630ef 100755 --- a/apis/web/v1beta2/zz_linuxfunctionappslot_types.go +++ b/apis/web/v1beta2/zz_linuxfunctionappslot_types.go @@ -23,9 +23,17 @@ type ApplicationStackDockerInitParameters struct { // The image tag of the image to use. ImageTag *string `json:"imageTag,omitempty" tf:"image_tag,omitempty"` + // The password for the account to use to connect to the registry. + // The password for the account to use to connect to the registry. + RegistryPasswordSecretRef *v1.SecretKeySelector `json:"registryPasswordSecretRef,omitempty" tf:"-"` + // The URL of the docker registry. // The URL of the docker registry. RegistryURL *string `json:"registryUrl,omitempty" tf:"registry_url,omitempty"` + + // The username to use for connections to the registry. + // The username to use for connections to the registry. + RegistryUsernameSecretRef *v1.SecretKeySelector `json:"registryUsernameSecretRef,omitempty" tf:"-"` } type ApplicationStackDockerObservation struct { @@ -77,6 +85,10 @@ type AuthSettingsGithubInitParameters struct { // The ID of the GitHub app used for login. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for GitHub Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -956,6 +968,10 @@ type LinuxFunctionAppSlotAuthSettingsActiveDirectoryInitParameters struct { // The ID of the Client to use to authenticate with Azure Active Directory. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The App Setting name that contains the client secret of the Client. Cannot be used with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -1005,6 +1021,10 @@ type LinuxFunctionAppSlotAuthSettingsFacebookInitParameters struct { // The App ID of the Facebook app used for login. AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + // The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + AppSecretSecretRef *v1.SecretKeySelector `json:"appSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the app_secret value used for Facebook Login. // The app setting name that contains the `app_secret` value used for Facebook Login. Cannot be specified with `app_secret`. AppSecretSettingName *string `json:"appSecretSettingName,omitempty" tf:"app_secret_setting_name,omitempty"` @@ -1058,6 +1078,10 @@ type LinuxFunctionAppSlotAuthSettingsGoogleInitParameters struct { // The OpenID Connect Client ID for the Google web application. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for Google Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -1169,6 +1193,10 @@ type LinuxFunctionAppSlotAuthSettingsMicrosoftInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -1353,6 +1381,10 @@ type LinuxFunctionAppSlotAuthSettingsTwitterInitParameters struct { // The OAuth 1.0a consumer key of the Twitter application used for sign-in. ConsumerKey *string `json:"consumerKey,omitempty" tf:"consumer_key,omitempty"` + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + ConsumerSecretSecretRef *v1.SecretKeySelector `json:"consumerSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret`. ConsumerSecretSettingName *string `json:"consumerSecretSettingName,omitempty" tf:"consumer_secret_setting_name,omitempty"` @@ -1664,6 +1696,10 @@ type LinuxFunctionAppSlotBackupInitParameters struct { // a schedule block as detailed below. Schedule *BackupScheduleInitParameters `json:"schedule,omitempty" tf:"schedule,omitempty"` + + // The SAS URL to the container. + // The SAS URL to the container. + StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } type LinuxFunctionAppSlotBackupObservation struct { @@ -1698,7 +1734,7 @@ type LinuxFunctionAppSlotBackupParameters struct { // The SAS URL to the container. // The SAS URL to the container. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } @@ -1711,6 +1747,10 @@ type LinuxFunctionAppSlotConnectionStringInitParameters struct { // Type of database. Possible values include: APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. // Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // The connection string value. + // The connection string value. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type LinuxFunctionAppSlotConnectionStringObservation struct { @@ -1738,7 +1778,7 @@ type LinuxFunctionAppSlotConnectionStringParameters struct { // The connection string value. // The connection string value. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } @@ -1857,6 +1897,10 @@ type LinuxFunctionAppSlotInitParameters struct { // One or more storage_account blocks as defined below. StorageAccount []LinuxFunctionAppSlotStorageAccountInitParameters `json:"storageAccount,omitempty" tf:"storage_account,omitempty"` + // The access key which will be used to access the storage account for the Function App Slot. + // The access key which will be used to access the storage account for the Function App Slot. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // The backend storage account name which will be used by this Function App Slot. // The backend storage account name which will be used by this Function App Slot. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account @@ -2435,6 +2479,14 @@ type LinuxFunctionAppSlotSiteConfigInitParameters struct { // an app_service_logs block as detailed below. AppServiceLogs *SiteConfigAppServiceLogsInitParameters `json:"appServiceLogs,omitempty" tf:"app_service_logs,omitempty"` + // The Connection String for linking the Linux Function App to Application Insights. + // The Connection String for linking the Linux Function App to Application Insights. + ApplicationInsightsConnectionStringSecretRef *v1.SecretKeySelector `json:"applicationInsightsConnectionStringSecretRef,omitempty" tf:"-"` + + // The Instrumentation Key for connecting the Linux Function App to Application Insights. + // The Instrumentation Key for connecting the Linux Function App to Application Insights. + ApplicationInsightsKeySecretRef *v1.SecretKeySelector `json:"applicationInsightsKeySecretRef,omitempty" tf:"-"` + // an application_stack block as detailed below. ApplicationStack *SiteConfigApplicationStackInitParameters `json:"applicationStack,omitempty" tf:"application_stack,omitempty"` @@ -3055,6 +3107,9 @@ type LinuxFunctionAppSlotSiteCredentialParameters struct { type LinuxFunctionAppSlotStorageAccountInitParameters struct { + // The Access key for the storage account. + AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` + // The Name of the Storage Account. AccountName *string `json:"accountName,omitempty" tf:"account_name,omitempty"` @@ -3092,7 +3147,7 @@ type LinuxFunctionAppSlotStorageAccountObservation struct { type LinuxFunctionAppSlotStorageAccountParameters struct { // The Access key for the storage account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` // The Name of the Storage Account. diff --git a/apis/web/v1beta2/zz_linuxwebapp_terraformed.go b/apis/web/v1beta2/zz_linuxwebapp_terraformed.go index 0d8ccd515..f80ffc045 100755 --- a/apis/web/v1beta2/zz_linuxwebapp_terraformed.go +++ b/apis/web/v1beta2/zz_linuxwebapp_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinuxWebApp) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinuxWebApp func (tr *LinuxWebApp) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"auth_settings[*].active_directory[*].client_secret": "spec.forProvider.authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "spec.forProvider.authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "spec.forProvider.authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "spec.forProvider.authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "spec.forProvider.authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "spec.forProvider.authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "spec.forProvider.backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "spec.forProvider.connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "logs[*].http_logs[*].azure_blob_storage[*].sas_url": "spec.forProvider.logs[*].httpLogs[*].azureBlobStorage[*].sasUrlSecretRef", "site_config[*].application_stack[*].docker_registry_password": "spec.forProvider.siteConfig[*].applicationStack[*].dockerRegistryPasswordSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "spec.forProvider.storageAccount[*].accessKeySecretRef"} + return map[string]string{"auth_settings[*].active_directory[*].client_secret": "authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "logs[*].http_logs[*].azure_blob_storage[*].sas_url": "logs[*].httpLogs[*].azureBlobStorage[*].sasUrlSecretRef", "site_config[*].application_stack[*].docker_registry_password": "siteConfig[*].applicationStack[*].dockerRegistryPasswordSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "storageAccount[*].accessKeySecretRef"} } // GetObservation of this LinuxWebApp diff --git a/apis/web/v1beta2/zz_linuxwebapp_types.go b/apis/web/v1beta2/zz_linuxwebapp_types.go index dce2103bb..bdde30ee6 100755 --- a/apis/web/v1beta2/zz_linuxwebapp_types.go +++ b/apis/web/v1beta2/zz_linuxwebapp_types.go @@ -172,6 +172,9 @@ type HTTPLogsAzureBlobStorageInitParameters struct { // The retention period in days. A value of 0 means no retention. RetentionInDays *float64 `json:"retentionInDays,omitempty" tf:"retention_in_days,omitempty"` + + // SAS url to an Azure blob container with read/write/list/delete permissions. + SASURLSecretRef v1.SecretKeySelector `json:"sasurlSecretRef" tf:"-"` } type HTTPLogsAzureBlobStorageObservation struct { @@ -187,7 +190,7 @@ type HTTPLogsAzureBlobStorageParameters struct { RetentionInDays *float64 `json:"retentionInDays,omitempty" tf:"retention_in_days,omitempty"` // SAS url to an Azure blob container with read/write/list/delete permissions. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional SASURLSecretRef v1.SecretKeySelector `json:"sasurlSecretRef" tf:"-"` } @@ -230,6 +233,10 @@ type LinuxWebAppAuthSettingsActiveDirectoryInitParameters struct { // The ID of the Client to use to authenticate with Azure Active Directory. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The App Setting name that contains the client secret of the Client. Cannot be used with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -279,6 +286,10 @@ type LinuxWebAppAuthSettingsFacebookInitParameters struct { // The App ID of the Facebook app used for login. AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + // The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + AppSecretSecretRef *v1.SecretKeySelector `json:"appSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the app_secret value used for Facebook Login. // The app setting name that contains the `app_secret` value used for Facebook Login. Cannot be specified with `app_secret`. AppSecretSettingName *string `json:"appSecretSettingName,omitempty" tf:"app_secret_setting_name,omitempty"` @@ -332,6 +343,10 @@ type LinuxWebAppAuthSettingsGithubInitParameters struct { // The ID of the GitHub app used for login. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for GitHub Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -385,6 +400,10 @@ type LinuxWebAppAuthSettingsGoogleInitParameters struct { // The OpenID Connect Client ID for the Google web application. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for Google Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -496,6 +515,10 @@ type LinuxWebAppAuthSettingsMicrosoftInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -680,6 +703,10 @@ type LinuxWebAppAuthSettingsTwitterInitParameters struct { // The OAuth 1.0a consumer key of the Twitter application used for sign-in. ConsumerKey *string `json:"consumerKey,omitempty" tf:"consumer_key,omitempty"` + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + ConsumerSecretSecretRef *v1.SecretKeySelector `json:"consumerSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret`. ConsumerSecretSettingName *string `json:"consumerSecretSettingName,omitempty" tf:"consumer_secret_setting_name,omitempty"` @@ -1735,6 +1762,10 @@ type LinuxWebAppBackupInitParameters struct { // A schedule block as defined below. Schedule *LinuxWebAppBackupScheduleInitParameters `json:"schedule,omitempty" tf:"schedule,omitempty"` + + // The SAS URL to the container. + // The SAS URL to the container. + StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } type LinuxWebAppBackupObservation struct { @@ -1769,7 +1800,7 @@ type LinuxWebAppBackupParameters struct { // The SAS URL to the container. // The SAS URL to the container. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } @@ -1859,6 +1890,10 @@ type LinuxWebAppConnectionStringInitParameters struct { // Type of database. Possible values include: MySQL, SQLServer, SQLAzure, Custom, NotificationHub, ServiceBus, EventHub, APIHub, DocDb, RedisCache, and PostgreSQL. // Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // The connection string value. + // The connection string value. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type LinuxWebAppConnectionStringObservation struct { @@ -1886,7 +1921,7 @@ type LinuxWebAppConnectionStringParameters struct { // The connection string value. // The connection string value. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } @@ -2287,6 +2322,9 @@ type LinuxWebAppSiteConfigApplicationStackInitParameters struct { DockerImageTag *string `json:"dockerImageTag,omitempty" tf:"docker_image_tag,omitempty"` + // The User Name to use for authentication against the registry to pull the image. + DockerRegistryPasswordSecretRef *v1.SecretKeySelector `json:"dockerRegistryPasswordSecretRef,omitempty" tf:"-"` + // The URL of the container registry where the docker_image_name is located. e.g. https://index.docker.io or https://mcr.microsoft.com. This value is required with docker_image_name. DockerRegistryURL *string `json:"dockerRegistryUrl,omitempty" tf:"docker_registry_url,omitempty"` @@ -3198,6 +3236,9 @@ type LinuxWebAppStickySettingsParameters struct { type LinuxWebAppStorageAccountInitParameters struct { + // The Access key for the storage account. + AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` + // The Name of the Storage Account. AccountName *string `json:"accountName,omitempty" tf:"account_name,omitempty"` @@ -3235,7 +3276,7 @@ type LinuxWebAppStorageAccountObservation struct { type LinuxWebAppStorageAccountParameters struct { // The Access key for the storage account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` // The Name of the Storage Account. diff --git a/apis/web/v1beta2/zz_linuxwebappslot_terraformed.go b/apis/web/v1beta2/zz_linuxwebappslot_terraformed.go index 4b1d6b7c3..e2c5d5038 100755 --- a/apis/web/v1beta2/zz_linuxwebappslot_terraformed.go +++ b/apis/web/v1beta2/zz_linuxwebappslot_terraformed.go @@ -21,7 +21,7 @@ func (mg *LinuxWebAppSlot) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this LinuxWebAppSlot func (tr *LinuxWebAppSlot) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"auth_settings[*].active_directory[*].client_secret": "spec.forProvider.authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "spec.forProvider.authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "spec.forProvider.authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "spec.forProvider.authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "spec.forProvider.authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "spec.forProvider.authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "spec.forProvider.backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "spec.forProvider.connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "logs[*].http_logs[*].azure_blob_storage[*].sas_url": "spec.forProvider.logs[*].httpLogs[*].azureBlobStorage[*].sasUrlSecretRef", "site_config[*].application_stack[*].docker_registry_password": "spec.forProvider.siteConfig[*].applicationStack[*].dockerRegistryPasswordSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "spec.forProvider.storageAccount[*].accessKeySecretRef"} + return map[string]string{"auth_settings[*].active_directory[*].client_secret": "authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "logs[*].http_logs[*].azure_blob_storage[*].sas_url": "logs[*].httpLogs[*].azureBlobStorage[*].sasUrlSecretRef", "site_config[*].application_stack[*].docker_registry_password": "siteConfig[*].applicationStack[*].dockerRegistryPasswordSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "storageAccount[*].accessKeySecretRef"} } // GetObservation of this LinuxWebAppSlot diff --git a/apis/web/v1beta2/zz_linuxwebappslot_types.go b/apis/web/v1beta2/zz_linuxwebappslot_types.go index d55ad3a79..1eb65085a 100755 --- a/apis/web/v1beta2/zz_linuxwebappslot_types.go +++ b/apis/web/v1beta2/zz_linuxwebappslot_types.go @@ -159,6 +159,10 @@ type LinuxWebAppSlotAuthSettingsActiveDirectoryInitParameters struct { // The ID of the Client to use to authenticate with Azure Active Directory. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The App Setting name that contains the client secret of the Client. Cannot be used with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -208,6 +212,10 @@ type LinuxWebAppSlotAuthSettingsFacebookInitParameters struct { // The App ID of the Facebook app used for login. AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + // The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + AppSecretSecretRef *v1.SecretKeySelector `json:"appSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the app_secret value used for Facebook Login. // The app setting name that contains the `app_secret` value used for Facebook Login. Cannot be specified with `app_secret`. AppSecretSettingName *string `json:"appSecretSettingName,omitempty" tf:"app_secret_setting_name,omitempty"` @@ -261,6 +269,10 @@ type LinuxWebAppSlotAuthSettingsGithubInitParameters struct { // The ID of the GitHub app used for login. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for GitHub Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -314,6 +326,10 @@ type LinuxWebAppSlotAuthSettingsGoogleInitParameters struct { // The OpenID Connect Client ID for the Google web application. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for Google Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -425,6 +441,10 @@ type LinuxWebAppSlotAuthSettingsMicrosoftInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -609,6 +629,10 @@ type LinuxWebAppSlotAuthSettingsTwitterInitParameters struct { // The OAuth 1.0a consumer key of the Twitter application used for sign-in. ConsumerKey *string `json:"consumerKey,omitempty" tf:"consumer_key,omitempty"` + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + ConsumerSecretSecretRef *v1.SecretKeySelector `json:"consumerSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret`. ConsumerSecretSettingName *string `json:"consumerSecretSettingName,omitempty" tf:"consumer_secret_setting_name,omitempty"` @@ -1664,6 +1688,10 @@ type LinuxWebAppSlotBackupInitParameters struct { // An schedule block as defined below. Schedule *LinuxWebAppSlotBackupScheduleInitParameters `json:"schedule,omitempty" tf:"schedule,omitempty"` + + // The SAS URL to the container. + // The SAS URL to the container. + StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } type LinuxWebAppSlotBackupObservation struct { @@ -1698,7 +1726,7 @@ type LinuxWebAppSlotBackupParameters struct { // The SAS URL to the container. // The SAS URL to the container. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } @@ -1788,6 +1816,10 @@ type LinuxWebAppSlotConnectionStringInitParameters struct { // Type of database. Possible values include APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. // Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // The connection string value. + // The connection string value. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type LinuxWebAppSlotConnectionStringObservation struct { @@ -1815,7 +1847,7 @@ type LinuxWebAppSlotConnectionStringParameters struct { // The connection string value. // The connection string value. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } @@ -2253,6 +2285,9 @@ type LinuxWebAppSlotSiteConfigApplicationStackInitParameters struct { DockerImageTag *string `json:"dockerImageTag,omitempty" tf:"docker_image_tag,omitempty"` + // The User Name to use for authentication against the registry to pull the image. + DockerRegistryPasswordSecretRef *v1.SecretKeySelector `json:"dockerRegistryPasswordSecretRef,omitempty" tf:"-"` + // The URL of the container registry where the docker_image_name is located. e.g. https://index.docker.io or https://mcr.microsoft.com. This value is required with docker_image_name. DockerRegistryURL *string `json:"dockerRegistryUrl,omitempty" tf:"docker_registry_url,omitempty"` @@ -3145,6 +3180,9 @@ type LinuxWebAppSlotSiteCredentialParameters struct { type LinuxWebAppSlotStorageAccountInitParameters struct { + // The Access key for the storage account. + AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` + // The Name of the Storage Account. AccountName *string `json:"accountName,omitempty" tf:"account_name,omitempty"` @@ -3182,7 +3220,7 @@ type LinuxWebAppSlotStorageAccountObservation struct { type LinuxWebAppSlotStorageAccountParameters struct { // The Access key for the storage account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` // The Name of the Storage Account. @@ -3239,6 +3277,9 @@ type LogsHTTPLogsAzureBlobStorageInitParameters struct { // The retention period in days. A values of 0 means no retention. RetentionInDays *float64 `json:"retentionInDays,omitempty" tf:"retention_in_days,omitempty"` + + // SAS url to an Azure blob container with read/write/list/delete permissions. + SASURLSecretRef v1.SecretKeySelector `json:"sasurlSecretRef" tf:"-"` } type LogsHTTPLogsAzureBlobStorageObservation struct { @@ -3254,7 +3295,7 @@ type LogsHTTPLogsAzureBlobStorageParameters struct { RetentionInDays *float64 `json:"retentionInDays,omitempty" tf:"retention_in_days,omitempty"` // SAS url to an Azure blob container with read/write/list/delete permissions. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional SASURLSecretRef v1.SecretKeySelector `json:"sasurlSecretRef" tf:"-"` } diff --git a/apis/web/v1beta2/zz_windowsfunctionapp_terraformed.go b/apis/web/v1beta2/zz_windowsfunctionapp_terraformed.go index b7f52c9a1..ac1e798e8 100755 --- a/apis/web/v1beta2/zz_windowsfunctionapp_terraformed.go +++ b/apis/web/v1beta2/zz_windowsfunctionapp_terraformed.go @@ -21,7 +21,7 @@ func (mg *WindowsFunctionApp) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this WindowsFunctionApp func (tr *WindowsFunctionApp) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"auth_settings[*].active_directory[*].client_secret": "spec.forProvider.authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "spec.forProvider.authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "spec.forProvider.authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "spec.forProvider.authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "spec.forProvider.authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "spec.forProvider.authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "spec.forProvider.backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "spec.forProvider.connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "site_config[*].application_insights_connection_string": "spec.forProvider.siteConfig[*].applicationInsightsConnectionStringSecretRef", "site_config[*].application_insights_key": "spec.forProvider.siteConfig[*].applicationInsightsKeySecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "spec.forProvider.storageAccount[*].accessKeySecretRef", "storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"auth_settings[*].active_directory[*].client_secret": "authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "site_config[*].application_insights_connection_string": "siteConfig[*].applicationInsightsConnectionStringSecretRef", "site_config[*].application_insights_key": "siteConfig[*].applicationInsightsKeySecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "storageAccount[*].accessKeySecretRef", "storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this WindowsFunctionApp diff --git a/apis/web/v1beta2/zz_windowsfunctionapp_types.go b/apis/web/v1beta2/zz_windowsfunctionapp_types.go index 38d456c07..a6a88cdad 100755 --- a/apis/web/v1beta2/zz_windowsfunctionapp_types.go +++ b/apis/web/v1beta2/zz_windowsfunctionapp_types.go @@ -23,6 +23,10 @@ type WindowsFunctionAppAuthSettingsActiveDirectoryInitParameters struct { // The ID of the Client to use to authenticate with Azure Active Directory. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The App Setting name that contains the client secret of the Client. Cannot be used with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -72,6 +76,10 @@ type WindowsFunctionAppAuthSettingsFacebookInitParameters struct { // The App ID of the Facebook app used for login. AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + // The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + AppSecretSecretRef *v1.SecretKeySelector `json:"appSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the app_secret value used for Facebook Login. // The app setting name that contains the `app_secret` value used for Facebook Login. Cannot be specified with `app_secret`. AppSecretSettingName *string `json:"appSecretSettingName,omitempty" tf:"app_secret_setting_name,omitempty"` @@ -125,6 +133,10 @@ type WindowsFunctionAppAuthSettingsGithubInitParameters struct { // The ID of the GitHub app used for login. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for GitHub Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -178,6 +190,10 @@ type WindowsFunctionAppAuthSettingsGoogleInitParameters struct { // The OpenID Connect Client ID for the Google web application. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for Google Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -289,6 +305,10 @@ type WindowsFunctionAppAuthSettingsMicrosoftInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -473,6 +493,10 @@ type WindowsFunctionAppAuthSettingsTwitterInitParameters struct { // The OAuth 1.0a consumer key of the Twitter application used for sign-in. ConsumerKey *string `json:"consumerKey,omitempty" tf:"consumer_key,omitempty"` + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + ConsumerSecretSecretRef *v1.SecretKeySelector `json:"consumerSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret`. ConsumerSecretSettingName *string `json:"consumerSecretSettingName,omitempty" tf:"consumer_secret_setting_name,omitempty"` @@ -1528,6 +1552,10 @@ type WindowsFunctionAppBackupInitParameters struct { // A schedule block as defined below. Schedule *WindowsFunctionAppBackupScheduleInitParameters `json:"schedule,omitempty" tf:"schedule,omitempty"` + + // The SAS URL to the container. + // The SAS URL to the container. + StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } type WindowsFunctionAppBackupObservation struct { @@ -1562,7 +1590,7 @@ type WindowsFunctionAppBackupParameters struct { // The SAS URL to the container. // The SAS URL to the container. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } @@ -1652,6 +1680,10 @@ type WindowsFunctionAppConnectionStringInitParameters struct { // Type of database. Possible values include: APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. // Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // The connection string value. + // The connection string value. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type WindowsFunctionAppConnectionStringObservation struct { @@ -1679,7 +1711,7 @@ type WindowsFunctionAppConnectionStringParameters struct { // The connection string value. // The connection string value. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } @@ -1815,6 +1847,10 @@ type WindowsFunctionAppInitParameters struct { // One or more storage_account blocks as defined below. StorageAccount []WindowsFunctionAppStorageAccountInitParameters `json:"storageAccount,omitempty" tf:"storage_account,omitempty"` + // The access key which will be used to access the backend storage account for the Function App. Conflicts with storage_uses_managed_identity. + // The access key which will be used to access the storage account for the Function App. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // The backend storage account name which will be used by this Function App. // The backend storage account name which will be used by this Function App. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account @@ -2551,6 +2587,14 @@ type WindowsFunctionAppSiteConfigInitParameters struct { // An app_service_logs block as defined above. AppServiceLogs *WindowsFunctionAppSiteConfigAppServiceLogsInitParameters `json:"appServiceLogs,omitempty" tf:"app_service_logs,omitempty"` + // The Connection String for linking the Windows Function App to Application Insights. + // The Connection String for linking the Windows Function App to Application Insights. + ApplicationInsightsConnectionStringSecretRef *v1.SecretKeySelector `json:"applicationInsightsConnectionStringSecretRef,omitempty" tf:"-"` + + // The Instrumentation Key for connecting the Windows Function App to Application Insights. + // The Instrumentation Key for connecting the Windows Function App to Application Insights. + ApplicationInsightsKeySecretRef *v1.SecretKeySelector `json:"applicationInsightsKeySecretRef,omitempty" tf:"-"` + // An application_stack block as defined above. ApplicationStack *WindowsFunctionAppSiteConfigApplicationStackInitParameters `json:"applicationStack,omitempty" tf:"application_stack,omitempty"` @@ -3162,6 +3206,9 @@ type WindowsFunctionAppStickySettingsParameters struct { type WindowsFunctionAppStorageAccountInitParameters struct { + // The Access key for the storage account. + AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` + // The Name of the Storage Account. AccountName *string `json:"accountName,omitempty" tf:"account_name,omitempty"` @@ -3199,7 +3246,7 @@ type WindowsFunctionAppStorageAccountObservation struct { type WindowsFunctionAppStorageAccountParameters struct { // The Access key for the storage account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` // The Name of the Storage Account. diff --git a/apis/web/v1beta2/zz_windowsfunctionappslot_terraformed.go b/apis/web/v1beta2/zz_windowsfunctionappslot_terraformed.go index 692a2f6a1..bfe9964f4 100755 --- a/apis/web/v1beta2/zz_windowsfunctionappslot_terraformed.go +++ b/apis/web/v1beta2/zz_windowsfunctionappslot_terraformed.go @@ -21,7 +21,7 @@ func (mg *WindowsFunctionAppSlot) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this WindowsFunctionAppSlot func (tr *WindowsFunctionAppSlot) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"auth_settings[*].active_directory[*].client_secret": "spec.forProvider.authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "spec.forProvider.authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "spec.forProvider.authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "spec.forProvider.authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "spec.forProvider.authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "spec.forProvider.authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "spec.forProvider.backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "spec.forProvider.connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "site_config[*].application_insights_connection_string": "spec.forProvider.siteConfig[*].applicationInsightsConnectionStringSecretRef", "site_config[*].application_insights_key": "spec.forProvider.siteConfig[*].applicationInsightsKeySecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "spec.forProvider.storageAccount[*].accessKeySecretRef", "storage_account_access_key": "spec.forProvider.storageAccountAccessKeySecretRef"} + return map[string]string{"auth_settings[*].active_directory[*].client_secret": "authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "site_config[*].application_insights_connection_string": "siteConfig[*].applicationInsightsConnectionStringSecretRef", "site_config[*].application_insights_key": "siteConfig[*].applicationInsightsKeySecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "storageAccount[*].accessKeySecretRef", "storage_account_access_key": "storageAccountAccessKeySecretRef"} } // GetObservation of this WindowsFunctionAppSlot diff --git a/apis/web/v1beta2/zz_windowsfunctionappslot_types.go b/apis/web/v1beta2/zz_windowsfunctionappslot_types.go index 7bb60c2f6..fc58ccaa0 100755 --- a/apis/web/v1beta2/zz_windowsfunctionappslot_types.go +++ b/apis/web/v1beta2/zz_windowsfunctionappslot_types.go @@ -23,6 +23,10 @@ type WindowsFunctionAppSlotAuthSettingsActiveDirectoryInitParameters struct { // The ID of the Client to use to authenticate with Azure Active Directory. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The App Setting name that contains the client secret of the Client. Cannot be used with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -72,6 +76,10 @@ type WindowsFunctionAppSlotAuthSettingsFacebookInitParameters struct { // The App ID of the Facebook app used for login. AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + // The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + AppSecretSecretRef *v1.SecretKeySelector `json:"appSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the app_secret value used for Facebook Login. // The app setting name that contains the `app_secret` value used for Facebook Login. Cannot be specified with `app_secret`. AppSecretSettingName *string `json:"appSecretSettingName,omitempty" tf:"app_secret_setting_name,omitempty"` @@ -125,6 +133,10 @@ type WindowsFunctionAppSlotAuthSettingsGithubInitParameters struct { // The ID of the GitHub app used for login. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for GitHub Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -178,6 +190,10 @@ type WindowsFunctionAppSlotAuthSettingsGoogleInitParameters struct { // The OpenID Connect Client ID for the Google web application. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for Google Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -289,6 +305,10 @@ type WindowsFunctionAppSlotAuthSettingsMicrosoftInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -473,6 +493,10 @@ type WindowsFunctionAppSlotAuthSettingsTwitterInitParameters struct { // The OAuth 1.0a consumer key of the Twitter application used for sign-in. ConsumerKey *string `json:"consumerKey,omitempty" tf:"consumer_key,omitempty"` + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + ConsumerSecretSecretRef *v1.SecretKeySelector `json:"consumerSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret`. ConsumerSecretSettingName *string `json:"consumerSecretSettingName,omitempty" tf:"consumer_secret_setting_name,omitempty"` @@ -1528,6 +1552,10 @@ type WindowsFunctionAppSlotBackupInitParameters struct { // a schedule block as detailed below. Schedule *WindowsFunctionAppSlotBackupScheduleInitParameters `json:"schedule,omitempty" tf:"schedule,omitempty"` + + // The SAS URL to the container. + // The SAS URL to the container. + StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } type WindowsFunctionAppSlotBackupObservation struct { @@ -1562,7 +1590,7 @@ type WindowsFunctionAppSlotBackupParameters struct { // The SAS URL to the container. // The SAS URL to the container. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } @@ -1653,6 +1681,10 @@ type WindowsFunctionAppSlotConnectionStringInitParameters struct { // Type of database. Possible values include: APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. // Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // The connection string value. + // The connection string value. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type WindowsFunctionAppSlotConnectionStringObservation struct { @@ -1680,7 +1712,7 @@ type WindowsFunctionAppSlotConnectionStringParameters struct { // The connection string value. // The connection string value. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } @@ -1799,6 +1831,10 @@ type WindowsFunctionAppSlotInitParameters struct { // One or more storage_account blocks as defined below. StorageAccount []WindowsFunctionAppSlotStorageAccountInitParameters `json:"storageAccount,omitempty" tf:"storage_account,omitempty"` + // The access key which will be used to access the storage account for the Function App Slot. + // The access key which will be used to access the storage account for the Function App Slot. + StorageAccountAccessKeySecretRef *v1.SecretKeySelector `json:"storageAccountAccessKeySecretRef,omitempty" tf:"-"` + // The backend storage account name which will be used by this Function App Slot. // The backend storage account name which will be used by this Function App Slot. // +crossplane:generate:reference:type=github.com/upbound/provider-azure/apis/storage/v1beta2.Account @@ -2505,6 +2541,14 @@ type WindowsFunctionAppSlotSiteConfigInitParameters struct { // an app_service_logs block as detailed below. AppServiceLogs *WindowsFunctionAppSlotSiteConfigAppServiceLogsInitParameters `json:"appServiceLogs,omitempty" tf:"app_service_logs,omitempty"` + // The Connection String for linking the Windows Function App to Application Insights. + // The Connection String for linking the Windows Function App to Application Insights. + ApplicationInsightsConnectionStringSecretRef *v1.SecretKeySelector `json:"applicationInsightsConnectionStringSecretRef,omitempty" tf:"-"` + + // The Instrumentation Key for connecting the Windows Function App to Application Insights. + // The Instrumentation Key for connecting the Windows Function App to Application Insights. + ApplicationInsightsKeySecretRef *v1.SecretKeySelector `json:"applicationInsightsKeySecretRef,omitempty" tf:"-"` + // an application_stack block as detailed below. ApplicationStack *WindowsFunctionAppSlotSiteConfigApplicationStackInitParameters `json:"applicationStack,omitempty" tf:"application_stack,omitempty"` @@ -3099,6 +3143,9 @@ type WindowsFunctionAppSlotSiteCredentialParameters struct { type WindowsFunctionAppSlotStorageAccountInitParameters struct { + // The Access key for the storage account. + AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` + // The Name of the Storage Account. AccountName *string `json:"accountName,omitempty" tf:"account_name,omitempty"` @@ -3136,7 +3183,7 @@ type WindowsFunctionAppSlotStorageAccountObservation struct { type WindowsFunctionAppSlotStorageAccountParameters struct { // The Access key for the storage account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` // The Name of the Storage Account. diff --git a/apis/web/v1beta2/zz_windowswebapp_terraformed.go b/apis/web/v1beta2/zz_windowswebapp_terraformed.go index 7ed52e6f0..4bc9786c7 100755 --- a/apis/web/v1beta2/zz_windowswebapp_terraformed.go +++ b/apis/web/v1beta2/zz_windowswebapp_terraformed.go @@ -21,7 +21,7 @@ func (mg *WindowsWebApp) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this WindowsWebApp func (tr *WindowsWebApp) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"auth_settings[*].active_directory[*].client_secret": "spec.forProvider.authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "spec.forProvider.authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "spec.forProvider.authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "spec.forProvider.authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "spec.forProvider.authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "spec.forProvider.authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "spec.forProvider.backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "spec.forProvider.connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "logs[*].http_logs[*].azure_blob_storage[*].sas_url": "spec.forProvider.logs[*].httpLogs[*].azureBlobStorage[*].sasUrlSecretRef", "site_config[*].application_stack[*].docker_registry_password": "spec.forProvider.siteConfig[*].applicationStack[*].dockerRegistryPasswordSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "spec.forProvider.storageAccount[*].accessKeySecretRef"} + return map[string]string{"auth_settings[*].active_directory[*].client_secret": "authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "logs[*].http_logs[*].azure_blob_storage[*].sas_url": "logs[*].httpLogs[*].azureBlobStorage[*].sasUrlSecretRef", "site_config[*].application_stack[*].docker_registry_password": "siteConfig[*].applicationStack[*].dockerRegistryPasswordSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "storageAccount[*].accessKeySecretRef"} } // GetObservation of this WindowsWebApp diff --git a/apis/web/v1beta2/zz_windowswebapp_types.go b/apis/web/v1beta2/zz_windowswebapp_types.go index 6087968eb..9023b13de 100755 --- a/apis/web/v1beta2/zz_windowswebapp_types.go +++ b/apis/web/v1beta2/zz_windowswebapp_types.go @@ -433,6 +433,10 @@ type WindowsWebAppAuthSettingsActiveDirectoryInitParameters struct { // The ID of the Client to use to authenticate with Azure Active Directory. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The App Setting name that contains the client secret of the Client. Cannot be used with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -482,6 +486,10 @@ type WindowsWebAppAuthSettingsFacebookInitParameters struct { // The App ID of the Facebook app used for login. AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + // The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + AppSecretSecretRef *v1.SecretKeySelector `json:"appSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the app_secret value used for Facebook Login. // The app setting name that contains the `app_secret` value used for Facebook Login. Cannot be specified with `app_secret`. AppSecretSettingName *string `json:"appSecretSettingName,omitempty" tf:"app_secret_setting_name,omitempty"` @@ -535,6 +543,10 @@ type WindowsWebAppAuthSettingsGithubInitParameters struct { // The ID of the GitHub app used for login. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for GitHub Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -588,6 +600,10 @@ type WindowsWebAppAuthSettingsGoogleInitParameters struct { // The OpenID Connect Client ID for the Google web application. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for Google Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -699,6 +715,10 @@ type WindowsWebAppAuthSettingsMicrosoftInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -883,6 +903,10 @@ type WindowsWebAppAuthSettingsTwitterInitParameters struct { // The OAuth 1.0a consumer key of the Twitter application used for sign-in. ConsumerKey *string `json:"consumerKey,omitempty" tf:"consumer_key,omitempty"` + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + ConsumerSecretSecretRef *v1.SecretKeySelector `json:"consumerSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret`. ConsumerSecretSettingName *string `json:"consumerSecretSettingName,omitempty" tf:"consumer_secret_setting_name,omitempty"` @@ -1938,6 +1962,10 @@ type WindowsWebAppBackupInitParameters struct { // A schedule block as defined below. Schedule *WindowsWebAppBackupScheduleInitParameters `json:"schedule,omitempty" tf:"schedule,omitempty"` + + // The SAS URL to the container. + // The SAS URL to the container. + StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } type WindowsWebAppBackupObservation struct { @@ -1972,7 +2000,7 @@ type WindowsWebAppBackupParameters struct { // The SAS URL to the container. // The SAS URL to the container. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } @@ -2062,6 +2090,10 @@ type WindowsWebAppConnectionStringInitParameters struct { // Type of database. Possible values include: APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. // Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // The connection string value. + // The connection string value. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type WindowsWebAppConnectionStringObservation struct { @@ -2089,7 +2121,7 @@ type WindowsWebAppConnectionStringParameters struct { // The connection string value. // The connection string value. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } @@ -2266,6 +2298,9 @@ type WindowsWebAppLogsHTTPLogsAzureBlobStorageInitParameters struct { // The retention period in days. A values of 0 means no retention. RetentionInDays *float64 `json:"retentionInDays,omitempty" tf:"retention_in_days,omitempty"` + + // SAS url to an Azure blob container with read/write/list/delete permissions. + SASURLSecretRef v1.SecretKeySelector `json:"sasurlSecretRef" tf:"-"` } type WindowsWebAppLogsHTTPLogsAzureBlobStorageObservation struct { @@ -2281,7 +2316,7 @@ type WindowsWebAppLogsHTTPLogsAzureBlobStorageParameters struct { RetentionInDays *float64 `json:"retentionInDays,omitempty" tf:"retention_in_days,omitempty"` // SAS url to an Azure blob container with read/write/list/delete permissions. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional SASURLSecretRef v1.SecretKeySelector `json:"sasurlSecretRef" tf:"-"` } @@ -2628,6 +2663,9 @@ type WindowsWebAppSiteConfigApplicationStackInitParameters struct { // The docker image, including tag, to be used. e.g. azure-app-service/windows/parkingpage:latest. DockerImageName *string `json:"dockerImageName,omitempty" tf:"docker_image_name,omitempty"` + // The User Name to use for authentication against the registry to pull the image. + DockerRegistryPasswordSecretRef *v1.SecretKeySelector `json:"dockerRegistryPasswordSecretRef,omitempty" tf:"-"` + // The URL of the container registry where the docker_image_name is located. e.g. https://index.docker.io or https://mcr.microsoft.com. This value is required with docker_image_name. DockerRegistryURL *string `json:"dockerRegistryUrl,omitempty" tf:"docker_registry_url,omitempty"` @@ -3614,6 +3652,9 @@ type WindowsWebAppStickySettingsParameters struct { type WindowsWebAppStorageAccountInitParameters struct { + // The Access key for the storage account. + AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` + // The Name of the Storage Account. AccountName *string `json:"accountName,omitempty" tf:"account_name,omitempty"` @@ -3651,7 +3692,7 @@ type WindowsWebAppStorageAccountObservation struct { type WindowsWebAppStorageAccountParameters struct { // The Access key for the storage account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` // The Name of the Storage Account. diff --git a/apis/web/v1beta2/zz_windowswebappslot_terraformed.go b/apis/web/v1beta2/zz_windowswebappslot_terraformed.go index 538ea8ac9..3f5764c83 100755 --- a/apis/web/v1beta2/zz_windowswebappslot_terraformed.go +++ b/apis/web/v1beta2/zz_windowswebappslot_terraformed.go @@ -21,7 +21,7 @@ func (mg *WindowsWebAppSlot) GetTerraformResourceType() string { // GetConnectionDetailsMapping for this WindowsWebAppSlot func (tr *WindowsWebAppSlot) GetConnectionDetailsMapping() map[string]string { - return map[string]string{"auth_settings[*].active_directory[*].client_secret": "spec.forProvider.authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "spec.forProvider.authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "spec.forProvider.authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "spec.forProvider.authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "spec.forProvider.authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "spec.forProvider.authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "spec.forProvider.backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "spec.forProvider.connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "logs[*].http_logs[*].azure_blob_storage[*].sas_url": "spec.forProvider.logs[*].httpLogs[*].azureBlobStorage[*].sasUrlSecretRef", "site_config[*].application_stack[*].docker_registry_password": "spec.forProvider.siteConfig[*].applicationStack[*].dockerRegistryPasswordSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "spec.forProvider.storageAccount[*].accessKeySecretRef"} + return map[string]string{"auth_settings[*].active_directory[*].client_secret": "authSettings[*].activeDirectory[*].clientSecretSecretRef", "auth_settings[*].facebook[*].app_secret": "authSettings[*].facebook[*].appSecretSecretRef", "auth_settings[*].github[*].client_secret": "authSettings[*].github[*].clientSecretSecretRef", "auth_settings[*].google[*].client_secret": "authSettings[*].google[*].clientSecretSecretRef", "auth_settings[*].microsoft[*].client_secret": "authSettings[*].microsoft[*].clientSecretSecretRef", "auth_settings[*].twitter[*].consumer_secret": "authSettings[*].twitter[*].consumerSecretSecretRef", "backup[*].storage_account_url": "backup[*].storageAccountUrlSecretRef", "connection_string[*].value": "connectionString[*].valueSecretRef", "custom_domain_verification_id": "status.atProvider.customDomainVerificationId", "logs[*].http_logs[*].azure_blob_storage[*].sas_url": "logs[*].httpLogs[*].azureBlobStorage[*].sasUrlSecretRef", "site_config[*].application_stack[*].docker_registry_password": "siteConfig[*].applicationStack[*].dockerRegistryPasswordSecretRef", "site_credential[*]": "status.atProvider.siteCredential[*]", "storage_account[*].access_key": "storageAccount[*].accessKeySecretRef"} } // GetObservation of this WindowsWebAppSlot diff --git a/apis/web/v1beta2/zz_windowswebappslot_types.go b/apis/web/v1beta2/zz_windowswebappslot_types.go index 00500eaf9..0041c4623 100755 --- a/apis/web/v1beta2/zz_windowswebappslot_types.go +++ b/apis/web/v1beta2/zz_windowswebappslot_types.go @@ -277,6 +277,10 @@ type WindowsWebAppSlotAuthSettingsActiveDirectoryInitParameters struct { // The ID of the Client to use to authenticate with Azure Active Directory. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The App Setting name that contains the client secret of the Client. Cannot be used with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -326,6 +330,10 @@ type WindowsWebAppSlotAuthSettingsFacebookInitParameters struct { // The App ID of the Facebook app used for login. AppID *string `json:"appId,omitempty" tf:"app_id,omitempty"` + // The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + // The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + AppSecretSecretRef *v1.SecretKeySelector `json:"appSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the app_secret value used for Facebook Login. // The app setting name that contains the `app_secret` value used for Facebook Login. Cannot be specified with `app_secret`. AppSecretSettingName *string `json:"appSecretSettingName,omitempty" tf:"app_secret_setting_name,omitempty"` @@ -379,6 +387,10 @@ type WindowsWebAppSlotAuthSettingsGithubInitParameters struct { // The ID of the GitHub app used for login. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for GitHub Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -432,6 +444,10 @@ type WindowsWebAppSlotAuthSettingsGoogleInitParameters struct { // The OpenID Connect Client ID for the Google web application. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name that contains the `client_secret` value used for Google Login. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -543,6 +559,10 @@ type WindowsWebAppSlotAuthSettingsMicrosoftInitParameters struct { // The OAuth 2.0 client ID that was created for the app used for authentication. ClientID *string `json:"clientId,omitempty" tf:"client_id,omitempty"` + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + // The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + ClientSecretSecretRef *v1.SecretKeySelector `json:"clientSecretSecretRef,omitempty" tf:"-"` + // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. // The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret`. ClientSecretSettingName *string `json:"clientSecretSettingName,omitempty" tf:"client_secret_setting_name,omitempty"` @@ -727,6 +747,10 @@ type WindowsWebAppSlotAuthSettingsTwitterInitParameters struct { // The OAuth 1.0a consumer key of the Twitter application used for sign-in. ConsumerKey *string `json:"consumerKey,omitempty" tf:"consumer_key,omitempty"` + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + // The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + ConsumerSecretSecretRef *v1.SecretKeySelector `json:"consumerSecretSecretRef,omitempty" tf:"-"` + // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. // The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret`. ConsumerSecretSettingName *string `json:"consumerSecretSettingName,omitempty" tf:"consumer_secret_setting_name,omitempty"` @@ -1782,6 +1806,10 @@ type WindowsWebAppSlotBackupInitParameters struct { // A schedule block as defined below. Schedule *WindowsWebAppSlotBackupScheduleInitParameters `json:"schedule,omitempty" tf:"schedule,omitempty"` + + // The SAS URL to the container. + // The SAS URL to the container. + StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } type WindowsWebAppSlotBackupObservation struct { @@ -1816,7 +1844,7 @@ type WindowsWebAppSlotBackupParameters struct { // The SAS URL to the container. // The SAS URL to the container. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional StorageAccountURLSecretRef v1.SecretKeySelector `json:"storageAccountUrlSecretRef" tf:"-"` } @@ -1906,6 +1934,10 @@ type WindowsWebAppSlotConnectionStringInitParameters struct { // Type of database. Possible values include: APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. // Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. Type *string `json:"type,omitempty" tf:"type,omitempty"` + + // The connection string value. + // The connection string value. + ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } type WindowsWebAppSlotConnectionStringObservation struct { @@ -1933,7 +1965,7 @@ type WindowsWebAppSlotConnectionStringParameters struct { // The connection string value. // The connection string value. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional ValueSecretRef v1.SecretKeySelector `json:"valueSecretRef" tf:"-"` } @@ -2133,6 +2165,9 @@ type WindowsWebAppSlotLogsHTTPLogsAzureBlobStorageInitParameters struct { // The retention period in days. A values of 0 means no retention. RetentionInDays *float64 `json:"retentionInDays,omitempty" tf:"retention_in_days,omitempty"` + + // SAS url to an Azure blob container with read/write/list/delete permissions. + SASURLSecretRef v1.SecretKeySelector `json:"sasurlSecretRef" tf:"-"` } type WindowsWebAppSlotLogsHTTPLogsAzureBlobStorageObservation struct { @@ -2148,7 +2183,7 @@ type WindowsWebAppSlotLogsHTTPLogsAzureBlobStorageParameters struct { RetentionInDays *float64 `json:"retentionInDays,omitempty" tf:"retention_in_days,omitempty"` // SAS url to an Azure blob container with read/write/list/delete permissions. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional SASURLSecretRef v1.SecretKeySelector `json:"sasurlSecretRef" tf:"-"` } @@ -2501,6 +2536,9 @@ type WindowsWebAppSlotSiteConfigApplicationStackInitParameters struct { // The docker image, including tag, to be used. e.g. azure-app-service/windows/parkingpage:latest. DockerImageName *string `json:"dockerImageName,omitempty" tf:"docker_image_name,omitempty"` + // The User Name to use for authentication against the registry to pull the image. + DockerRegistryPasswordSecretRef *v1.SecretKeySelector `json:"dockerRegistryPasswordSecretRef,omitempty" tf:"-"` + // The URL of the container registry where the docker_image_name is located. e.g. https://index.docker.io or https://mcr.microsoft.com. This value is required with docker_image_name. DockerRegistryURL *string `json:"dockerRegistryUrl,omitempty" tf:"docker_registry_url,omitempty"` @@ -3554,6 +3592,9 @@ type WindowsWebAppSlotSiteCredentialParameters struct { type WindowsWebAppSlotStorageAccountInitParameters struct { + // The Access key for the storage account. + AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` + // The Name of the Storage Account. AccountName *string `json:"accountName,omitempty" tf:"account_name,omitempty"` @@ -3591,7 +3632,7 @@ type WindowsWebAppSlotStorageAccountObservation struct { type WindowsWebAppSlotStorageAccountParameters struct { // The Access key for the storage account. - // +kubebuilder:validation:Required + // +kubebuilder:validation:Optional AccessKeySecretRef v1.SecretKeySelector `json:"accessKeySecretRef" tf:"-"` // The Name of the Storage Account. diff --git a/cmd/provider/alertsmanagement/zz_main.go b/cmd/provider/alertsmanagement/zz_main.go index ac513d978..deccd94e1 100644 --- a/cmd/provider/alertsmanagement/zz_main.go +++ b/cmd/provider/alertsmanagement/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/analysisservices/zz_main.go b/cmd/provider/analysisservices/zz_main.go index 18e7d95e1..72ef5a602 100644 --- a/cmd/provider/analysisservices/zz_main.go +++ b/cmd/provider/analysisservices/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/apimanagement/zz_main.go b/cmd/provider/apimanagement/zz_main.go index 7601a25f5..261b2f272 100644 --- a/cmd/provider/apimanagement/zz_main.go +++ b/cmd/provider/apimanagement/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/appconfiguration/zz_main.go b/cmd/provider/appconfiguration/zz_main.go index 538106a0a..e026b04e1 100644 --- a/cmd/provider/appconfiguration/zz_main.go +++ b/cmd/provider/appconfiguration/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/appplatform/zz_main.go b/cmd/provider/appplatform/zz_main.go index 4273c62d9..3b933a78a 100644 --- a/cmd/provider/appplatform/zz_main.go +++ b/cmd/provider/appplatform/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/attestation/zz_main.go b/cmd/provider/attestation/zz_main.go index 430944721..aacbff2db 100644 --- a/cmd/provider/attestation/zz_main.go +++ b/cmd/provider/attestation/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/authorization/zz_main.go b/cmd/provider/authorization/zz_main.go index ba35133cb..bf6959126 100644 --- a/cmd/provider/authorization/zz_main.go +++ b/cmd/provider/authorization/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/automation/zz_main.go b/cmd/provider/automation/zz_main.go index 0dc1b2c99..6b126f883 100644 --- a/cmd/provider/automation/zz_main.go +++ b/cmd/provider/automation/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/azure/zz_main.go b/cmd/provider/azure/zz_main.go index f0134a90c..e1804cd67 100644 --- a/cmd/provider/azure/zz_main.go +++ b/cmd/provider/azure/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/azurestackhci/zz_main.go b/cmd/provider/azurestackhci/zz_main.go index f949d6d80..a1349913c 100644 --- a/cmd/provider/azurestackhci/zz_main.go +++ b/cmd/provider/azurestackhci/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/botservice/zz_main.go b/cmd/provider/botservice/zz_main.go index 2156c356e..3e750e166 100644 --- a/cmd/provider/botservice/zz_main.go +++ b/cmd/provider/botservice/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cache/zz_main.go b/cmd/provider/cache/zz_main.go index b12148a2b..63cb4da3a 100644 --- a/cmd/provider/cache/zz_main.go +++ b/cmd/provider/cache/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cdn/zz_main.go b/cmd/provider/cdn/zz_main.go index 6a5cb964a..d3c56ec6e 100644 --- a/cmd/provider/cdn/zz_main.go +++ b/cmd/provider/cdn/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/certificateregistration/zz_main.go b/cmd/provider/certificateregistration/zz_main.go index 46ce17e9c..befde1e75 100644 --- a/cmd/provider/certificateregistration/zz_main.go +++ b/cmd/provider/certificateregistration/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cognitiveservices/zz_main.go b/cmd/provider/cognitiveservices/zz_main.go index abfe4e3d5..fb27bc934 100644 --- a/cmd/provider/cognitiveservices/zz_main.go +++ b/cmd/provider/cognitiveservices/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/communication/zz_main.go b/cmd/provider/communication/zz_main.go index 9c33139fd..2bf1c80f0 100644 --- a/cmd/provider/communication/zz_main.go +++ b/cmd/provider/communication/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/compute/zz_main.go b/cmd/provider/compute/zz_main.go index f28f910af..d50faf326 100644 --- a/cmd/provider/compute/zz_main.go +++ b/cmd/provider/compute/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/confidentialledger/zz_main.go b/cmd/provider/confidentialledger/zz_main.go index 485a282a1..5e33ec715 100644 --- a/cmd/provider/confidentialledger/zz_main.go +++ b/cmd/provider/confidentialledger/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/config/zz_main.go b/cmd/provider/config/zz_main.go index 32e4e07b9..2ee05aaa8 100644 --- a/cmd/provider/config/zz_main.go +++ b/cmd/provider/config/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/consumption/zz_main.go b/cmd/provider/consumption/zz_main.go index b9bb2ac7d..5a724a50a 100644 --- a/cmd/provider/consumption/zz_main.go +++ b/cmd/provider/consumption/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/containerapp/zz_main.go b/cmd/provider/containerapp/zz_main.go index c2bfe899d..5d822826c 100644 --- a/cmd/provider/containerapp/zz_main.go +++ b/cmd/provider/containerapp/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/containerregistry/zz_main.go b/cmd/provider/containerregistry/zz_main.go index 11cf9f353..f84c8cc49 100644 --- a/cmd/provider/containerregistry/zz_main.go +++ b/cmd/provider/containerregistry/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/containerservice/zz_main.go b/cmd/provider/containerservice/zz_main.go index ba85ad517..e301074e3 100644 --- a/cmd/provider/containerservice/zz_main.go +++ b/cmd/provider/containerservice/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cosmosdb/zz_main.go b/cmd/provider/cosmosdb/zz_main.go index e1448e7c2..ae4c5653d 100644 --- a/cmd/provider/cosmosdb/zz_main.go +++ b/cmd/provider/cosmosdb/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/costmanagement/zz_main.go b/cmd/provider/costmanagement/zz_main.go index 9d398bd74..2e158817d 100644 --- a/cmd/provider/costmanagement/zz_main.go +++ b/cmd/provider/costmanagement/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/customproviders/zz_main.go b/cmd/provider/customproviders/zz_main.go index 56e366872..87bc66658 100644 --- a/cmd/provider/customproviders/zz_main.go +++ b/cmd/provider/customproviders/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/databoxedge/zz_main.go b/cmd/provider/databoxedge/zz_main.go index 6f85633f9..396ca48c5 100644 --- a/cmd/provider/databoxedge/zz_main.go +++ b/cmd/provider/databoxedge/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/databricks/zz_main.go b/cmd/provider/databricks/zz_main.go index 53b0dea6d..a8662715c 100644 --- a/cmd/provider/databricks/zz_main.go +++ b/cmd/provider/databricks/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/datafactory/zz_main.go b/cmd/provider/datafactory/zz_main.go index 32c6ae161..9e5f2004d 100644 --- a/cmd/provider/datafactory/zz_main.go +++ b/cmd/provider/datafactory/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/datamigration/zz_main.go b/cmd/provider/datamigration/zz_main.go index a1943d0ad..fc603aecc 100644 --- a/cmd/provider/datamigration/zz_main.go +++ b/cmd/provider/datamigration/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dataprotection/zz_main.go b/cmd/provider/dataprotection/zz_main.go index 0a6af2cee..6537acd3a 100644 --- a/cmd/provider/dataprotection/zz_main.go +++ b/cmd/provider/dataprotection/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/datashare/zz_main.go b/cmd/provider/datashare/zz_main.go index de1b1eaf8..2e72ef6f4 100644 --- a/cmd/provider/datashare/zz_main.go +++ b/cmd/provider/datashare/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dbformariadb/zz_main.go b/cmd/provider/dbformariadb/zz_main.go index 86725a8ae..3577d1345 100644 --- a/cmd/provider/dbformariadb/zz_main.go +++ b/cmd/provider/dbformariadb/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dbformysql/zz_main.go b/cmd/provider/dbformysql/zz_main.go index d9668f1d9..743447797 100644 --- a/cmd/provider/dbformysql/zz_main.go +++ b/cmd/provider/dbformysql/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dbforpostgresql/zz_main.go b/cmd/provider/dbforpostgresql/zz_main.go index e788b11e2..1bab222af 100644 --- a/cmd/provider/dbforpostgresql/zz_main.go +++ b/cmd/provider/dbforpostgresql/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/devices/zz_main.go b/cmd/provider/devices/zz_main.go index d1e5edd78..cbb2ea164 100644 --- a/cmd/provider/devices/zz_main.go +++ b/cmd/provider/devices/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/deviceupdate/zz_main.go b/cmd/provider/deviceupdate/zz_main.go index dd8600023..fffd9c977 100644 --- a/cmd/provider/deviceupdate/zz_main.go +++ b/cmd/provider/deviceupdate/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/devtestlab/zz_main.go b/cmd/provider/devtestlab/zz_main.go index 21cb82757..5b5c94352 100644 --- a/cmd/provider/devtestlab/zz_main.go +++ b/cmd/provider/devtestlab/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/digitaltwins/zz_main.go b/cmd/provider/digitaltwins/zz_main.go index 601dd07d4..063b2645e 100644 --- a/cmd/provider/digitaltwins/zz_main.go +++ b/cmd/provider/digitaltwins/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/elastic/zz_main.go b/cmd/provider/elastic/zz_main.go index 5e9fac609..54bebc8c0 100644 --- a/cmd/provider/elastic/zz_main.go +++ b/cmd/provider/elastic/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/eventgrid/zz_main.go b/cmd/provider/eventgrid/zz_main.go index 6398f12e3..506d78de2 100644 --- a/cmd/provider/eventgrid/zz_main.go +++ b/cmd/provider/eventgrid/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/eventhub/zz_main.go b/cmd/provider/eventhub/zz_main.go index bef3eb4ee..c6c6202e3 100644 --- a/cmd/provider/eventhub/zz_main.go +++ b/cmd/provider/eventhub/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/fluidrelay/zz_main.go b/cmd/provider/fluidrelay/zz_main.go index 4c78ab9b1..96eebc4b3 100644 --- a/cmd/provider/fluidrelay/zz_main.go +++ b/cmd/provider/fluidrelay/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/guestconfiguration/zz_main.go b/cmd/provider/guestconfiguration/zz_main.go index 326748a40..70f86b2ba 100644 --- a/cmd/provider/guestconfiguration/zz_main.go +++ b/cmd/provider/guestconfiguration/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/hdinsight/zz_main.go b/cmd/provider/hdinsight/zz_main.go index ad717c82b..b8e89c298 100644 --- a/cmd/provider/hdinsight/zz_main.go +++ b/cmd/provider/hdinsight/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/healthbot/zz_main.go b/cmd/provider/healthbot/zz_main.go index b3a8fb9d1..54a82f377 100644 --- a/cmd/provider/healthbot/zz_main.go +++ b/cmd/provider/healthbot/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/healthcareapis/zz_main.go b/cmd/provider/healthcareapis/zz_main.go index 2b8cb555b..c9e564c85 100644 --- a/cmd/provider/healthcareapis/zz_main.go +++ b/cmd/provider/healthcareapis/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/insights/zz_main.go b/cmd/provider/insights/zz_main.go index 444259f4c..b2e195fb4 100644 --- a/cmd/provider/insights/zz_main.go +++ b/cmd/provider/insights/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/iotcentral/zz_main.go b/cmd/provider/iotcentral/zz_main.go index 194532a9f..59a0719d6 100644 --- a/cmd/provider/iotcentral/zz_main.go +++ b/cmd/provider/iotcentral/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/keyvault/zz_main.go b/cmd/provider/keyvault/zz_main.go index 6811bdade..8e73e9be5 100644 --- a/cmd/provider/keyvault/zz_main.go +++ b/cmd/provider/keyvault/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/kusto/zz_main.go b/cmd/provider/kusto/zz_main.go index d393e3be4..2a32c009a 100644 --- a/cmd/provider/kusto/zz_main.go +++ b/cmd/provider/kusto/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/labservices/zz_main.go b/cmd/provider/labservices/zz_main.go index bc38f253a..104c88524 100644 --- a/cmd/provider/labservices/zz_main.go +++ b/cmd/provider/labservices/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/loadtestservice/zz_main.go b/cmd/provider/loadtestservice/zz_main.go index 506d0db4b..6962efaf4 100644 --- a/cmd/provider/loadtestservice/zz_main.go +++ b/cmd/provider/loadtestservice/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/logic/zz_main.go b/cmd/provider/logic/zz_main.go index 9b706cf25..bcf09138b 100644 --- a/cmd/provider/logic/zz_main.go +++ b/cmd/provider/logic/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/logz/zz_main.go b/cmd/provider/logz/zz_main.go index 2fdadcf95..8eadb5b68 100644 --- a/cmd/provider/logz/zz_main.go +++ b/cmd/provider/logz/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/machinelearningservices/zz_main.go b/cmd/provider/machinelearningservices/zz_main.go index 7778952be..1ec7d12ca 100644 --- a/cmd/provider/machinelearningservices/zz_main.go +++ b/cmd/provider/machinelearningservices/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/maintenance/zz_main.go b/cmd/provider/maintenance/zz_main.go index 0ea16ed33..a8de54168 100644 --- a/cmd/provider/maintenance/zz_main.go +++ b/cmd/provider/maintenance/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/managedidentity/zz_main.go b/cmd/provider/managedidentity/zz_main.go index 12873182c..d454809f9 100644 --- a/cmd/provider/managedidentity/zz_main.go +++ b/cmd/provider/managedidentity/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/management/zz_main.go b/cmd/provider/management/zz_main.go index 19bc595de..e3bf10a3e 100644 --- a/cmd/provider/management/zz_main.go +++ b/cmd/provider/management/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/maps/zz_main.go b/cmd/provider/maps/zz_main.go index 23eed5b55..37171c20e 100644 --- a/cmd/provider/maps/zz_main.go +++ b/cmd/provider/maps/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/marketplaceordering/zz_main.go b/cmd/provider/marketplaceordering/zz_main.go index f416a34c1..87da3e3f5 100644 --- a/cmd/provider/marketplaceordering/zz_main.go +++ b/cmd/provider/marketplaceordering/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/media/zz_main.go b/cmd/provider/media/zz_main.go index 75ab23d95..351385635 100644 --- a/cmd/provider/media/zz_main.go +++ b/cmd/provider/media/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/mixedreality/zz_main.go b/cmd/provider/mixedreality/zz_main.go index 195311e68..d6f30a93a 100644 --- a/cmd/provider/mixedreality/zz_main.go +++ b/cmd/provider/mixedreality/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/monolith/zz_main.go b/cmd/provider/monolith/zz_main.go index a541ee6fe..71b0bb550 100644 --- a/cmd/provider/monolith/zz_main.go +++ b/cmd/provider/monolith/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/netapp/zz_main.go b/cmd/provider/netapp/zz_main.go index 8452aa07e..466f1079f 100644 --- a/cmd/provider/netapp/zz_main.go +++ b/cmd/provider/netapp/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/network/zz_main.go b/cmd/provider/network/zz_main.go index 467f5f78c..ed364e346 100644 --- a/cmd/provider/network/zz_main.go +++ b/cmd/provider/network/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/notificationhubs/zz_main.go b/cmd/provider/notificationhubs/zz_main.go index 451dcdd9e..324426149 100644 --- a/cmd/provider/notificationhubs/zz_main.go +++ b/cmd/provider/notificationhubs/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/operationalinsights/zz_main.go b/cmd/provider/operationalinsights/zz_main.go index dbc82b47b..d1db56b1d 100644 --- a/cmd/provider/operationalinsights/zz_main.go +++ b/cmd/provider/operationalinsights/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/operationsmanagement/zz_main.go b/cmd/provider/operationsmanagement/zz_main.go index 5ddbb85af..2346adb68 100644 --- a/cmd/provider/operationsmanagement/zz_main.go +++ b/cmd/provider/operationsmanagement/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/orbital/zz_main.go b/cmd/provider/orbital/zz_main.go index 322bb3e5b..29a1f4c7b 100644 --- a/cmd/provider/orbital/zz_main.go +++ b/cmd/provider/orbital/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/policyinsights/zz_main.go b/cmd/provider/policyinsights/zz_main.go index 835fcc3ac..6d6ba5952 100644 --- a/cmd/provider/policyinsights/zz_main.go +++ b/cmd/provider/policyinsights/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/portal/zz_main.go b/cmd/provider/portal/zz_main.go index fcf515435..e0dfeb005 100644 --- a/cmd/provider/portal/zz_main.go +++ b/cmd/provider/portal/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/powerbidedicated/zz_main.go b/cmd/provider/powerbidedicated/zz_main.go index 21822877e..c8b06f8b9 100644 --- a/cmd/provider/powerbidedicated/zz_main.go +++ b/cmd/provider/powerbidedicated/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/purview/zz_main.go b/cmd/provider/purview/zz_main.go index 58eabca91..79b2038df 100644 --- a/cmd/provider/purview/zz_main.go +++ b/cmd/provider/purview/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/recoveryservices/zz_main.go b/cmd/provider/recoveryservices/zz_main.go index 9b87d73ff..fe815a06a 100644 --- a/cmd/provider/recoveryservices/zz_main.go +++ b/cmd/provider/recoveryservices/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/relay/zz_main.go b/cmd/provider/relay/zz_main.go index 3cb19d3ff..4cbb3ddfe 100644 --- a/cmd/provider/relay/zz_main.go +++ b/cmd/provider/relay/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/resources/zz_main.go b/cmd/provider/resources/zz_main.go index 5a8b60135..ef95f77d7 100644 --- a/cmd/provider/resources/zz_main.go +++ b/cmd/provider/resources/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/search/zz_main.go b/cmd/provider/search/zz_main.go index 537a3a453..e416243b1 100644 --- a/cmd/provider/search/zz_main.go +++ b/cmd/provider/search/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/security/zz_main.go b/cmd/provider/security/zz_main.go index ef97613a1..5fbae46d9 100644 --- a/cmd/provider/security/zz_main.go +++ b/cmd/provider/security/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/securityinsights/zz_main.go b/cmd/provider/securityinsights/zz_main.go index 10310f07c..22baf25d7 100644 --- a/cmd/provider/securityinsights/zz_main.go +++ b/cmd/provider/securityinsights/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/servicebus/zz_main.go b/cmd/provider/servicebus/zz_main.go index 0393a7ed2..bf9d30576 100644 --- a/cmd/provider/servicebus/zz_main.go +++ b/cmd/provider/servicebus/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/servicefabric/zz_main.go b/cmd/provider/servicefabric/zz_main.go index 89693d67c..e395c63bd 100644 --- a/cmd/provider/servicefabric/zz_main.go +++ b/cmd/provider/servicefabric/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/servicelinker/zz_main.go b/cmd/provider/servicelinker/zz_main.go index cf1d30b25..5eef8744d 100644 --- a/cmd/provider/servicelinker/zz_main.go +++ b/cmd/provider/servicelinker/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/signalrservice/zz_main.go b/cmd/provider/signalrservice/zz_main.go index 0830d47df..463eced10 100644 --- a/cmd/provider/signalrservice/zz_main.go +++ b/cmd/provider/signalrservice/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/solutions/zz_main.go b/cmd/provider/solutions/zz_main.go index edec82f94..272d9e3a5 100644 --- a/cmd/provider/solutions/zz_main.go +++ b/cmd/provider/solutions/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/spring/zz_main.go b/cmd/provider/spring/zz_main.go index 7f8c8225b..05f6b6528 100644 --- a/cmd/provider/spring/zz_main.go +++ b/cmd/provider/spring/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/sql/zz_main.go b/cmd/provider/sql/zz_main.go index 5bbb32c59..bb9682b5b 100644 --- a/cmd/provider/sql/zz_main.go +++ b/cmd/provider/sql/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storage/zz_main.go b/cmd/provider/storage/zz_main.go index fb74d196e..124a891e2 100644 --- a/cmd/provider/storage/zz_main.go +++ b/cmd/provider/storage/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storagecache/zz_main.go b/cmd/provider/storagecache/zz_main.go index e01f7f9de..3e6a6b039 100644 --- a/cmd/provider/storagecache/zz_main.go +++ b/cmd/provider/storagecache/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storagepool/zz_main.go b/cmd/provider/storagepool/zz_main.go index 88805ce77..4f71eb52a 100644 --- a/cmd/provider/storagepool/zz_main.go +++ b/cmd/provider/storagepool/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storagesync/zz_main.go b/cmd/provider/storagesync/zz_main.go index bdfb66bf6..ac98c6a8a 100644 --- a/cmd/provider/storagesync/zz_main.go +++ b/cmd/provider/storagesync/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/streamanalytics/zz_main.go b/cmd/provider/streamanalytics/zz_main.go index 62faa5367..85d11a355 100644 --- a/cmd/provider/streamanalytics/zz_main.go +++ b/cmd/provider/streamanalytics/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/synapse/zz_main.go b/cmd/provider/synapse/zz_main.go index 3b5af9d0c..79ed3497d 100644 --- a/cmd/provider/synapse/zz_main.go +++ b/cmd/provider/synapse/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/timeseriesinsights/zz_main.go b/cmd/provider/timeseriesinsights/zz_main.go index 97c77e108..04bb3d9d0 100644 --- a/cmd/provider/timeseriesinsights/zz_main.go +++ b/cmd/provider/timeseriesinsights/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/web/zz_main.go b/cmd/provider/web/zz_main.go index 6ee8299d7..efb83ea14 100644 --- a/cmd/provider/web/zz_main.go +++ b/cmd/provider/web/zz_main.go @@ -13,7 +13,6 @@ import ( "path/filepath" "time" - "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -25,6 +24,7 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" + "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/package/crds/analysisservices.azure.upbound.io_servers.yaml b/package/crds/analysisservices.azure.upbound.io_servers.yaml index 628afa98b..af557f51c 100644 --- a/package/crds/analysisservices.azure.upbound.io_servers.yaml +++ b/package/crds/analysisservices.azure.upbound.io_servers.yaml @@ -242,6 +242,23 @@ spec: type: string type: array x-kubernetes-list-type: set + backupBlobContainerUriSecretRef: + description: URI and SAS token for a blob container to store backups. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object enablePowerBiService: description: Indicates if the Power BI service is allowed to access or not. diff --git a/package/crds/apimanagement.azure.upbound.io_authorizationservers.yaml b/package/crds/apimanagement.azure.upbound.io_authorizationservers.yaml index 0bf8e4db3..29b051eca 100644 --- a/package/crds/apimanagement.azure.upbound.io_authorizationservers.yaml +++ b/package/crds/apimanagement.azure.upbound.io_authorizationservers.yaml @@ -393,6 +393,24 @@ spec: description: The URI of page where Client/App Registration is performed for this Authorization Server. type: string + clientSecretSecretRef: + description: The Client/App Secret registered with this Authorization + Server. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object defaultScope: description: The Default Scope used when requesting an Access Token, specified as a string containing space-delimited values. @@ -412,6 +430,23 @@ spec: type: string type: array x-kubernetes-list-type: set + resourceOwnerPasswordSecretRef: + description: The password associated with the Resource Owner. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object resourceOwnerUsername: description: The username associated with the Resource Owner. type: string diff --git a/package/crds/apimanagement.azure.upbound.io_backends.yaml b/package/crds/apimanagement.azure.upbound.io_backends.yaml index c7c4f5fd2..e62509b88 100644 --- a/package/crds/apimanagement.azure.upbound.io_backends.yaml +++ b/package/crds/apimanagement.azure.upbound.io_backends.yaml @@ -1346,6 +1346,23 @@ spec: proxy: description: A proxy block as documented below. properties: + passwordSecretRef: + description: The password to connect to the proxy server. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object url: description: The URL of the proxy server. type: string diff --git a/package/crds/apimanagement.azure.upbound.io_certificates.yaml b/package/crds/apimanagement.azure.upbound.io_certificates.yaml index 57f58c301..833476297 100644 --- a/package/crds/apimanagement.azure.upbound.io_certificates.yaml +++ b/package/crds/apimanagement.azure.upbound.io_certificates.yaml @@ -367,6 +367,24 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + dataSecretRef: + description: The base-64 encoded certificate data, which must + be a PFX file. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object keyVaultIdentityClientId: description: The Client ID of the User Assigned Managed Identity to use for retrieving certificate. @@ -451,6 +469,23 @@ spec: type: string type: object type: object + passwordSecretRef: + description: The password used for this certificate. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object managementPolicies: default: diff --git a/package/crds/apimanagement.azure.upbound.io_customdomains.yaml b/package/crds/apimanagement.azure.upbound.io_customdomains.yaml index cfdca70fc..3994457e7 100644 --- a/package/crds/apimanagement.azure.upbound.io_customdomains.yaml +++ b/package/crds/apimanagement.azure.upbound.io_customdomains.yaml @@ -619,6 +619,42 @@ spec: description: One or more developer_portal blocks as defined below. items: properties: + certificatePasswordSecretRef: + description: The password associated with the certificate + provided above. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + certificateSecretRef: + description: The Base64 Encoded Certificate. (Mutually exclusive + with key_vault_id.) + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object hostName: description: The Hostname to use for the corresponding endpoint. type: string @@ -717,6 +753,42 @@ spec: description: One or more gateway blocks as defined below. items: properties: + certificatePasswordSecretRef: + description: The password associated with the certificate + provided above. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + certificateSecretRef: + description: The Base64 Encoded Certificate. (Mutually exclusive + with key_vault_id.) + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object defaultSslBinding: description: Is the certificate associated with this Hostname the Default SSL Certificate? This is used when an SNI @@ -820,6 +892,42 @@ spec: description: One or more management blocks as defined below. items: properties: + certificatePasswordSecretRef: + description: The password associated with the certificate + provided above. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + certificateSecretRef: + description: The Base64 Encoded Certificate. (Mutually exclusive + with key_vault_id.) + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object hostName: description: The Hostname to use for the API Proxy Endpoint. type: string @@ -842,6 +950,42 @@ spec: description: One or more portal blocks as defined below. items: properties: + certificatePasswordSecretRef: + description: The password associated with the certificate + provided above. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + certificateSecretRef: + description: The Base64 Encoded Certificate. (Mutually exclusive + with key_vault_id.) + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object hostName: description: The Hostname to use for the API Proxy Endpoint. type: string @@ -864,6 +1008,42 @@ spec: description: One or more scm blocks as defined below. items: properties: + certificatePasswordSecretRef: + description: The password associated with the certificate + provided above. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + certificateSecretRef: + description: The Base64 Encoded Certificate. (Mutually exclusive + with key_vault_id.) + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object hostName: description: The Hostname to use for the API Proxy Endpoint. type: string diff --git a/package/crds/apimanagement.azure.upbound.io_identityprovideraads.yaml b/package/crds/apimanagement.azure.upbound.io_identityprovideraads.yaml index 50f9263b4..fbb6ffd3d 100644 --- a/package/crds/apimanagement.azure.upbound.io_identityprovideraads.yaml +++ b/package/crds/apimanagement.azure.upbound.io_identityprovideraads.yaml @@ -288,10 +288,30 @@ spec: description: Client Id of the Application in the AAD Identity Provider. type: string + clientSecretSecretRef: + description: Client secret of the Application in the AAD Identity + Provider. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object signinTenant: description: The AAD Tenant to use instead of Common when logging into Active Directory type: string + required: + - clientSecretSecretRef type: object managementPolicies: default: diff --git a/package/crds/apimanagement.azure.upbound.io_identityproviderfacebooks.yaml b/package/crds/apimanagement.azure.upbound.io_identityproviderfacebooks.yaml index a1fc903c5..1ae425d29 100644 --- a/package/crds/apimanagement.azure.upbound.io_identityproviderfacebooks.yaml +++ b/package/crds/apimanagement.azure.upbound.io_identityproviderfacebooks.yaml @@ -353,6 +353,23 @@ spec: appId: description: App ID for Facebook. type: string + appSecretSecretRef: + description: App Secret for Facebook. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object resourceGroupName: description: The Name of the Resource Group where the API Management Service exists. Changing this forces a new resource to be created. @@ -433,6 +450,8 @@ spec: type: string type: object type: object + required: + - appSecretSecretRef type: object managementPolicies: default: diff --git a/package/crds/apimanagement.azure.upbound.io_identityprovidergoogles.yaml b/package/crds/apimanagement.azure.upbound.io_identityprovidergoogles.yaml index 2eeb8e5d6..f9a70628c 100644 --- a/package/crds/apimanagement.azure.upbound.io_identityprovidergoogles.yaml +++ b/package/crds/apimanagement.azure.upbound.io_identityprovidergoogles.yaml @@ -352,6 +352,23 @@ spec: clientId: description: Client Id for Google Sign-in. type: string + clientSecretSecretRef: + description: Client secret for Google Sign-in. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object resourceGroupName: description: The Name of the Resource Group where the API Management Service exists. Changing this forces a new resource to be created. @@ -432,6 +449,8 @@ spec: type: string type: object type: object + required: + - clientSecretSecretRef type: object managementPolicies: default: diff --git a/package/crds/apimanagement.azure.upbound.io_identityprovidermicrosofts.yaml b/package/crds/apimanagement.azure.upbound.io_identityprovidermicrosofts.yaml index dc6ecc449..5883c365f 100644 --- a/package/crds/apimanagement.azure.upbound.io_identityprovidermicrosofts.yaml +++ b/package/crds/apimanagement.azure.upbound.io_identityprovidermicrosofts.yaml @@ -353,6 +353,23 @@ spec: clientId: description: Client Id of the Azure AD Application. type: string + clientSecretSecretRef: + description: Client secret of the Azure AD Application. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object resourceGroupName: description: The Name of the Resource Group where the API Management Service exists. Changing this forces a new resource to be created. @@ -433,6 +450,8 @@ spec: type: string type: object type: object + required: + - clientSecretSecretRef type: object managementPolicies: default: diff --git a/package/crds/apimanagement.azure.upbound.io_identityprovidertwitters.yaml b/package/crds/apimanagement.azure.upbound.io_identityprovidertwitters.yaml index 0afc377ce..a894ddbe9 100644 --- a/package/crds/apimanagement.azure.upbound.io_identityprovidertwitters.yaml +++ b/package/crds/apimanagement.azure.upbound.io_identityprovidertwitters.yaml @@ -283,6 +283,23 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + apiKeySecretRef: + description: App Consumer API key for Twitter. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object apiManagementName: description: The Name of the API Management Service where this Twitter Identity Provider should be created. Changing this forces @@ -364,6 +381,23 @@ spec: type: string type: object type: object + apiSecretKeySecretRef: + description: App Consumer API secret key for Twitter. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object resourceGroupName: description: The Name of the Resource Group where the API Management Service exists. Changing this forces a new resource to be created. @@ -444,6 +478,9 @@ spec: type: string type: object type: object + required: + - apiKeySecretRef + - apiSecretKeySecretRef type: object managementPolicies: default: diff --git a/package/crds/apimanagement.azure.upbound.io_loggers.yaml b/package/crds/apimanagement.azure.upbound.io_loggers.yaml index 430914136..8094d1027 100644 --- a/package/crds/apimanagement.azure.upbound.io_loggers.yaml +++ b/package/crds/apimanagement.azure.upbound.io_loggers.yaml @@ -978,8 +978,6 @@ spec: - name - namespace type: object - required: - - instrumentationKeySecretRef type: object buffered: description: Specifies whether records should be buffered in the @@ -1201,6 +1199,27 @@ spec: applicationInsights: description: An application_insights block as documented below. Changing this forces a new resource to be created. + properties: + instrumentationKeySecretRef: + description: The instrumentation key used to push data to + Application Insights. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - instrumentationKeySecretRef type: object buffered: description: Specifies whether records should be buffered in the @@ -1213,6 +1232,23 @@ spec: description: An eventhub block as documented below. Changing this forces a new resource to be created. properties: + connectionStringSecretRef: + description: The connection string of an EventHub Namespace. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object endpointUri: description: The endpoint address of an EventHub Namespace. Required when client_id is set. @@ -1507,8 +1543,6 @@ spec: - name - namespace type: object - required: - - instrumentationKeySecretRef type: object buffered: description: Specifies whether records should be buffered in the diff --git a/package/crds/apimanagement.azure.upbound.io_managements.yaml b/package/crds/apimanagement.azure.upbound.io_managements.yaml index 534f12b63..9798e5ca5 100644 --- a/package/crds/apimanagement.azure.upbound.io_managements.yaml +++ b/package/crds/apimanagement.azure.upbound.io_managements.yaml @@ -2202,8 +2202,6 @@ spec: certificate should be stored. Possible values are CertificateAuthority and Root. type: string - required: - - encodedCertificateSecretRef type: object type: array clientCertificateEnabled: @@ -2745,11 +2743,48 @@ spec: below. items: properties: + certificatePasswordSecretRef: + description: The password for the certificate. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + encodedCertificateSecretRef: + description: The Base64 Encoded PFX or Base64 Encoded X.509 + Certificate. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storeName: description: The name of the Certificate Store where this certificate should be stored. Possible values are CertificateAuthority and Root. type: string + required: + - encodedCertificateSecretRef type: object type: array clientCertificateEnabled: @@ -2771,6 +2806,24 @@ spec: description: Should user registration requests be delegated to an external url? Defaults to false. type: boolean + validationKeySecretRef: + description: A base64-encoded validation key to validate, + that a request is coming from Azure API Management. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object gatewayDisabled: description: Disable the gateway in main region? This is only diff --git a/package/crds/apimanagement.azure.upbound.io_namedvalues.yaml b/package/crds/apimanagement.azure.upbound.io_namedvalues.yaml index 77efbcb0b..442f681ce 100644 --- a/package/crds/apimanagement.azure.upbound.io_namedvalues.yaml +++ b/package/crds/apimanagement.azure.upbound.io_namedvalues.yaml @@ -908,6 +908,23 @@ spec: description: The resource ID of the Key Vault Secret. type: string type: object + valueSecretRef: + description: The value of this API Management Named Value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object managementPolicies: default: diff --git a/package/crds/apimanagement.azure.upbound.io_openidconnectproviders.yaml b/package/crds/apimanagement.azure.upbound.io_openidconnectproviders.yaml index 5738cd3da..0c7105043 100644 --- a/package/crds/apimanagement.azure.upbound.io_openidconnectproviders.yaml +++ b/package/crds/apimanagement.azure.upbound.io_openidconnectproviders.yaml @@ -291,6 +291,40 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + clientIdSecretRef: + description: The Client ID used for the Client Application. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + clientSecretSecretRef: + description: The Client Secret used for the Client Application. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object description: description: A description of this OpenID Connect Provider. type: string @@ -300,6 +334,9 @@ spec: metadataEndpoint: description: The URI of the Metadata endpoint. type: string + required: + - clientIdSecretRef + - clientSecretSecretRef type: object managementPolicies: default: diff --git a/package/crds/apimanagement.azure.upbound.io_rediscaches.yaml b/package/crds/apimanagement.azure.upbound.io_rediscaches.yaml index cbc7973f2..250580048 100644 --- a/package/crds/apimanagement.azure.upbound.io_rediscaches.yaml +++ b/package/crds/apimanagement.azure.upbound.io_rediscaches.yaml @@ -273,6 +273,23 @@ spec: description: The location where to use cache from. Possible values are default and valid Azure regions. Defaults to default. type: string + connectionStringSecretRef: + description: The connection string to the Cache for Redis. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object description: description: The description of the API Management Redis Cache. type: string @@ -353,6 +370,8 @@ spec: type: string type: object type: object + required: + - connectionStringSecretRef type: object managementPolicies: default: diff --git a/package/crds/apimanagement.azure.upbound.io_subscriptions.yaml b/package/crds/apimanagement.azure.upbound.io_subscriptions.yaml index 7e89a10e6..3b1c5221f 100644 --- a/package/crds/apimanagement.azure.upbound.io_subscriptions.yaml +++ b/package/crds/apimanagement.azure.upbound.io_subscriptions.yaml @@ -469,6 +469,23 @@ spec: description: The ID of the API which should be assigned to this Subscription. Changing this forces a new resource to be created. type: string + primaryKeySecretRef: + description: The primary subscription key to use for the subscription. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object productId: description: The ID of the Product which should be assigned to this Subscription. Changing this forces a new resource to be @@ -550,6 +567,23 @@ spec: type: string type: object type: object + secondaryKeySecretRef: + description: The secondary subscription key to use for the subscription. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object state: description: The state of this Subscription. Possible values are active, cancelled, expired, rejected, submitted and suspended. diff --git a/package/crds/apimanagement.azure.upbound.io_users.yaml b/package/crds/apimanagement.azure.upbound.io_users.yaml index ee02efe6e..6199086a9 100644 --- a/package/crds/apimanagement.azure.upbound.io_users.yaml +++ b/package/crds/apimanagement.azure.upbound.io_users.yaml @@ -303,6 +303,23 @@ spec: note: description: A note about this user. type: string + passwordSecretRef: + description: The password associated with this user. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object state: description: The state of this user. Possible values are active, blocked and pending. diff --git a/package/crds/appplatform.azure.upbound.io_springcloudappmysqlassociations.yaml b/package/crds/appplatform.azure.upbound.io_springcloudappmysqlassociations.yaml index c4a1a3592..3ebfae6a5 100644 --- a/package/crds/appplatform.azure.upbound.io_springcloudappmysqlassociations.yaml +++ b/package/crds/appplatform.azure.upbound.io_springcloudappmysqlassociations.yaml @@ -581,6 +581,24 @@ spec: type: string type: object type: object + passwordSecretRef: + description: Specifies the password which should be used when + connecting to the MySQL Database from the Spring Cloud App. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: Specifies the username which should be used when connecting to the MySQL Database from the Spring Cloud App. @@ -659,6 +677,8 @@ spec: type: string type: object type: object + required: + - passwordSecretRef type: object managementPolicies: default: diff --git a/package/crds/appplatform.azure.upbound.io_springcloudconfigurationservices.yaml b/package/crds/appplatform.azure.upbound.io_springcloudconfigurationservices.yaml index c1308044e..a77a3a18b 100644 --- a/package/crds/appplatform.azure.upbound.io_springcloudconfigurationservices.yaml +++ b/package/crds/appplatform.azure.upbound.io_springcloudconfigurationservices.yaml @@ -287,6 +287,24 @@ spec: description: Specifies the name which should be used for this repository. type: string + passwordSecretRef: + description: Specifies the password of git repository basic + auth. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object patterns: description: Specifies the collection of patterns of the repository. @@ -294,6 +312,23 @@ spec: type: string type: array x-kubernetes-list-type: set + privateKeySecretRef: + description: Specifies the SSH private key of git repository. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object searchPaths: description: Specifies a list of searching path of the repository items: diff --git a/package/crds/appplatform.azure.upbound.io_springcloudcustomizedaccelerators.yaml b/package/crds/appplatform.azure.upbound.io_springcloudcustomizedaccelerators.yaml index 2b5570dd3..327d33457 100644 --- a/package/crds/appplatform.azure.upbound.io_springcloudcustomizedaccelerators.yaml +++ b/package/crds/appplatform.azure.upbound.io_springcloudcustomizedaccelerators.yaml @@ -814,8 +814,6 @@ spec: description: Specifies the username of git repository basic auth. type: string - required: - - passwordSecretRef type: object branch: description: Specifies the Git repository branch to be used. @@ -884,8 +882,6 @@ spec: - name - namespace type: object - required: - - privateKeySecretRef type: object url: description: Specifies Git repository URL for the accelerator. @@ -1016,10 +1012,30 @@ spec: with git_repository[0].ssh_auth. Changing this forces a new Spring Cloud Customized Accelerator to be created. properties: + passwordSecretRef: + description: Specifies the password of git repository + basic auth. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: Specifies the username of git repository basic auth. type: string + required: + - passwordSecretRef type: object branch: description: Specifies the Git repository branch to be used. @@ -1052,6 +1068,44 @@ spec: description: Specifies the SSH Key algorithm of git repository basic auth. type: string + hostKeySecretRef: + description: Specifies the Public SSH Key of git repository + basic auth. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + privateKeySecretRef: + description: Specifies the Private SSH Key of git repository + basic auth. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - privateKeySecretRef type: object url: description: Specifies Git repository URL for the accelerator. diff --git a/package/crds/appplatform.azure.upbound.io_springcloudgateways.yaml b/package/crds/appplatform.azure.upbound.io_springcloudgateways.yaml index 7758e0da4..456ed5e36 100644 --- a/package/crds/appplatform.azure.upbound.io_springcloudgateways.yaml +++ b/package/crds/appplatform.azure.upbound.io_springcloudgateways.yaml @@ -1540,6 +1540,10 @@ spec: 4Gi, 5Gi, 6Gi, 7Gi, and 8Gi. Defaults to 2Gi if not specified. type: string type: object + sensitiveEnvironmentVariablesSecretRef: + additionalProperties: + type: string + type: object sso: description: A sso block as defined below. properties: diff --git a/package/crds/appplatform.azure.upbound.io_springcloudservices.yaml b/package/crds/appplatform.azure.upbound.io_springcloudservices.yaml index 439a08d85..28d293c1b 100644 --- a/package/crds/appplatform.azure.upbound.io_springcloudservices.yaml +++ b/package/crds/appplatform.azure.upbound.io_springcloudservices.yaml @@ -1946,8 +1946,6 @@ spec: repository server, required when the Git repository server supports HTTP Basic Authentication. type: string - required: - - passwordSecretRef type: object label: description: The default label of the Git repository, should @@ -1984,8 +1982,6 @@ spec: the Git repository server, required when the Git repository server supports HTTP Basic Authentication. type: string - required: - - passwordSecretRef type: object label: description: The default label of the Git repository, @@ -2061,8 +2057,6 @@ spec: instance will fail to start if the host_key does not match. Defaults to true. type: boolean - required: - - privateKeySecretRef type: object uri: description: The URI of the Git repository that's used @@ -2127,8 +2121,6 @@ spec: will fail to start if the host_key does not match. Defaults to true. type: boolean - required: - - privateKeySecretRef type: object uri: description: The URI of the default Git repository used as @@ -2169,8 +2161,6 @@ spec: username: description: Specifies the username of the container registry. type: string - required: - - passwordSecretRef type: object type: array defaultBuildService: @@ -2630,11 +2620,32 @@ spec: httpBasicAuth: description: A http_basic_auth block as defined below. properties: + passwordSecretRef: + description: The password used to access the Git repository + server, required when the Git repository server supports + HTTP Basic Authentication. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username that's used to access the Git repository server, required when the Git repository server supports HTTP Basic Authentication. type: string + required: + - passwordSecretRef type: object label: description: The default label of the Git repository, should @@ -2647,11 +2658,32 @@ spec: httpBasicAuth: description: A http_basic_auth block as defined below. properties: + passwordSecretRef: + description: The password used to access the Git + repository server, required when the Git repository + server supports HTTP Basic Authentication. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username that's used to access the Git repository server, required when the Git repository server supports HTTP Basic Authentication. type: string + required: + - passwordSecretRef type: object label: description: The default label of the Git repository, @@ -2684,11 +2716,51 @@ spec: or ecdsa-sha2-nistp521. Required only if host-key exists. type: string + hostKeySecretRef: + description: The host key of the Git repository + server, should not include the algorithm prefix + as covered by host-key-algorithm. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + privateKeySecretRef: + description: The SSH private key to access the Git + repository, required when the URI starts with + git@ or ssh://. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object strictHostKeyCheckingEnabled: description: Indicates whether the Config Server instance will fail to start if the host_key does not match. Defaults to true. type: boolean + required: + - privateKeySecretRef type: object uri: description: The URI of the Git repository that's used @@ -2711,11 +2783,50 @@ spec: ssh-rsa, ecdsa-sha2-nistp256, ecdsa-sha2-nistp384, or ecdsa-sha2-nistp521. Required only if host-key exists. type: string + hostKeySecretRef: + description: The host key of the Git repository server, + should not include the algorithm prefix as covered by + host-key-algorithm. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + privateKeySecretRef: + description: The SSH private key to access the Git repository, + required when the URI starts with git@ or ssh://. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object strictHostKeyCheckingEnabled: description: Indicates whether the Config Server instance will fail to start if the host_key does not match. Defaults to true. type: boolean + required: + - privateKeySecretRef type: object uri: description: The URI of the default Git repository used as @@ -2732,6 +2843,23 @@ spec: name: description: Specifies the name of the container registry. type: string + passwordSecretRef: + description: Specifies the password of the container registry. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: Specifies the login server of the container registry. @@ -2739,6 +2867,8 @@ spec: username: description: Specifies the username of the container registry. type: string + required: + - passwordSecretRef type: object type: array defaultBuildService: diff --git a/package/crds/automation.azure.upbound.io_credentials.yaml b/package/crds/automation.azure.upbound.io_credentials.yaml index 730c26ff5..eb22a7ef9 100644 --- a/package/crds/automation.azure.upbound.io_credentials.yaml +++ b/package/crds/automation.azure.upbound.io_credentials.yaml @@ -273,9 +273,28 @@ spec: description: description: The description associated with this Automation Credential. type: string + passwordSecretRef: + description: The password associated with this Automation Credential. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username associated with this Automation Credential. type: string + required: + - passwordSecretRef type: object managementPolicies: default: diff --git a/package/crds/automation.azure.upbound.io_webhooks.yaml b/package/crds/automation.azure.upbound.io_webhooks.yaml index a1b6479e7..09242370d 100644 --- a/package/crds/automation.azure.upbound.io_webhooks.yaml +++ b/package/crds/automation.azure.upbound.io_webhooks.yaml @@ -627,6 +627,26 @@ spec: type: string type: object type: object + uriSecretRef: + description: URI to initiate the webhook. Can be generated using + Generate URI API. By default, new URI is generated on each new + resource creation. Changing this forces a new resource to be + created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object managementPolicies: default: diff --git a/package/crds/botservice.azure.upbound.io_botchannellines.yaml b/package/crds/botservice.azure.upbound.io_botchannellines.yaml index 0275bd73f..7fddaee47 100644 --- a/package/crds/botservice.azure.upbound.io_botchannellines.yaml +++ b/package/crds/botservice.azure.upbound.io_botchannellines.yaml @@ -193,9 +193,6 @@ spec: - name - namespace type: object - required: - - accessTokenSecretRef - - secretSecretRef type: object type: array location: @@ -300,6 +297,46 @@ spec: lineChannel: description: One or more line_channel blocks as defined below. items: + properties: + accessTokenSecretRef: + description: The access token which is used to call the + Line Channel API. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + secretSecretRef: + description: The secret which is used to access the Line + Channel. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - accessTokenSecretRef + - secretSecretRef type: object type: array location: @@ -535,9 +572,6 @@ spec: - name - namespace type: object - required: - - accessTokenSecretRef - - secretSecretRef type: object type: array location: diff --git a/package/crds/botservice.azure.upbound.io_botchannelslacks.yaml b/package/crds/botservice.azure.upbound.io_botchannelslacks.yaml index d103592b1..abb1d3d4e 100644 --- a/package/crds/botservice.azure.upbound.io_botchannelslacks.yaml +++ b/package/crds/botservice.azure.upbound.io_botchannelslacks.yaml @@ -316,6 +316,24 @@ spec: description: The Client ID that will be used to authenticate with Slack. type: string + clientSecretSecretRef: + description: The Client Secret that will be used to authenticate + with Slack. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object landingPageUrl: description: The Slack Landing Page URL. type: string @@ -323,6 +341,45 @@ spec: description: The supported Azure location where the resource exists. Changing this forces a new resource to be created. type: string + signingSecretSecretRef: + description: The Signing Secret that will be used to sign the + requests. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + verificationTokenSecretRef: + description: The Verification Token that will be used to authenticate + with Slack. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - clientSecretSecretRef + - verificationTokenSecretRef type: object managementPolicies: default: diff --git a/package/crds/botservice.azure.upbound.io_botchannelsms.yaml b/package/crds/botservice.azure.upbound.io_botchannelsms.yaml index 1fffc0840..d66690275 100644 --- a/package/crds/botservice.azure.upbound.io_botchannelsms.yaml +++ b/package/crds/botservice.azure.upbound.io_botchannelsms.yaml @@ -287,6 +287,25 @@ spec: description: The account security identifier (SID) for the SMS Channel. type: string + smsChannelAuthTokenSecretRef: + description: The authorization token for the SMS Channel. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - smsChannelAuthTokenSecretRef type: object managementPolicies: default: diff --git a/package/crds/botservice.azure.upbound.io_botchannelsregistrations.yaml b/package/crds/botservice.azure.upbound.io_botchannelsregistrations.yaml index 1daaa606d..76942cab4 100644 --- a/package/crds/botservice.azure.upbound.io_botchannelsregistrations.yaml +++ b/package/crds/botservice.azure.upbound.io_botchannelsregistrations.yaml @@ -254,6 +254,24 @@ spec: description: description: The description of the Bot Channels Registration. type: string + developerAppInsightsApiKeySecretRef: + description: The Application Insights API Key to associate with + the Bot Channels Registration. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object developerAppInsightsApplicationId: description: The Application Insights Application ID to associate with the Bot Channels Registration. diff --git a/package/crds/botservice.azure.upbound.io_botconnections.yaml b/package/crds/botservice.azure.upbound.io_botconnections.yaml index 47e9e4225..a64be275c 100644 --- a/package/crds/botservice.azure.upbound.io_botconnections.yaml +++ b/package/crds/botservice.azure.upbound.io_botconnections.yaml @@ -299,6 +299,24 @@ spec: description: The Client ID that will be used to authenticate with the service provider. type: string + clientSecretSecretRef: + description: The Client Secret that will be used to authenticate + with the service provider. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object location: description: The supported Azure location where the resource exists. Changing this forces a new resource to be created. @@ -323,6 +341,8 @@ spec: description: A mapping of tags to assign to the resource. type: object x-kubernetes-map-type: granular + required: + - clientSecretSecretRef type: object managementPolicies: default: diff --git a/package/crds/botservice.azure.upbound.io_botwebapps.yaml b/package/crds/botservice.azure.upbound.io_botwebapps.yaml index df4c043ce..70b31b321 100644 --- a/package/crds/botservice.azure.upbound.io_botwebapps.yaml +++ b/package/crds/botservice.azure.upbound.io_botwebapps.yaml @@ -241,6 +241,24 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + developerAppInsightsApiKeySecretRef: + description: The Application Insights API Key to associate with + the Web App Bot. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object developerAppInsightsApplicationId: description: The Application Insights Application ID to associate with the Web App Bot. @@ -266,6 +284,23 @@ spec: items: type: string type: array + luisKeySecretRef: + description: The LUIS key to associate with the Web App Bot. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object microsoftAppId: description: The Microsoft Application ID for the Web App Bot. Changing this forces a new resource to be created. diff --git a/package/crds/cache.azure.upbound.io_rediscaches.yaml b/package/crds/cache.azure.upbound.io_rediscaches.yaml index 0ee1abd08..ddb9627e3 100644 --- a/package/crds/cache.azure.upbound.io_rediscaches.yaml +++ b/package/crds/cache.azure.upbound.io_rediscaches.yaml @@ -1722,6 +1722,42 @@ spec: description: Enable or disable AOF persistence for this Redis Cache. Defaults to false. type: boolean + aofStorageConnectionString0SecretRef: + description: First Storage Account connection string for AOF + persistence. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + aofStorageConnectionString1SecretRef: + description: Second Storage Account connection string for + AOF persistence. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object dataPersistenceAuthenticationMethod: description: Preferred auth method to communicate to storage account used for data persistence. Possible values are SAS @@ -1765,6 +1801,24 @@ spec: description: The maximum number of snapshots to create as a backup. Only supported for Premium SKUs. type: number + rdbStorageConnectionStringSecretRef: + description: 'The Connection String to the Storage Account. + Only supported for Premium SKUs. In the format: DefaultEndpointsProtocol=https;BlobEndpoint=${azurerm_storage_account.example.primary_blob_endpoint};AccountName=${azurerm_storage_account.example.name};AccountKey=${azurerm_storage_account.example.primary_access_key}.' + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountSubscriptionId: description: The ID of the Subscription containing the Storage Account. diff --git a/package/crds/cognitiveservices.azure.upbound.io_accounts.yaml b/package/crds/cognitiveservices.azure.upbound.io_accounts.yaml index 2883fd429..eb201e18c 100644 --- a/package/crds/cognitiveservices.azure.upbound.io_accounts.yaml +++ b/package/crds/cognitiveservices.azure.upbound.io_accounts.yaml @@ -1504,6 +1504,24 @@ spec: description: If kind is TextAnalytics this specifies the ID of the Search service. type: string + customQuestionAnsweringSearchServiceKeySecretRef: + description: If kind is TextAnalytics this specifies the key of + the Search service. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object customSubdomainName: description: The subdomain name used for token-based authentication. This property is required when network_acls is specified. Changing diff --git a/package/crds/compute.azure.upbound.io_linuxvirtualmachines.yaml b/package/crds/compute.azure.upbound.io_linuxvirtualmachines.yaml index f167282b6..5bdb10b1d 100644 --- a/package/crds/compute.azure.upbound.io_linuxvirtualmachines.yaml +++ b/package/crds/compute.azure.upbound.io_linuxvirtualmachines.yaml @@ -2616,6 +2616,25 @@ spec: Machine? Defaults to false. type: boolean type: object + adminPasswordSecretRef: + description: The Password which should be used for the local-administrator + on this Virtual Machine. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object adminSshKey: description: One or more admin_ssh_key blocks as defined below. Changing this forces a new resource to be created. @@ -2672,6 +2691,25 @@ spec: computer_name, then you must specify computer_name. Changing this forces a new resource to be created. type: string + customDataSecretRef: + description: The Base64-Encoded Custom Data which should be used + for this Virtual Machine. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object dedicatedHostGroupId: description: The ID of a Dedicated Host Group that this Linux Virtual Machine should be run within. Conflicts with dedicated_host_id. diff --git a/package/crds/compute.azure.upbound.io_linuxvirtualmachinescalesets.yaml b/package/crds/compute.azure.upbound.io_linuxvirtualmachinescalesets.yaml index ba5debfe0..9524ed7e1 100644 --- a/package/crds/compute.azure.upbound.io_linuxvirtualmachinescalesets.yaml +++ b/package/crds/compute.azure.upbound.io_linuxvirtualmachinescalesets.yaml @@ -4117,6 +4117,25 @@ spec: to false. Changing this forces a new resource to be created. type: boolean type: object + adminPasswordSecretRef: + description: The Password which should be used for the local-administrator + on this Virtual Machine. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object adminSshKey: description: One or more admin_ssh_key blocks as defined below. items: @@ -4188,6 +4207,24 @@ spec: is not a valid computer_name_prefix, then you must specify computer_name_prefix. Changing this forces a new resource to be created. type: string + customDataSecretRef: + description: The Base64-Encoded Custom Data which should be used + for this Virtual Machine Scale Set. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object dataDisk: description: One or more data_disk blocks as defined below. items: @@ -4299,6 +4336,24 @@ spec: description: The ID of the source Key Vault. type: string type: object + protectedSettingsSecretRef: + description: A JSON String which specifies Sensitive Settings + (such as Passwords) for the Extension. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object provisionAfterExtensions: description: An ordered list of Extension names which this should be provisioned after. diff --git a/package/crds/compute.azure.upbound.io_orchestratedvirtualmachinescalesets.yaml b/package/crds/compute.azure.upbound.io_orchestratedvirtualmachinescalesets.yaml index 0484a7df9..ab4e96035 100644 --- a/package/crds/compute.azure.upbound.io_orchestratedvirtualmachinescalesets.yaml +++ b/package/crds/compute.azure.upbound.io_orchestratedvirtualmachinescalesets.yaml @@ -3658,8 +3658,6 @@ spec: and FirstLogonCommands. Changing this forces a new resource to be created. type: string - required: - - contentSecretRef type: object type: array adminPasswordSecretRef: @@ -3771,8 +3769,6 @@ spec: type: string type: object type: array - required: - - adminPasswordSecretRef type: object type: object plan: @@ -4158,6 +4154,24 @@ spec: description: The ID of the source Key Vault. type: string type: object + protectedSettingsSecretRef: + description: A JSON String which specifies Sensitive Settings + (such as Passwords) for the Extension. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object publisher: description: Specifies the Publisher of the Extension. type: string @@ -4494,9 +4508,46 @@ spec: osProfile: description: An os_profile block as defined below. properties: + customDataSecretRef: + description: The Base64-Encoded Custom Data which should be + used for this Virtual Machine Scale Set. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object linuxConfiguration: description: A linux_configuration block as documented below. properties: + adminPasswordSecretRef: + description: The Password which should be used for the + local-administrator on this Virtual Machine. Changing + this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object adminSshKey: description: A admin_ssh_key block as documented below. items: @@ -4579,14 +4630,55 @@ spec: to be created. items: properties: + contentSecretRef: + description: The XML formatted content that is added + to the unattend.xml file for the specified path + and component. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object setting: description: The name of the setting to which the content applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. type: string + required: + - contentSecretRef type: object type: array + adminPasswordSecretRef: + description: The Password which should be used for the + local-administrator on this Virtual Machine. Changing + this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object adminUsername: description: The username of the local administrator on each Virtual Machine Scale Set instance. Changing this @@ -4677,6 +4769,8 @@ spec: type: string type: object type: array + required: + - adminPasswordSecretRef type: object type: object plan: @@ -4791,6 +4885,24 @@ spec: be specified in ISO 8601 format. Defaults to PT5M. type: string type: object + userDataBase64SecretRef: + description: The Base64-Encoded User Data which should be used + for this Virtual Machine Scale Set. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object zoneBalance: description: Should the Virtual Machines in this Scale Set be strictly evenly distributed across Availability Zones? Defaults diff --git a/package/crds/compute.azure.upbound.io_virtualmachineextensions.yaml b/package/crds/compute.azure.upbound.io_virtualmachineextensions.yaml index 13845e501..6172059ef 100644 --- a/package/crds/compute.azure.upbound.io_virtualmachineextensions.yaml +++ b/package/crds/compute.azure.upbound.io_virtualmachineextensions.yaml @@ -854,6 +854,24 @@ spec: description: The ID of the source Key Vault. type: string type: object + protectedSettingsSecretRef: + description: The protected_settings passed to the extension, like + settings, these are specified as a JSON object in a string. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object provisionAfterExtensions: description: Specifies the collection of extension names after which this extension needs to be provisioned. diff --git a/package/crds/compute.azure.upbound.io_virtualmachineruncommands.yaml b/package/crds/compute.azure.upbound.io_virtualmachineruncommands.yaml index 6c71431e8..2fbfe907d 100644 --- a/package/crds/compute.azure.upbound.io_virtualmachineruncommands.yaml +++ b/package/crds/compute.azure.upbound.io_virtualmachineruncommands.yaml @@ -1770,9 +1770,6 @@ spec: - name - namespace type: object - required: - - nameSecretRef - - valueSecretRef type: object type: array runAsPasswordSecretRef: @@ -2027,6 +2024,41 @@ spec: description: An error_blob_managed_identity block as defined below. User-assigned managed Identity that has access to errorBlobUri storage blob. + properties: + clientIdSecretRef: + description: The client ID of the managed identity. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + objectIdSecretRef: + description: The object ID of the managed identity. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object errorBlobUri: description: Specifies the Azure storage blob where script error @@ -2115,6 +2147,41 @@ spec: description: An output_blob_managed_identity block as defined below. User-assigned managed Identity that has access to outputBlobUri storage blob. + properties: + clientIdSecretRef: + description: The client ID of the managed identity. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + objectIdSecretRef: + description: The object ID of the managed identity. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object outputBlobUri: description: Specifies the Azure storage blob where script output @@ -2211,8 +2278,64 @@ spec: description: A list of protected_parameter blocks as defined below. The protected parameters used by the script. items: + properties: + nameSecretRef: + description: The run parameter name. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + valueSecretRef: + description: The run parameter value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - nameSecretRef + - valueSecretRef type: object type: array + runAsPasswordSecretRef: + description: Specifies the user account password on the VM when + executing the Virtual Machine Run Command. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object runAsUser: description: Specifies the user account on the VM when executing the Virtual Machine Run Command. @@ -2230,6 +2353,41 @@ spec: scriptUriManagedIdentity: description: A script_uri_managed_identity block as defined above. + properties: + clientIdSecretRef: + description: The client ID of the managed identity. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + objectIdSecretRef: + description: The object ID of the managed identity. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object scriptUriRef: description: Reference to a Blob in storage to populate scriptUri. @@ -2663,9 +2821,6 @@ spec: - name - namespace type: object - required: - - nameSecretRef - - valueSecretRef type: object type: array runAsUser: diff --git a/package/crds/compute.azure.upbound.io_windowsvirtualmachines.yaml b/package/crds/compute.azure.upbound.io_windowsvirtualmachines.yaml index 995d66146..fcdff0a47 100644 --- a/package/crds/compute.azure.upbound.io_windowsvirtualmachines.yaml +++ b/package/crds/compute.azure.upbound.io_windowsvirtualmachines.yaml @@ -2136,8 +2136,6 @@ spec: applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. type: string - required: - - contentSecretRef type: object type: array adminPasswordSecretRef: @@ -2779,13 +2777,53 @@ spec: defined below. Changing this forces a new resource to be created. items: properties: + contentSecretRef: + description: The XML formatted content that is added to + the unattend.xml file for the specified path and component. + Changing this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object setting: description: The name of the setting to which the content applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. type: string + required: + - contentSecretRef type: object type: array + adminPasswordSecretRef: + description: The Password which should be used for the local-administrator + on this Virtual Machine. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object adminUsername: description: The username of the local administrator used for the Virtual Machine. Changing this forces a new resource to @@ -2825,6 +2863,25 @@ spec: computer_name, then you must specify computer_name. Changing this forces a new resource to be created. type: string + customDataSecretRef: + description: The Base64-Encoded Custom Data which should be used + for this Virtual Machine. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object dedicatedHostGroupId: description: The ID of a Dedicated Host Group that this Windows Virtual Machine should be run within. Conflicts with dedicated_host_id. @@ -3278,6 +3335,8 @@ spec: this Windows Virtual Machine should be located. Changing this forces a new Windows Virtual Machine to be created.' type: string + required: + - adminPasswordSecretRef type: object managementPolicies: default: diff --git a/package/crds/compute.azure.upbound.io_windowsvirtualmachinescalesets.yaml b/package/crds/compute.azure.upbound.io_windowsvirtualmachinescalesets.yaml index 25f20afeb..5a386e7b0 100644 --- a/package/crds/compute.azure.upbound.io_windowsvirtualmachinescalesets.yaml +++ b/package/crds/compute.azure.upbound.io_windowsvirtualmachinescalesets.yaml @@ -3284,8 +3284,6 @@ spec: applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. type: string - required: - - contentSecretRef type: object type: array adminPasswordSecretRef: @@ -4306,13 +4304,53 @@ spec: defined below. Changing this forces a new resource to be created. items: properties: + contentSecretRef: + description: The XML formatted content that is added to + the unattend.xml file for the specified path and component. + Changing this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object setting: description: The name of the setting to which the content applies. Possible values are AutoLogon and FirstLogonCommands. Changing this forces a new resource to be created. type: string + required: + - contentSecretRef type: object type: array + adminPasswordSecretRef: + description: The Password which should be used for the local-administrator + on this Virtual Machine. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object adminUsername: description: The username of the local administrator on each Virtual Machine Scale Set instance. Changing this forces a new resource @@ -4370,6 +4408,24 @@ spec: is not a valid computer_name_prefix, then you must specify computer_name_prefix. Changing this forces a new resource to be created. type: string + customDataSecretRef: + description: The Base64-Encoded Custom Data which should be used + for this Virtual Machine Scale Set. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object dataDisk: description: One or more data_disk blocks as defined below. items: @@ -4481,6 +4537,24 @@ spec: description: The ID of the source Key Vault. type: string type: object + protectedSettingsSecretRef: + description: A JSON String which specifies Sensitive Settings + (such as Passwords) for the Extension. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object provisionAfterExtensions: description: An ordered list of Extension names which this should be provisioned after. @@ -5166,6 +5240,8 @@ spec: type: string type: array x-kubernetes-list-type: set + required: + - adminPasswordSecretRef type: object managementPolicies: default: diff --git a/package/crds/containerapp.azure.upbound.io_containerapps.yaml b/package/crds/containerapp.azure.upbound.io_containerapps.yaml index e1cd3ed68..2e22fa42f 100644 --- a/package/crds/containerapp.azure.upbound.io_containerapps.yaml +++ b/package/crds/containerapp.azure.upbound.io_containerapps.yaml @@ -3305,9 +3305,6 @@ spec: - name - namespace type: object - required: - - nameSecretRef - - valueSecretRef type: object type: array tags: @@ -4107,6 +4104,48 @@ spec: secret: description: One or more secret block as detailed below. items: + properties: + nameSecretRef: + description: |- + The Secret name. + The Secret name. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + valueSecretRef: + description: |- + The value for this secret. + The value for this secret. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - nameSecretRef + - valueSecretRef type: object type: array tags: @@ -5076,9 +5115,6 @@ spec: - name - namespace type: object - required: - - nameSecretRef - - valueSecretRef type: object type: array tags: diff --git a/package/crds/containerapp.azure.upbound.io_environments.yaml b/package/crds/containerapp.azure.upbound.io_environments.yaml index 4a865d07b..4fc5bee85 100644 --- a/package/crds/containerapp.azure.upbound.io_environments.yaml +++ b/package/crds/containerapp.azure.upbound.io_environments.yaml @@ -472,6 +472,25 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + daprApplicationInsightsConnectionStringSecretRef: + description: |- + Application Insights connection string used by Dapr to export Service to Service communication telemetry. Changing this forces a new resource to be created. + Application Insights connection string used by Dapr to export Service to Service communication telemetry. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object infrastructureResourceGroupName: description: |- Name of the platform-managed resource group created for the Managed Environment to host infrastructure resources. Changing this forces a new resource to be created. diff --git a/package/crds/containerservice.azure.upbound.io_kubernetesclusters.yaml b/package/crds/containerservice.azure.upbound.io_kubernetesclusters.yaml index 565ae63e0..b767e2891 100644 --- a/package/crds/containerservice.azure.upbound.io_kubernetesclusters.yaml +++ b/package/crds/containerservice.azure.upbound.io_kubernetesclusters.yaml @@ -7478,8 +7478,6 @@ spec: - name - namespace type: object - required: - - clientSecretSecretRef type: object skuTier: description: The SKU Tier that should be used for this Kubernetes @@ -7900,6 +7898,24 @@ spec: serverAppId: description: The Server ID of an Azure Active Directory Application. type: string + serverAppSecretSecretRef: + description: The Server Secret of an Azure Active Directory + Application. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object tenantId: description: The Tenant ID used for Azure Active Directory Application. If this isn't specified the Tenant ID of the @@ -8548,6 +8564,24 @@ spec: type: string type: array x-kubernetes-list-type: set + trustedCaSecretRef: + description: The base64 encoded alternative CA certificate + content in PEM format. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object identity: description: An identity block as defined below. One of either @@ -9243,6 +9277,25 @@ spec: clientId: description: The Client ID for the Service Principal. type: string + clientSecretSecretRef: + description: The Client Secret for the Service Principal. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - clientSecretSecretRef type: object skuTier: description: The SKU Tier that should be used for this Kubernetes @@ -9294,6 +9347,24 @@ spec: windowsProfile: description: A windows_profile block as defined below. properties: + adminPasswordSecretRef: + description: The Admin Password for Windows VMs. Length must + be between 14 and 123 characters. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object adminUsername: description: The Admin Username for Windows VMs. Changing this forces a new resource to be created. diff --git a/package/crds/cosmosdb.azure.upbound.io_cassandraclusters.yaml b/package/crds/cosmosdb.azure.upbound.io_cassandraclusters.yaml index 153a73c1f..cddf2782b 100644 --- a/package/crds/cosmosdb.azure.upbound.io_cassandraclusters.yaml +++ b/package/crds/cosmosdb.azure.upbound.io_cassandraclusters.yaml @@ -1095,6 +1095,24 @@ spec: items: type: string type: array + defaultAdminPasswordSecretRef: + description: The initial admin password for this Cassandra Cluster. + Changing this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object delegatedManagementSubnetId: description: The ID of the delegated management subnet for this Cassandra Cluster. Changing this forces a new Cassandra Cluster @@ -1219,6 +1237,8 @@ spec: to run. Possible values are 3.11 and 4.0. Defaults to 3.11. Changing this forces a new Cassandra Cluster to be created. type: string + required: + - defaultAdminPasswordSecretRef type: object managementPolicies: default: diff --git a/package/crds/datafactory.azure.upbound.io_integrationruntimeazuressis.yaml b/package/crds/datafactory.azure.upbound.io_integrationruntimeazuressis.yaml index e99b678da..63517c980 100644 --- a/package/crds/datafactory.azure.upbound.io_integrationruntimeazuressis.yaml +++ b/package/crds/datafactory.azure.upbound.io_integrationruntimeazuressis.yaml @@ -1823,8 +1823,6 @@ spec: - name - namespace type: object - required: - - sasTokenSecretRef type: object dataFactoryId: description: The Data Factory ID in which to associate the Linked @@ -2363,6 +2361,23 @@ spec: administratorLogin: description: Administrator login name for the SQL Server. type: string + administratorPasswordSecretRef: + description: Administrator login password for the SQL Server. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object dualStandbyPairName: description: The dual standby Azure-SSIS Integration Runtime pair with SSISDB failover. @@ -2407,6 +2422,27 @@ spec: startup. See https://docs.microsoft.com/azure/data-factory/how-to-configure-azure-ssis-ir-custom-setup for more information. type: string + sasTokenSecretRef: + description: A container SAS token that gives access to the + files. See https://docs.microsoft.com/azure/data-factory/how-to-configure-azure-ssis-ir-custom-setup + for more information. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - sasTokenSecretRef type: object description: description: Integration runtime description. @@ -2446,6 +2482,23 @@ spec: Key Vault. type: string type: object + passwordSecretRef: + description: The password for the target device. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object targetName: description: The target computer or domain name. type: string @@ -2482,6 +2535,23 @@ spec: Key Vault. type: string type: object + licenseSecretRef: + description: The license used for the Component. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object name: description: Name of the package store. type: string diff --git a/package/crds/datafactory.azure.upbound.io_integrationruntimemanageds.yaml b/package/crds/datafactory.azure.upbound.io_integrationruntimemanageds.yaml index 6fcbc7e3d..cd26f7af9 100644 --- a/package/crds/datafactory.azure.upbound.io_integrationruntimemanageds.yaml +++ b/package/crds/datafactory.azure.upbound.io_integrationruntimemanageds.yaml @@ -968,8 +968,6 @@ spec: - name - namespace type: object - required: - - sasTokenSecretRef type: object dataFactoryId: description: The Data Factory ID in which to associate the Linked @@ -1190,6 +1188,23 @@ spec: administratorLogin: description: Administrator login name for the SQL Server. type: string + administratorPasswordSecretRef: + description: Administrator login password for the SQL Server. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object pricingTier: description: 'Pricing tier for the database that will be created for the SSIS catalog. Valid values are: Basic, Standard, @@ -1213,6 +1228,27 @@ spec: startup. See https://docs.microsoft.com/azure/data-factory/how-to-configure-azure-ssis-ir-custom-setup for more information. type: string + sasTokenSecretRef: + description: A container SAS token that gives access to the + files. See https://docs.microsoft.com/azure/data-factory/how-to-configure-azure-ssis-ir-custom-setup + for more information. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - sasTokenSecretRef type: object description: description: Integration runtime description. diff --git a/package/crds/datafactory.azure.upbound.io_linkedserviceazureblobstorages.yaml b/package/crds/datafactory.azure.upbound.io_linkedserviceazureblobstorages.yaml index c1af830ce..ad7e39d14 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedserviceazureblobstorages.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedserviceazureblobstorages.yaml @@ -1484,6 +1484,24 @@ spec: description: The connection string sent insecurely. Conflicts with connection_string, sas_uri and service_endpoint. type: string + connectionStringSecretRef: + description: The connection string. Conflicts with connection_string_insecure, + sas_uri and service_endpoint. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object description: description: The description for the Data Factory Linked Service. type: string @@ -1589,6 +1607,42 @@ spec: Linked Service. type: object x-kubernetes-map-type: granular + sasuriSecretRef: + description: The SAS URI. Conflicts with connection_string_insecure, + connection_string and service_endpoint. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + serviceEndpointSecretRef: + description: The Service Endpoint. Conflicts with connection_string, + connection_string_insecure and sas_uri. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object servicePrincipalId: description: The service principal id in which to authenticate against the Azure Blob Storage account. diff --git a/package/crds/datafactory.azure.upbound.io_linkedserviceazuredatabricks.yaml b/package/crds/datafactory.azure.upbound.io_linkedserviceazuredatabricks.yaml index 798189803..fe4b4d76f 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedserviceazuredatabricks.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedserviceazuredatabricks.yaml @@ -1343,6 +1343,23 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + accessTokenSecretRef: + description: Authenticate to ADB via an access token. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object adbDomain: description: The domain URL of the databricks instance. type: string diff --git a/package/crds/datafactory.azure.upbound.io_linkedserviceazurefilestorages.yaml b/package/crds/datafactory.azure.upbound.io_linkedserviceazurefilestorages.yaml index bfbd60b5f..61542cbbe 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedserviceazurefilestorages.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedserviceazurefilestorages.yaml @@ -858,6 +858,23 @@ spec: items: type: string type: array + connectionStringSecretRef: + description: The connection string. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object description: description: The description for the Data Factory Linked Service. type: string @@ -893,9 +910,28 @@ spec: Linked Service. type: object x-kubernetes-map-type: granular + passwordSecretRef: + description: The password to log in the server. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object userId: description: The user ID to log in the server. type: string + required: + - connectionStringSecretRef type: object managementPolicies: default: diff --git a/package/crds/datafactory.azure.upbound.io_linkedserviceazurefunctions.yaml b/package/crds/datafactory.azure.upbound.io_linkedserviceazurefunctions.yaml index 1fa899c28..42f4d87e3 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedserviceazurefunctions.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedserviceazurefunctions.yaml @@ -814,6 +814,24 @@ spec: description: The integration runtime reference to associate with the Data Factory Linked Service. type: string + keySecretRef: + description: The system key of the Azure Function. Exactly one + of either key or key_vault_key is required + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object keyVaultKey: description: A key_vault_key block as defined below. Use this Argument to store the system key of the Azure Function in an diff --git a/package/crds/datafactory.azure.upbound.io_linkedserviceazuretablestorages.yaml b/package/crds/datafactory.azure.upbound.io_linkedserviceazuretablestorages.yaml index 6e67cc30c..3633a894e 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedserviceazuretablestorages.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedserviceazuretablestorages.yaml @@ -226,6 +226,23 @@ spec: items: type: string type: array + connectionStringSecretRef: + description: The connection string to an Azure Storage Account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object description: description: The description for the Data Factory Linked Service. type: string @@ -240,6 +257,8 @@ spec: Linked Service. type: object x-kubernetes-map-type: granular + required: + - connectionStringSecretRef type: object managementPolicies: default: diff --git a/package/crds/datafactory.azure.upbound.io_linkedservicecosmosdbmongoapis.yaml b/package/crds/datafactory.azure.upbound.io_linkedservicecosmosdbmongoapis.yaml index 0ac1cecec..c47df3b23 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedservicecosmosdbmongoapis.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedservicecosmosdbmongoapis.yaml @@ -233,6 +233,23 @@ spec: items: type: string type: array + connectionStringSecretRef: + description: The connection string. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object database: description: The name of the database. type: string diff --git a/package/crds/datafactory.azure.upbound.io_linkedservicecosmosdbs.yaml b/package/crds/datafactory.azure.upbound.io_linkedservicecosmosdbs.yaml index bb0503a2e..ccf4719bf 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedservicecosmosdbs.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedservicecosmosdbs.yaml @@ -243,6 +243,24 @@ spec: description: The endpoint of the Azure CosmosDB account. Required if connection_string is unspecified. type: string + accountKeySecretRef: + description: The account key of the Azure Cosmos DB account. Required + if connection_string is unspecified. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object additionalProperties: additionalProperties: type: string @@ -256,6 +274,24 @@ spec: items: type: string type: array + connectionStringSecretRef: + description: The connection string. Required if account_endpoint, + account_key, and database are unspecified. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object database: description: The name of the database. Required if connection_string is unspecified. diff --git a/package/crds/datafactory.azure.upbound.io_linkedservicekustoes.yaml b/package/crds/datafactory.azure.upbound.io_linkedservicekustoes.yaml index ffffc7532..12f2699f1 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedservicekustoes.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedservicekustoes.yaml @@ -564,6 +564,24 @@ spec: description: The service principal id in which to authenticate against the Kusto Database. type: string + servicePrincipalKeySecretRef: + description: The service principal key in which to authenticate + against the Kusto Database. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object tenant: description: The service principal tenant id or name in which to authenticate against the Kusto Database. diff --git a/package/crds/datafactory.azure.upbound.io_linkedserviceodata.yaml b/package/crds/datafactory.azure.upbound.io_linkedserviceodata.yaml index 6fcc9f3fc..608105e9f 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedserviceodata.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedserviceodata.yaml @@ -652,8 +652,6 @@ spec: description: The username which can be used to authenticate to the OData endpoint. type: string - required: - - passwordSecretRef type: object dataFactoryId: description: The Data Factory ID in which to associate the Linked @@ -783,10 +781,30 @@ spec: basicAuthentication: description: A basic_authentication block as defined below. properties: + passwordSecretRef: + description: The password associated with the username, which + can be used to authenticate to the OData endpoint. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username which can be used to authenticate to the OData endpoint. type: string + required: + - passwordSecretRef type: object description: description: The description for the Data Factory Linked Service diff --git a/package/crds/datafactory.azure.upbound.io_linkedserviceodbcs.yaml b/package/crds/datafactory.azure.upbound.io_linkedserviceodbcs.yaml index 021cc5404..6865836ab 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedserviceodbcs.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedserviceodbcs.yaml @@ -655,8 +655,6 @@ spec: description: The username which can be used to authenticate to the ODBC endpoint. type: string - required: - - passwordSecretRef type: object connectionString: description: The connection string in which to authenticate with @@ -787,10 +785,30 @@ spec: basicAuthentication: description: A basic_authentication block as defined below. properties: + passwordSecretRef: + description: The password associated with the username, which + can be used to authenticate to the ODBC endpoint. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username which can be used to authenticate to the ODBC endpoint. type: string + required: + - passwordSecretRef type: object connectionString: description: The connection string in which to authenticate with diff --git a/package/crds/datafactory.azure.upbound.io_linkedservicesftps.yaml b/package/crds/datafactory.azure.upbound.io_linkedservicesftps.yaml index 242e87657..6c8e219c1 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedservicesftps.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedservicesftps.yaml @@ -270,6 +270,23 @@ spec: Linked Service. type: object x-kubernetes-map-type: granular + passwordSecretRef: + description: Password to logon to the SFTP Server for Basic Authentication. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object port: description: The TCP port number that the SFTP server uses to listen for client connection. Default value is 22. @@ -281,6 +298,8 @@ spec: username: description: The username used to log on to the SFTP server. type: string + required: + - passwordSecretRef type: object managementPolicies: default: diff --git a/package/crds/datafactory.azure.upbound.io_linkedservicewebs.yaml b/package/crds/datafactory.azure.upbound.io_linkedservicewebs.yaml index 85e7d157b..092b0c179 100644 --- a/package/crds/datafactory.azure.upbound.io_linkedservicewebs.yaml +++ b/package/crds/datafactory.azure.upbound.io_linkedservicewebs.yaml @@ -255,6 +255,24 @@ spec: Linked Service. type: object x-kubernetes-map-type: granular + passwordSecretRef: + description: The password for Basic authentication. Required if + authentication_type sets to Basic. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object url: description: The URL of the web service endpoint (e.g. https://www.microsoft.com). type: string diff --git a/package/crds/dbformariadb.azure.upbound.io_servers.yaml b/package/crds/dbformariadb.azure.upbound.io_servers.yaml index cd9c67172..a1320feee 100644 --- a/package/crds/dbformariadb.azure.upbound.io_servers.yaml +++ b/package/crds/dbformariadb.azure.upbound.io_servers.yaml @@ -348,6 +348,24 @@ spec: description: The Administrator login for the MariaDB Server. Changing this forces a new resource to be created. type: string + administratorLoginPasswordSecretRef: + description: The Password associated with the administrator_login + for the MariaDB Server. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object autoGrowEnabled: description: Enable/Disable auto-growing of the storage. Storage auto-grow prevents your server from running out of storage and diff --git a/package/crds/dbformysql.azure.upbound.io_flexibleservers.yaml b/package/crds/dbformysql.azure.upbound.io_flexibleservers.yaml index adbc52066..6cfc7105e 100644 --- a/package/crds/dbformysql.azure.upbound.io_flexibleservers.yaml +++ b/package/crds/dbformysql.azure.upbound.io_flexibleservers.yaml @@ -1728,6 +1728,25 @@ spec: Required when create_mode is Default. Changing this forces a new MySQL Flexible Server to be created. type: string + administratorPasswordSecretRef: + description: The Password associated with the administrator_login + for the MySQL Flexible Server. Required when create_mode is + Default. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object backupRetentionDays: description: The backup retention days for the MySQL Flexible Server. Possible values are between 1 and 35 days. Defaults diff --git a/package/crds/dbformysql.azure.upbound.io_servers.yaml b/package/crds/dbformysql.azure.upbound.io_servers.yaml index e3db5d279..8470eefa7 100644 --- a/package/crds/dbformysql.azure.upbound.io_servers.yaml +++ b/package/crds/dbformysql.azure.upbound.io_servers.yaml @@ -1207,6 +1207,24 @@ spec: when create_mode is Default. Changing this forces a new resource to be created. type: string + administratorLoginPasswordSecretRef: + description: The Password associated with the administrator_login + for the MySQL Server. Required when create_mode is Default. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object autoGrowEnabled: description: Enable/Disable auto-growing of the storage. Storage auto-grow prevents your server from running out of storage and @@ -1325,6 +1343,24 @@ spec: description: Specifies the number of days to keep in the Threat Detection audit logs. type: number + storageAccountAccessKeySecretRef: + description: Specifies the identifier key of the Threat Detection + audit storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageEndpoint: description: Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. diff --git a/package/crds/dbforpostgresql.azure.upbound.io_flexibleservers.yaml b/package/crds/dbforpostgresql.azure.upbound.io_flexibleservers.yaml index 5c9158f9e..52a3bb8ce 100644 --- a/package/crds/dbforpostgresql.azure.upbound.io_flexibleservers.yaml +++ b/package/crds/dbforpostgresql.azure.upbound.io_flexibleservers.yaml @@ -1808,6 +1808,25 @@ spec: Server. Required when create_mode is Default and authentication.password_auth_enabled is true. type: string + administratorPasswordSecretRef: + description: |- + The Password associated with the administrator_login for the PostgreSQL Flexible Server. Required when create_mode is Default and authentication.password_auth_enabled is true. + Password for the master DB user. If you set autoGeneratePassword to true, the Secret referenced here will be created or updated with generated password if it does not already contain one. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object authentication: description: An authentication block as defined below. properties: diff --git a/package/crds/dbforpostgresql.azure.upbound.io_servers.yaml b/package/crds/dbforpostgresql.azure.upbound.io_servers.yaml index e180d8356..ec36c6453 100644 --- a/package/crds/dbforpostgresql.azure.upbound.io_servers.yaml +++ b/package/crds/dbforpostgresql.azure.upbound.io_servers.yaml @@ -1217,6 +1217,24 @@ spec: Required when create_mode is Default. Changing this forces a new resource to be created. type: string + administratorLoginPasswordSecretRef: + description: The Password associated with the administrator_login + for the PostgreSQL Server. Required when create_mode is Default. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object autoGrowEnabled: description: Enable/Disable auto-growing of the storage. Storage auto-grow prevents your server from running out of storage and @@ -1336,6 +1354,24 @@ spec: description: Specifies the number of days to keep in the Threat Detection audit logs. type: number + storageAccountAccessKeySecretRef: + description: Specifies the identifier key of the Threat Detection + audit storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageEndpoint: description: Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. diff --git a/package/crds/devices.azure.upbound.io_iothubcertificates.yaml b/package/crds/devices.azure.upbound.io_iothubcertificates.yaml index 614569ed6..6f0fe6358 100644 --- a/package/crds/devices.azure.upbound.io_iothubcertificates.yaml +++ b/package/crds/devices.azure.upbound.io_iothubcertificates.yaml @@ -267,9 +267,29 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + certificateContentSecretRef: + description: The Base-64 representation of the X509 leaf certificate + .cer file or just a .pem file content. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object isVerified: description: Is the certificate verified? Defaults to false. type: boolean + required: + - certificateContentSecretRef type: object managementPolicies: default: diff --git a/package/crds/devices.azure.upbound.io_iothubdps.yaml b/package/crds/devices.azure.upbound.io_iothubdps.yaml index ffe7f489e..2f7e10490 100644 --- a/package/crds/devices.azure.upbound.io_iothubdps.yaml +++ b/package/crds/devices.azure.upbound.io_iothubdps.yaml @@ -801,8 +801,6 @@ spec: location: description: The location of the IoT hub. type: string - required: - - connectionStringSecretRef type: object type: array location: @@ -969,9 +967,29 @@ spec: description: Determines whether to apply allocation policies to the IoT Hub. Defaults to true. type: boolean + connectionStringSecretRef: + description: The connection string to connect to the IoT + Hub. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object location: description: The location of the IoT hub. type: string + required: + - connectionStringSecretRef type: object type: array location: diff --git a/package/crds/devices.azure.upbound.io_iothubdpscertificates.yaml b/package/crds/devices.azure.upbound.io_iothubdpscertificates.yaml index a0f643248..82cd16fc3 100644 --- a/package/crds/devices.azure.upbound.io_iothubdpscertificates.yaml +++ b/package/crds/devices.azure.upbound.io_iothubdpscertificates.yaml @@ -270,6 +270,24 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + certificateContentSecretRef: + description: The Base-64 representation of the X509 leaf certificate + .cer file or just a .pem file content. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object iotDpsName: description: The name of the IoT Device Provisioning Service that this certificate will be attached to. Changing this forces a @@ -354,6 +372,8 @@ spec: state. Defaults to false. Changing this forces a new resource to be created. type: boolean + required: + - certificateContentSecretRef type: object managementPolicies: default: diff --git a/package/crds/devices.azure.upbound.io_iothubendpointeventhubs.yaml b/package/crds/devices.azure.upbound.io_iothubendpointeventhubs.yaml index 933751325..29cd89112 100644 --- a/package/crds/devices.azure.upbound.io_iothubendpointeventhubs.yaml +++ b/package/crds/devices.azure.upbound.io_iothubendpointeventhubs.yaml @@ -288,6 +288,25 @@ spec: Possible values are keyBased and identityBased. Defaults to keyBased. type: string + connectionStringSecretRef: + description: The connection string for the endpoint. This attribute + can only be specified and is mandatory when authentication_type + is keyBased. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object endpointUri: description: URI of the Event Hubs Namespace endpoint. This attribute can only be specified and is mandatory when authentication_type diff --git a/package/crds/devices.azure.upbound.io_iothubendpointservicebusqueues.yaml b/package/crds/devices.azure.upbound.io_iothubendpointservicebusqueues.yaml index 88a03979b..c6e706743 100644 --- a/package/crds/devices.azure.upbound.io_iothubendpointservicebusqueues.yaml +++ b/package/crds/devices.azure.upbound.io_iothubendpointservicebusqueues.yaml @@ -290,6 +290,25 @@ spec: Queue endpoint. Possible values are keyBased and identityBased. Defaults to keyBased. type: string + connectionStringSecretRef: + description: The connection string for the endpoint. This attribute + can only be specified and is mandatory when authentication_type + is keyBased. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object endpointUri: description: URI of the Service Bus endpoint. This attribute can only be specified and is mandatory when authentication_type diff --git a/package/crds/devices.azure.upbound.io_iothubendpointservicebustopics.yaml b/package/crds/devices.azure.upbound.io_iothubendpointservicebustopics.yaml index 9946d69b2..7018972e4 100644 --- a/package/crds/devices.azure.upbound.io_iothubendpointservicebustopics.yaml +++ b/package/crds/devices.azure.upbound.io_iothubendpointservicebustopics.yaml @@ -290,6 +290,25 @@ spec: Topic endpoint. Possible values are keyBased and identityBased. Defaults to keyBased. type: string + connectionStringSecretRef: + description: The connection string for the endpoint. This attribute + can only be specified and is mandatory when authentication_type + is keyBased. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object endpointUri: description: URI of the Service Bus endpoint. This attribute can only be specified and is mandatory when authentication_type diff --git a/package/crds/devices.azure.upbound.io_iothubendpointstoragecontainers.yaml b/package/crds/devices.azure.upbound.io_iothubendpointstoragecontainers.yaml index e21e166d8..9ee3dd57c 100644 --- a/package/crds/devices.azure.upbound.io_iothubendpointstoragecontainers.yaml +++ b/package/crds/devices.azure.upbound.io_iothubendpointstoragecontainers.yaml @@ -387,6 +387,25 @@ spec: Value should be between 60 and 720 seconds. Default value is 300 seconds. type: number + connectionStringSecretRef: + description: The connection string for the endpoint. This attribute + can only be specified and is mandatory when authentication_type + is keyBased. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object containerName: description: The name of storage container in the storage account. type: string diff --git a/package/crds/devices.azure.upbound.io_iothubs.yaml b/package/crds/devices.azure.upbound.io_iothubs.yaml index 08bd43a0f..ed8c0a403 100644 --- a/package/crds/devices.azure.upbound.io_iothubs.yaml +++ b/package/crds/devices.azure.upbound.io_iothubs.yaml @@ -1350,8 +1350,6 @@ spec: 8601 timespan duration. This value must be between 1 minute and 24 hours. Defaults to PT1H. type: string - required: - - connectionStringSecretRef type: object identity: description: An identity block as defined below. @@ -1587,6 +1585,24 @@ spec: account. Possible values are keyBased and identityBased. Defaults to keyBased. type: string + connectionStringSecretRef: + description: The connection string for the Azure Storage account + to which files are uploaded. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object containerName: description: The name of the root container where the files should be uploaded to. The container need not exist but @@ -1621,6 +1637,8 @@ spec: 8601 timespan duration. This value must be between 1 minute and 24 hours. Defaults to PT1H. type: string + required: + - connectionStringSecretRef type: object identity: description: An identity block as defined below. diff --git a/package/crds/deviceupdate.azure.upbound.io_iothubdeviceupdateinstances.yaml b/package/crds/deviceupdate.azure.upbound.io_iothubdeviceupdateinstances.yaml index 3c8f741f4..737be70d3 100644 --- a/package/crds/deviceupdate.azure.upbound.io_iothubdeviceupdateinstances.yaml +++ b/package/crds/deviceupdate.azure.upbound.io_iothubdeviceupdateinstances.yaml @@ -1048,8 +1048,6 @@ spec: type: string type: object type: object - required: - - connectionStringSecretRef type: object iothubId: description: Specifies the ID of the IoT Hub associated with the @@ -1158,6 +1156,23 @@ spec: diagnosticStorageAccount: description: A diagnostic_storage_account block as defined below. properties: + connectionStringSecretRef: + description: Connection String of the Diagnostic Storage Account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object id: description: Resource ID of the Diagnostic Storage Account. type: string @@ -1237,6 +1252,8 @@ spec: type: string type: object type: object + required: + - connectionStringSecretRef type: object iothubId: description: Specifies the ID of the IoT Hub associated with the diff --git a/package/crds/devtestlab.azure.upbound.io_linuxvirtualmachines.yaml b/package/crds/devtestlab.azure.upbound.io_linuxvirtualmachines.yaml index 716bf7e1c..a7374204e 100644 --- a/package/crds/devtestlab.azure.upbound.io_linuxvirtualmachines.yaml +++ b/package/crds/devtestlab.azure.upbound.io_linuxvirtualmachines.yaml @@ -2071,6 +2071,25 @@ spec: notes: description: Any notes about the Virtual Machine. type: string + passwordSecretRef: + description: The Password associated with the username used to + login to this Virtual Machine. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object resourceGroupName: description: The name of the resource group in which the Dev Test Lab resource exists. Changing this forces a new resource to diff --git a/package/crds/devtestlab.azure.upbound.io_windowsvirtualmachines.yaml b/package/crds/devtestlab.azure.upbound.io_windowsvirtualmachines.yaml index 0d1c28c12..419eaa479 100644 --- a/package/crds/devtestlab.azure.upbound.io_windowsvirtualmachines.yaml +++ b/package/crds/devtestlab.azure.upbound.io_windowsvirtualmachines.yaml @@ -2055,6 +2055,25 @@ spec: notes: description: Any notes about the Virtual Machine. type: string + passwordSecretRef: + description: The Password associated with the username used to + login to this Virtual Machine. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object resourceGroupName: description: The name of the resource group in which the Dev Test Lab resource exists. Changing this forces a new resource to @@ -2157,6 +2176,8 @@ spec: on this Virtual Machine. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object managementPolicies: default: diff --git a/package/crds/eventgrid.azure.upbound.io_eventsubscriptions.yaml b/package/crds/eventgrid.azure.upbound.io_eventsubscriptions.yaml index eb27071c7..d0c972185 100644 --- a/package/crds/eventgrid.azure.upbound.io_eventsubscriptions.yaml +++ b/package/crds/eventgrid.azure.upbound.io_eventsubscriptions.yaml @@ -3633,6 +3633,24 @@ spec: type: description: Either Static or Dynamic type: string + valueSecretRef: + description: If the type is Static, then provide the value + to use + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object type: array eventDeliverySchema: diff --git a/package/crds/hdinsight.azure.upbound.io_hadoopclusters.yaml b/package/crds/hdinsight.azure.upbound.io_hadoopclusters.yaml index 070b5e303..838f31c7e 100644 --- a/package/crds/hdinsight.azure.upbound.io_hadoopclusters.yaml +++ b/package/crds/hdinsight.azure.upbound.io_hadoopclusters.yaml @@ -3492,8 +3492,6 @@ spec: - name - namespace type: object - required: - - primaryKeySecretRef type: object gateway: description: A gateway block as defined below. @@ -3519,8 +3517,6 @@ spec: description: The username used for the Ambari Portal. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object location: description: Specifies the Azure Region which this HDInsight Hadoop @@ -3567,8 +3563,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object hive: description: A hive block as defined below. @@ -3607,8 +3601,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object oozie: description: An oozie block as defined below. @@ -3647,8 +3639,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object type: object monitor: @@ -3676,8 +3666,6 @@ spec: - name - namespace type: object - required: - - primaryKeySecretRef type: object network: description: A network block as defined below. @@ -4488,8 +4476,6 @@ spec: description: The User Assigned Identity for the HDInsight Cluster. Changing this forces a new resource to be created. type: string - required: - - domainUserPasswordSecretRef type: object storageAccount: description: One or more storage_account block as defined below. @@ -4603,8 +4589,6 @@ spec: description: The ID of the Storage Account. Changing this forces a new resource to be created. type: string - required: - - storageAccountKeySecretRef type: object type: array storageAccountGen2: @@ -4712,14 +4696,52 @@ spec: logAnalyticsWorkspaceId: description: The workspace ID of the log analytics extension. type: string + primaryKeySecretRef: + description: The workspace key of the log analytics extension. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - primaryKeySecretRef type: object gateway: description: A gateway block as defined below. properties: + passwordSecretRef: + description: The password used for the Ambari Portal. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username used for the Ambari Portal. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object location: description: Specifies the Azure Region which this HDInsight Hadoop @@ -4737,6 +4759,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4747,6 +4788,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object hive: description: A hive block as defined below. @@ -4756,6 +4799,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4766,6 +4828,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object oozie: description: An oozie block as defined below. @@ -4775,6 +4839,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4785,6 +4868,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object type: object monitor: @@ -4794,6 +4879,26 @@ spec: description: The Operations Management Suite (OMS) workspace ID. type: string + primaryKeySecretRef: + description: The Operations Management Suite (OMS) workspace + key. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - primaryKeySecretRef type: object network: description: A network block as defined below. @@ -4913,6 +5018,25 @@ spec: headNode: description: A head_node block as defined above. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -5110,6 +5234,25 @@ spec: type: string type: object type: object + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -5264,6 +5407,25 @@ spec: zookeeperNode: description: A zookeeper_node block as defined below. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -5432,6 +5594,24 @@ spec: description: The name of the Azure Active Directory Domain. Changing this forces a new resource to be created. type: string + domainUserPasswordSecretRef: + description: The user password of the Azure Active Directory + Domain. Changing this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object domainUsername: description: The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. @@ -5448,6 +5628,8 @@ spec: description: The User Assigned Identity for the HDInsight Cluster. Changing this forces a new resource to be created. type: string + required: + - domainUserPasswordSecretRef type: object storageAccount: description: One or more storage_account block as defined below. @@ -5458,6 +5640,25 @@ spec: HDInsight Hadoop Cluster? Changing this forces a new resource to be created. type: boolean + storageAccountKeySecretRef: + description: The Access Key which should be used to connect + to the Storage Account. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageContainerId: description: The ID of the Storage Container. Changing this forces a new resource to be created. @@ -5542,6 +5743,8 @@ spec: description: The ID of the Storage Account. Changing this forces a new resource to be created. type: string + required: + - storageAccountKeySecretRef type: object type: array storageAccountGen2: diff --git a/package/crds/hdinsight.azure.upbound.io_hbaseclusters.yaml b/package/crds/hdinsight.azure.upbound.io_hbaseclusters.yaml index 2b1c56233..45316f4a4 100644 --- a/package/crds/hdinsight.azure.upbound.io_hbaseclusters.yaml +++ b/package/crds/hdinsight.azure.upbound.io_hbaseclusters.yaml @@ -3090,8 +3090,6 @@ spec: - name - namespace type: object - required: - - primaryKeySecretRef type: object gateway: description: A gateway block as defined below. @@ -3117,8 +3115,6 @@ spec: description: The username used for the Ambari Portal. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object location: description: Specifies the Azure Region which this HDInsight HBase @@ -3165,8 +3161,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object hive: description: A hive block as defined below. @@ -3205,8 +3199,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object oozie: description: An oozie block as defined below. @@ -3245,8 +3237,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object type: object monitor: @@ -3274,8 +3264,6 @@ spec: - name - namespace type: object - required: - - primaryKeySecretRef type: object network: description: A network block as defined below. @@ -3973,8 +3961,6 @@ spec: description: The User Assigned Identity for the HDInsight Cluster. Changing this forces a new resource to be created. type: string - required: - - domainUserPasswordSecretRef type: object storageAccount: description: One or more storage_account block as defined below. @@ -4088,8 +4074,6 @@ spec: description: The ID of the Storage Account. Changing this forces a new resource to be created. type: string - required: - - storageAccountKeySecretRef type: object type: array storageAccountGen2: @@ -4197,14 +4181,52 @@ spec: logAnalyticsWorkspaceId: description: The workspace ID of the log analytics extension. type: string + primaryKeySecretRef: + description: The workspace key of the log analytics extension. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - primaryKeySecretRef type: object gateway: description: A gateway block as defined below. properties: + passwordSecretRef: + description: The password used for the Ambari Portal. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username used for the Ambari Portal. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object location: description: Specifies the Azure Region which this HDInsight HBase @@ -4222,6 +4244,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4232,6 +4273,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object hive: description: A hive block as defined below. @@ -4241,6 +4284,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4251,6 +4313,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object oozie: description: An oozie block as defined below. @@ -4260,6 +4324,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4270,6 +4353,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object type: object monitor: @@ -4279,6 +4364,26 @@ spec: description: The Operations Management Suite (OMS) workspace ID. type: string + primaryKeySecretRef: + description: The Operations Management Suite (OMS) workspace + key. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - primaryKeySecretRef type: object network: description: A network block as defined below. @@ -4300,6 +4405,25 @@ spec: headNode: description: A head_node block as defined above. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -4484,6 +4608,25 @@ spec: type: string type: object type: object + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -4637,6 +4780,25 @@ spec: zookeeperNode: description: A zookeeper_node block as defined below. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -4804,6 +4966,24 @@ spec: description: The name of the Azure Active Directory Domain. Changing this forces a new resource to be created. type: string + domainUserPasswordSecretRef: + description: The user password of the Azure Active Directory + Domain. Changing this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object domainUsername: description: The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. @@ -4820,6 +5000,8 @@ spec: description: The User Assigned Identity for the HDInsight Cluster. Changing this forces a new resource to be created. type: string + required: + - domainUserPasswordSecretRef type: object storageAccount: description: One or more storage_account block as defined below. @@ -4830,6 +5012,25 @@ spec: HDInsight Hadoop Cluster? Changing this forces a new resource to be created. type: boolean + storageAccountKeySecretRef: + description: The Access Key which should be used to connect + to the Storage Account. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageContainerId: description: The ID of the Storage Container. Changing this forces a new resource to be created. @@ -4914,6 +5115,8 @@ spec: description: The ID of the Storage Account. Changing this forces a new resource to be created. type: string + required: + - storageAccountKeySecretRef type: object type: array storageAccountGen2: diff --git a/package/crds/hdinsight.azure.upbound.io_interactivequeryclusters.yaml b/package/crds/hdinsight.azure.upbound.io_interactivequeryclusters.yaml index b7982bdb5..a73a6f80e 100644 --- a/package/crds/hdinsight.azure.upbound.io_interactivequeryclusters.yaml +++ b/package/crds/hdinsight.azure.upbound.io_interactivequeryclusters.yaml @@ -3136,8 +3136,6 @@ spec: - name - namespace type: object - required: - - primaryKeySecretRef type: object gateway: description: A gateway block as defined below. @@ -3163,8 +3161,6 @@ spec: description: The username used for the Ambari Portal. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object location: description: Specifies the Azure Region which this HDInsight Interactive @@ -3211,8 +3207,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object hive: description: A hive block as defined below. @@ -3251,8 +3245,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object oozie: description: An oozie block as defined below. @@ -3291,8 +3283,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object type: object monitor: @@ -3320,8 +3310,6 @@ spec: - name - namespace type: object - required: - - primaryKeySecretRef type: object network: description: A network block as defined below. @@ -4026,8 +4014,6 @@ spec: description: The User Assigned Identity for the HDInsight Cluster. Changing this forces a new resource to be created. type: string - required: - - domainUserPasswordSecretRef type: object storageAccount: description: One or more storage_account block as defined below. @@ -4141,8 +4127,6 @@ spec: description: The ID of the Storage Account. Changing this forces a new resource to be created. type: string - required: - - storageAccountKeySecretRef type: object type: array storageAccountGen2: @@ -4254,14 +4238,52 @@ spec: logAnalyticsWorkspaceId: description: The workspace ID of the log analytics extension. type: string + primaryKeySecretRef: + description: The workspace key of the log analytics extension. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - primaryKeySecretRef type: object gateway: description: A gateway block as defined below. properties: + passwordSecretRef: + description: The password used for the Ambari Portal. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username used for the Ambari Portal. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object location: description: Specifies the Azure Region which this HDInsight Interactive @@ -4279,6 +4301,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4289,6 +4330,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object hive: description: A hive block as defined below. @@ -4298,6 +4341,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4308,6 +4370,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object oozie: description: An oozie block as defined below. @@ -4317,6 +4381,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4327,6 +4410,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object type: object monitor: @@ -4336,6 +4421,26 @@ spec: description: The Operations Management Suite (OMS) workspace ID. type: string + primaryKeySecretRef: + description: The Operations Management Suite (OMS) workspace + key. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - primaryKeySecretRef type: object network: description: A network block as defined below. @@ -4357,6 +4462,25 @@ spec: headNode: description: A head_node block as defined above. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -4548,6 +4672,25 @@ spec: type: string type: object type: object + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -4701,6 +4844,25 @@ spec: zookeeperNode: description: A zookeeper_node block as defined below. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -4868,6 +5030,24 @@ spec: description: The name of the Azure Active Directory Domain. Changing this forces a new resource to be created. type: string + domainUserPasswordSecretRef: + description: The user password of the Azure Active Directory + Domain. Changing this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object domainUsername: description: The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. @@ -4884,6 +5064,8 @@ spec: description: The User Assigned Identity for the HDInsight Cluster. Changing this forces a new resource to be created. type: string + required: + - domainUserPasswordSecretRef type: object storageAccount: description: One or more storage_account block as defined below. @@ -4894,6 +5076,25 @@ spec: HDInsight Hadoop Cluster? Changing this forces a new resource to be created. type: boolean + storageAccountKeySecretRef: + description: The Access Key which should be used to connect + to the Storage Account. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageContainerId: description: The ID of the Storage Container. Changing this forces a new resource to be created. @@ -4978,6 +5179,8 @@ spec: description: The ID of the Storage Account. Changing this forces a new resource to be created. type: string + required: + - storageAccountKeySecretRef type: object type: array storageAccountGen2: diff --git a/package/crds/hdinsight.azure.upbound.io_kafkaclusters.yaml b/package/crds/hdinsight.azure.upbound.io_kafkaclusters.yaml index 4cfab61a3..22e8cf89c 100644 --- a/package/crds/hdinsight.azure.upbound.io_kafkaclusters.yaml +++ b/package/crds/hdinsight.azure.upbound.io_kafkaclusters.yaml @@ -3459,8 +3459,6 @@ spec: - name - namespace type: object - required: - - primaryKeySecretRef type: object gateway: description: A gateway block as defined below. @@ -3486,8 +3484,6 @@ spec: description: The username used for the Ambari Portal. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object location: description: Specifies the Azure Region which this HDInsight Kafka @@ -3534,8 +3530,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object hive: description: A hive block as defined below. @@ -3574,8 +3568,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object oozie: description: An oozie block as defined below. @@ -3614,8 +3606,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object type: object monitor: @@ -3643,8 +3633,6 @@ spec: - name - namespace type: object - required: - - primaryKeySecretRef type: object network: description: A network block as defined below. @@ -4492,8 +4480,6 @@ spec: description: The User Assigned Identity for the HDInsight Cluster. Changing this forces a new resource to be created. type: string - required: - - domainUserPasswordSecretRef type: object storageAccount: description: One or more storage_account block as defined below. @@ -4607,8 +4593,6 @@ spec: description: The ID of the Storage Account. Changing this forces a new resource to be created. type: string - required: - - storageAccountKeySecretRef type: object type: array storageAccountGen2: @@ -4721,14 +4705,52 @@ spec: logAnalyticsWorkspaceId: description: The workspace ID of the log analytics extension. type: string + primaryKeySecretRef: + description: The workspace key of the log analytics extension. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - primaryKeySecretRef type: object gateway: description: A gateway block as defined below. properties: + passwordSecretRef: + description: The password used for the Ambari Portal. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username used for the Ambari Portal. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object location: description: Specifies the Azure Region which this HDInsight Kafka @@ -4746,6 +4768,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4756,6 +4797,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object hive: description: A hive block as defined below. @@ -4765,6 +4808,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4775,6 +4837,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object oozie: description: An oozie block as defined below. @@ -4784,6 +4848,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4794,6 +4877,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object type: object monitor: @@ -4803,6 +4888,26 @@ spec: description: The Operations Management Suite (OMS) workspace ID. type: string + primaryKeySecretRef: + description: The Operations Management Suite (OMS) workspace + key. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - primaryKeySecretRef type: object network: description: A network block as defined below. @@ -4836,6 +4941,25 @@ spec: headNode: description: A head_node block as defined above. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined below. @@ -4985,6 +5109,25 @@ spec: kafkaManagementNode: description: A kafka_management_node block as defined below. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined below. @@ -5139,6 +5282,25 @@ spec: assigned to each Worker Node, which can be between 1 and 8. Changing this forces a new resource to be created. type: number + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined below. @@ -5292,6 +5454,25 @@ spec: zookeeperNode: description: A zookeeper_node block as defined below. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined below. @@ -5459,6 +5640,24 @@ spec: description: The name of the Azure Active Directory Domain. Changing this forces a new resource to be created. type: string + domainUserPasswordSecretRef: + description: The user password of the Azure Active Directory + Domain. Changing this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object domainUsername: description: The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. @@ -5475,6 +5674,8 @@ spec: description: The User Assigned Identity for the HDInsight Cluster. Changing this forces a new resource to be created. type: string + required: + - domainUserPasswordSecretRef type: object storageAccount: description: One or more storage_account block as defined below. @@ -5485,6 +5686,25 @@ spec: HDInsight Hadoop Cluster? Changing this forces a new resource to be created. type: boolean + storageAccountKeySecretRef: + description: The Access Key which should be used to connect + to the Storage Account. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageContainerId: description: The ID of the Storage Container. Changing this forces a new resource to be created. @@ -5569,6 +5789,8 @@ spec: description: The ID of the Storage Account. Changing this forces a new resource to be created. type: string + required: + - storageAccountKeySecretRef type: object type: array storageAccountGen2: diff --git a/package/crds/hdinsight.azure.upbound.io_sparkclusters.yaml b/package/crds/hdinsight.azure.upbound.io_sparkclusters.yaml index 308e1ad03..1eed8824d 100644 --- a/package/crds/hdinsight.azure.upbound.io_sparkclusters.yaml +++ b/package/crds/hdinsight.azure.upbound.io_sparkclusters.yaml @@ -3154,8 +3154,6 @@ spec: - name - namespace type: object - required: - - primaryKeySecretRef type: object gateway: description: A gateway block as defined below. @@ -3181,8 +3179,6 @@ spec: description: The username used for the Ambari Portal. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object location: description: Specifies the Azure Region which this HDInsight Spark @@ -3229,8 +3225,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object hive: description: A hive block as defined below. @@ -3269,8 +3263,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object oozie: description: An oozie block as defined below. @@ -3309,8 +3301,6 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string - required: - - passwordSecretRef type: object type: object monitor: @@ -3338,8 +3328,6 @@ spec: - name - namespace type: object - required: - - primaryKeySecretRef type: object network: description: A network block as defined below. @@ -4049,8 +4037,6 @@ spec: description: The User Assigned Identity for the HDInsight Cluster. Changing this forces a new resource to be created. type: string - required: - - domainUserPasswordSecretRef type: object storageAccount: description: One or more storage_account block as defined below. @@ -4164,8 +4150,6 @@ spec: description: The ID of the Storage Account. Changing this forces a new resource to be created. type: string - required: - - storageAccountKeySecretRef type: object type: array storageAccountGen2: @@ -4277,14 +4261,52 @@ spec: logAnalyticsWorkspaceId: description: The workspace ID of the log analytics extension. type: string + primaryKeySecretRef: + description: The workspace key of the log analytics extension. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - primaryKeySecretRef type: object gateway: description: A gateway block as defined below. properties: + passwordSecretRef: + description: The password used for the Ambari Portal. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username used for the Ambari Portal. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object location: description: Specifies the Azure Region which this HDInsight Spark @@ -4302,6 +4324,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4312,6 +4353,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object hive: description: A hive block as defined below. @@ -4321,6 +4364,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4331,6 +4393,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object oozie: description: An oozie block as defined below. @@ -4340,6 +4404,25 @@ spec: database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The fully-qualified domain name (FQDN) of the SQL server to use for the external Oozie metastore. @@ -4350,6 +4433,8 @@ spec: the Zookeeper Nodes. Changing this forces a new resource to be created. type: string + required: + - passwordSecretRef type: object type: object monitor: @@ -4359,6 +4444,26 @@ spec: description: The Operations Management Suite (OMS) workspace ID. type: string + primaryKeySecretRef: + description: The Operations Management Suite (OMS) workspace + key. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - primaryKeySecretRef type: object network: description: A network block as defined below. @@ -4380,6 +4485,25 @@ spec: headNode: description: A head_node block as defined above. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -4576,6 +4700,25 @@ spec: type: string type: object type: object + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -4729,6 +4872,25 @@ spec: zookeeperNode: description: A zookeeper_node block as defined below. properties: + passwordSecretRef: + description: The Password associated with the local administrator + for the Zookeeper Nodes. Changing this forces a new + resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object scriptActions: description: The script action which will run on the cluster. One or more script_actions blocks as defined above. @@ -4896,6 +5058,24 @@ spec: description: The name of the Azure Active Directory Domain. Changing this forces a new resource to be created. type: string + domainUserPasswordSecretRef: + description: The user password of the Azure Active Directory + Domain. Changing this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object domainUsername: description: The username of the Azure Active Directory Domain. Changing this forces a new resource to be created. @@ -4912,6 +5092,8 @@ spec: description: The User Assigned Identity for the HDInsight Cluster. Changing this forces a new resource to be created. type: string + required: + - domainUserPasswordSecretRef type: object storageAccount: description: One or more storage_account block as defined below. @@ -4922,6 +5104,25 @@ spec: HDInsight Hadoop Cluster? Changing this forces a new resource to be created. type: boolean + storageAccountKeySecretRef: + description: The Access Key which should be used to connect + to the Storage Account. Changing this forces a new resource + to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageContainerId: description: The ID of the Storage Container. Changing this forces a new resource to be created. @@ -5006,6 +5207,8 @@ spec: description: The ID of the Storage Account. Changing this forces a new resource to be created. type: string + required: + - storageAccountKeySecretRef type: object type: array storageAccountGen2: diff --git a/package/crds/keyvault.azure.upbound.io_certificateissuers.yaml b/package/crds/keyvault.azure.upbound.io_certificateissuers.yaml index a7e03d9e6..08380ef7e 100644 --- a/package/crds/keyvault.azure.upbound.io_certificateissuers.yaml +++ b/package/crds/keyvault.azure.upbound.io_certificateissuers.yaml @@ -317,6 +317,25 @@ spec: orgId: description: The ID of the organization as provided to the issuer. type: string + passwordSecretRef: + description: The password associated with the account and organization + ID at the third-party Certificate Issuer. If not specified, + will not overwrite any previous value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object providerName: description: 'The name of the third-party Certificate Issuer. Possible values are: DigiCert, GlobalSign, OneCertV2-PrivateCA, diff --git a/package/crds/keyvault.azure.upbound.io_certificates.yaml b/package/crds/keyvault.azure.upbound.io_certificates.yaml index 97f5ca990..9fe75c311 100644 --- a/package/crds/keyvault.azure.upbound.io_certificates.yaml +++ b/package/crds/keyvault.azure.upbound.io_certificates.yaml @@ -1217,8 +1217,6 @@ spec: - name - namespace type: object - required: - - contentsSecretRef type: object certificatePolicy: description: A certificate_policy block as defined below. Changing @@ -1457,6 +1455,43 @@ spec: description: A certificate block as defined below, used to Import an existing certificate. Changing this will create a new version of the Key Vault Certificate. + properties: + contentsSecretRef: + description: The base64-encoded certificate contents. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + passwordSecretRef: + description: The password associated with the certificate. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - contentsSecretRef type: object certificatePolicy: description: A certificate_policy block as defined below. Changing @@ -1894,8 +1929,6 @@ spec: - name - namespace type: object - required: - - contentsSecretRef type: object certificateAttribute: description: A certificate_attribute block as defined below. diff --git a/package/crds/keyvault.azure.upbound.io_secrets.yaml b/package/crds/keyvault.azure.upbound.io_secrets.yaml index 5d35c216c..899d04310 100644 --- a/package/crds/keyvault.azure.upbound.io_secrets.yaml +++ b/package/crds/keyvault.azure.upbound.io_secrets.yaml @@ -299,6 +299,26 @@ spec: description: A mapping of tags to assign to the resource. type: object x-kubernetes-map-type: granular + valueSecretRef: + description: Specifies the value of the Key Vault Secret. Changing + this will create a new version of the Key Vault Secret. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object managementPolicies: default: diff --git a/package/crds/labservices.azure.upbound.io_labservicelabs.yaml b/package/crds/labservices.azure.upbound.io_labservicelabs.yaml index e501ea663..2eec403bc 100644 --- a/package/crds/labservices.azure.upbound.io_labservicelabs.yaml +++ b/package/crds/labservices.azure.upbound.io_labservicelabs.yaml @@ -1556,8 +1556,6 @@ spec: description: The username to use when signing in to Lab Service Lab VMs. type: string - required: - - passwordSecretRef type: object createOption: description: The create option to indicate what Lab Service @@ -1612,8 +1610,6 @@ spec: description: The username to use when signing in to Lab Service Lab VMs. type: string - required: - - passwordSecretRef type: object sharedPasswordEnabled: description: Is the shared password enabled with the same @@ -1836,10 +1832,29 @@ spec: adminUser: description: An admin_user block as defined below. properties: + passwordSecretRef: + description: The password for the user. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username to use when signing in to Lab Service Lab VMs. type: string + required: + - passwordSecretRef type: object createOption: description: The create option to indicate what Lab Service @@ -1873,10 +1888,29 @@ spec: nonAdminUser: description: A non_admin_user block as defined below. properties: + passwordSecretRef: + description: The password for the user. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username to use when signing in to Lab Service Lab VMs. type: string + required: + - passwordSecretRef type: object sharedPasswordEnabled: description: Is the shared password enabled with the same diff --git a/package/crds/media.azure.upbound.io_contentkeypolicies.yaml b/package/crds/media.azure.upbound.io_contentkeypolicies.yaml index 95a27994c..fd1b94997 100644 --- a/package/crds/media.azure.upbound.io_contentkeypolicies.yaml +++ b/package/crds/media.azure.upbound.io_contentkeypolicies.yaml @@ -2138,6 +2138,24 @@ spec: description: A fairplay_configuration block as defined above. Check license requirements here https://docs.microsoft.com/azure/media-services/latest/fairplay-license-overview. properties: + askSecretRef: + description: The key that must be used as FairPlay Application + Secret key. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object offlineRentalConfiguration: description: A offline_rental_configuration block as defined below. @@ -2149,6 +2167,42 @@ spec: description: Storage duration. type: number type: object + pfxPasswordSecretRef: + description: The password encrypting FairPlay certificate + in PKCS 12 (pfx) format. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + pfxSecretRef: + description: The Base64 representation of FairPlay certificate + in PKCS 12 (pfx) format (including private key). + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object rentalAndLeaseKeyType: description: The rental and lease key type. Supported values are DualExpiry, PersistentLimited, PersistentUnlimited @@ -2195,6 +2249,23 @@ spec: expirationDate: description: The expiration date of license. type: string + gracePeriodSecretRef: + description: The grace period of license. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object licenseType: description: The license type. Supported values are NonPersistent or Persistent. @@ -2302,6 +2373,78 @@ spec: description: One or more alternate_key block as defined above. items: + properties: + rsaTokenKeyExponentSecretRef: + description: The RSA parameter exponent. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + rsaTokenKeyModulusSecretRef: + description: The RSA parameter modulus. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + symmetricTokenKeySecretRef: + description: The key value of the key. Specifies + a symmetric key for token validation. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + x509TokenKeyRawSecretRef: + description: The raw data field of a certificate + in PKCS 12 format (X509Certificate2 in .NET). + Specifies a certificate for token validation. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object type: array audience: @@ -2313,6 +2456,77 @@ spec: openIdConnectDiscoveryDocument: description: The OpenID connect discovery document. type: string + primaryRsaTokenKeyExponentSecretRef: + description: The RSA parameter exponent. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + primaryRsaTokenKeyModulusSecretRef: + description: The RSA parameter modulus. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + primarySymmetricTokenKeySecretRef: + description: The key value of the key. Specifies a symmetric + key for token validation. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + primaryX509TokenKeyRawSecretRef: + description: The raw data field of a certificate in + PKCS 12 format (X509Certificate2 in .NET). Specifies + a certificate for token validation. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object requiredClaim: description: One or more required_claim blocks as defined above. diff --git a/package/crds/netapp.azure.upbound.io_accounts.yaml b/package/crds/netapp.azure.upbound.io_accounts.yaml index d0d5fcf35..b4bd3f1f9 100644 --- a/package/crds/netapp.azure.upbound.io_accounts.yaml +++ b/package/crds/netapp.azure.upbound.io_accounts.yaml @@ -705,8 +705,6 @@ spec: username: description: The Username of Active Directory Domain Administrator. type: string - required: - - passwordSecretRef type: object identity: description: The identity block where it is used when customer @@ -846,6 +844,23 @@ spec: description: The Organizational Unit (OU) within the Active Directory Domain. type: string + passwordSecretRef: + description: The password associated with the username. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object smbServerName: description: The NetBIOS name which should be used for the NetApp SMB Server, which will be registered as a computer @@ -854,6 +869,8 @@ spec: username: description: The Username of Active Directory Domain Administrator. type: string + required: + - passwordSecretRef type: object identity: description: The identity block where it is used when customer diff --git a/package/crds/network.azure.upbound.io_applicationgateways.yaml b/package/crds/network.azure.upbound.io_applicationgateways.yaml index b98606139..c6d0c7ad9 100644 --- a/package/crds/network.azure.upbound.io_applicationgateways.yaml +++ b/package/crds/network.azure.upbound.io_applicationgateways.yaml @@ -4242,8 +4242,6 @@ spec: description: The Name of the Authentication Certificate to use. type: string - required: - - dataSecretRef type: object type: array autoscaleConfiguration: @@ -5418,8 +5416,6 @@ spec: description: The name of the Trusted Client Certificate that is unique within this Application Gateway. type: string - required: - - dataSecretRef type: object type: array trustedRootCertificate: @@ -5647,10 +5643,30 @@ spec: defined below. items: properties: + dataSecretRef: + description: The contents of the Authentication Certificate + which should be used. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object name: description: The Name of the Authentication Certificate to use. type: string + required: + - dataSecretRef type: object type: array autoscaleConfiguration: @@ -6551,6 +6567,24 @@ spec: description: One or more ssl_certificate blocks as defined below. items: properties: + dataSecretRef: + description: The base64-encoded PFX certificate data. Required + if key_vault_secret_id is not set. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object keyVaultSecretId: description: The Secret ID of (base-64 encoded unencrypted pfx) the Secret or Certificate object stored in Azure @@ -6561,6 +6595,24 @@ spec: description: The Name of the SSL certificate that is unique within this Application Gateway type: string + passwordSecretRef: + description: Password for the pfx file specified in data. + Required if data is set. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object type: array sslPolicy: @@ -6687,10 +6739,29 @@ spec: defined below. items: properties: + dataSecretRef: + description: The base-64 encoded certificate. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object name: description: The name of the Trusted Client Certificate that is unique within this Application Gateway. type: string + required: + - dataSecretRef type: object type: array trustedRootCertificate: @@ -6698,6 +6769,25 @@ spec: below. items: properties: + dataSecretRef: + description: The contents of the Trusted Root Certificate + which should be used. Required if key_vault_secret_id + is not set. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object keyVaultSecretId: description: The Secret ID of (base-64 encoded unencrypted pfx) Secret or Certificate object stored in Azure KeyVault. diff --git a/package/crds/network.azure.upbound.io_expressroutecircuitconnections.yaml b/package/crds/network.azure.upbound.io_expressroutecircuitconnections.yaml index d85596bc9..357477b78 100644 --- a/package/crds/network.azure.upbound.io_expressroutecircuitconnections.yaml +++ b/package/crds/network.azure.upbound.io_expressroutecircuitconnections.yaml @@ -286,6 +286,24 @@ spec: description: The IPv6 address space from which to allocate customer addresses for global reach. type: string + authorizationKeySecretRef: + description: The authorization key which is associated with the + Express Route Circuit Connection. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object peerPeeringId: description: The ID of the peered Express Route Circuit Private Peering. Changing this forces a new Express Route Circuit Connection diff --git a/package/crds/network.azure.upbound.io_expressroutecircuitpeerings.yaml b/package/crds/network.azure.upbound.io_expressroutecircuitpeerings.yaml index 314dc68e9..d4bc953e2 100644 --- a/package/crds/network.azure.upbound.io_expressroutecircuitpeerings.yaml +++ b/package/crds/network.azure.upbound.io_expressroutecircuitpeerings.yaml @@ -1249,6 +1249,23 @@ spec: description: A /30 subnet for the secondary link. Required when config for IPv4. type: string + sharedKeySecretRef: + description: The shared key. Can be a maximum of 25 characters. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object vlanId: description: A valid VLAN ID to establish this peering on. type: number diff --git a/package/crds/network.azure.upbound.io_expressroutecircuits.yaml b/package/crds/network.azure.upbound.io_expressroutecircuits.yaml index bc6243a28..7c736d5b8 100644 --- a/package/crds/network.azure.upbound.io_expressroutecircuits.yaml +++ b/package/crds/network.azure.upbound.io_expressroutecircuits.yaml @@ -819,6 +819,25 @@ spec: description: Allow the circuit to interact with classic (RDFE) resources. Defaults to false. type: boolean + authorizationKeySecretRef: + description: The authorization key. This can be used to set up + an ExpressRoute Circuit with an ExpressRoute Port from another + subscription. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object bandwidthInGbps: description: The bandwidth in Gbps of the circuit being created on the Express Route Port. diff --git a/package/crds/network.azure.upbound.io_virtualnetworkgatewayconnections.yaml b/package/crds/network.azure.upbound.io_virtualnetworkgatewayconnections.yaml index 18a8167f4..3578311ae 100644 --- a/package/crds/network.azure.upbound.io_virtualnetworkgatewayconnections.yaml +++ b/package/crds/network.azure.upbound.io_virtualnetworkgatewayconnections.yaml @@ -1984,6 +1984,25 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + authorizationKeySecretRef: + description: The authorization key associated with the Express + Route Circuit. This field is required only if the type is an + ExpressRoute connection. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object connectionMode: description: Connection mode to use. Possible values are Default, InitiatorOnly and ResponderOnly. Defaults to Default. Changing @@ -2255,6 +2274,24 @@ spec: routingWeight: description: The routing weight. Defaults to 10. type: number + sharedKeySecretRef: + description: The shared IPSec key. A key could be provided if + a Site-to-Site, VNet-to-VNet or ExpressRoute connection is created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object tags: additionalProperties: type: string diff --git a/package/crds/network.azure.upbound.io_virtualnetworkgateways.yaml b/package/crds/network.azure.upbound.io_virtualnetworkgateways.yaml index fd9723a20..06fdd3aae 100644 --- a/package/crds/network.azure.upbound.io_virtualnetworkgateways.yaml +++ b/package/crds/network.azure.upbound.io_virtualnetworkgateways.yaml @@ -2464,8 +2464,6 @@ spec: - name - namespace type: object - required: - - secretSecretRef type: object type: array radiusServerAddress: @@ -2993,6 +2991,26 @@ spec: the priority of the server. Possible values are between 1 and 30. type: number + secretSecretRef: + description: The secret that is used to communicate + with the Radius Server. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - secretSecretRef type: object type: array radiusServerAddress: diff --git a/package/crds/network.azure.upbound.io_vpnserverconfigurations.yaml b/package/crds/network.azure.upbound.io_vpnserverconfigurations.yaml index f567cf459..2a11b608b 100644 --- a/package/crds/network.azure.upbound.io_vpnserverconfigurations.yaml +++ b/package/crds/network.azure.upbound.io_vpnserverconfigurations.yaml @@ -1107,8 +1107,6 @@ spec: - name - namespace type: object - required: - - secretSecretRef type: object type: array serverRootCertificate: @@ -1357,6 +1355,26 @@ spec: description: The Score of the Radius Server determines the priority of the server. Ranges from 1 to 30. type: number + secretSecretRef: + description: The Secret used to communicate with the + Radius Server. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - secretSecretRef type: object type: array serverRootCertificate: diff --git a/package/crds/notificationhubs.azure.upbound.io_notificationhubs.yaml b/package/crds/notificationhubs.azure.upbound.io_notificationhubs.yaml index 28a20285c..1df3da260 100644 --- a/package/crds/notificationhubs.azure.upbound.io_notificationhubs.yaml +++ b/package/crds/notificationhubs.azure.upbound.io_notificationhubs.yaml @@ -770,8 +770,6 @@ spec: - name - namespace type: object - required: - - tokenSecretRef type: object gcmCredential: description: A gcm_credential block as defined below. @@ -794,8 +792,6 @@ spec: - name - namespace type: object - required: - - apiKeySecretRef type: object location: description: The Azure Region in which this Notification Hub Namespace @@ -1001,9 +997,52 @@ spec: teamId: description: The ID of the team the Token. type: string + tokenSecretRef: + description: The Push Token associated with the Apple Developer + Account. This is the contents of the key downloaded from + the Apple Developer Portal between the -----BEGIN PRIVATE + KEY----- and -----END PRIVATE KEY----- blocks. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - tokenSecretRef type: object gcmCredential: description: A gcm_credential block as defined below. + properties: + apiKeySecretRef: + description: The API Key associated with the Google Cloud + Messaging service. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - apiKeySecretRef type: object location: description: The Azure Region in which this Notification Hub Namespace @@ -1233,8 +1272,6 @@ spec: - name - namespace type: object - required: - - apiKeySecretRef type: object id: description: The ID of the Notification Hub. diff --git a/package/crds/resources.azure.upbound.io_resourcedeploymentscriptazureclicli.yaml b/package/crds/resources.azure.upbound.io_resourcedeploymentscriptazureclicli.yaml index 070da2761..acfec07ec 100644 --- a/package/crds/resources.azure.upbound.io_resourcedeploymentscriptazureclicli.yaml +++ b/package/crds/resources.azure.upbound.io_resourcedeploymentscriptazureclicli.yaml @@ -1435,8 +1435,6 @@ spec: name: description: Specifies the storage account name. type: string - required: - - keySecretRef type: object supportingScriptUris: description: Supporting files for the external script. Changing @@ -1506,6 +1504,24 @@ spec: name: description: Specifies the name of the environment variable. type: string + secureValueSecretRef: + description: Specifies the value of the secure environment + variable. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object value: description: Specifies the value of the environment variable. type: string @@ -1729,9 +1745,28 @@ spec: description: A storage_account block as defined below. Changing this forces a new Resource Deployment Script to be created. properties: + keySecretRef: + description: Specifies the storage account access key. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object name: description: Specifies the storage account name. type: string + required: + - keySecretRef type: object supportingScriptUris: description: Supporting files for the external script. Changing diff --git a/package/crds/resources.azure.upbound.io_resourcedeploymentscriptazurepowershells.yaml b/package/crds/resources.azure.upbound.io_resourcedeploymentscriptazurepowershells.yaml index 28a787b18..5300e07e2 100644 --- a/package/crds/resources.azure.upbound.io_resourcedeploymentscriptazurepowershells.yaml +++ b/package/crds/resources.azure.upbound.io_resourcedeploymentscriptazurepowershells.yaml @@ -1437,8 +1437,6 @@ spec: name: description: Specifies the storage account name. type: string - required: - - keySecretRef type: object supportingScriptUris: description: Supporting files for the external script. Changing @@ -1508,6 +1506,24 @@ spec: name: description: Specifies the name of the environment variable. type: string + secureValueSecretRef: + description: Specifies the value of the secure environment + variable. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object value: description: Specifies the value of the environment variable. type: string @@ -1731,9 +1747,28 @@ spec: description: A storage_account block as defined below. Changing this forces a new Resource Deployment Script to be created. properties: + keySecretRef: + description: Specifies the storage account access key. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object name: description: Specifies the storage account name. type: string + required: + - keySecretRef type: object supportingScriptUris: description: Supporting files for the external script. Changing diff --git a/package/crds/servicefabric.azure.upbound.io_managedclusters.yaml b/package/crds/servicefabric.azure.upbound.io_managedclusters.yaml index 352d29b59..08f00f8a9 100644 --- a/package/crds/servicefabric.azure.upbound.io_managedclusters.yaml +++ b/package/crds/servicefabric.azure.upbound.io_managedclusters.yaml @@ -1709,6 +1709,24 @@ spec: type: string type: object type: array + passwordSecretRef: + description: Administrator password for the VMs that will be created + as part of this cluster. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object sku: description: SKU for this cluster. Changing this forces a new resource to be created. Default is Basic, allowed values are diff --git a/package/crds/servicelinker.azure.upbound.io_springcloudconnections.yaml b/package/crds/servicelinker.azure.upbound.io_springcloudconnections.yaml index 64e78fce3..198469b5e 100644 --- a/package/crds/servicelinker.azure.upbound.io_springcloudconnections.yaml +++ b/package/crds/servicelinker.azure.upbound.io_springcloudconnections.yaml @@ -1218,6 +1218,24 @@ spec: description: The authentication info. An authentication block as defined below. properties: + certificateSecretRef: + description: Service principal certificate for servicePrincipal + auth. Should be specified when type is set to servicePrincipalCertificate. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientId: description: Client ID for userAssignedIdentity or servicePrincipal auth. Should be specified when type is set to servicePrincipalSecret @@ -1235,6 +1253,25 @@ spec: be specified when type is set to servicePrincipalSecret or servicePrincipalCertificate. type: string + secretSecretRef: + description: Password or account key for secret auth. secret + and name should be either both specified or both not specified + when type is set to secret. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object subscriptionId: description: Subscription ID for userAssignedIdentity. subscription_id and client_id should be either both specified or both not diff --git a/package/crds/sql.azure.upbound.io_mssqldatabaseextendedauditingpolicies.yaml b/package/crds/sql.azure.upbound.io_mssqldatabaseextendedauditingpolicies.yaml index 1dbf38c7b..238bb35d0 100644 --- a/package/crds/sql.azure.upbound.io_mssqldatabaseextendedauditingpolicies.yaml +++ b/package/crds/sql.azure.upbound.io_mssqldatabaseextendedauditingpolicies.yaml @@ -293,6 +293,23 @@ spec: description: Is storage_account_access_key value the storage's secondary key? type: boolean + storageAccountAccessKeySecretRef: + description: The access key to use for the auditing storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageEndpoint: description: The blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all extended auditing logs. diff --git a/package/crds/sql.azure.upbound.io_mssqldatabases.yaml b/package/crds/sql.azure.upbound.io_mssqldatabases.yaml index 766a82f93..e506bc1e6 100644 --- a/package/crds/sql.azure.upbound.io_mssqldatabases.yaml +++ b/package/crds/sql.azure.upbound.io_mssqldatabases.yaml @@ -1615,9 +1615,6 @@ spec: storageUri: description: Specifies the blob URI of the .bacpac file. type: string - required: - - administratorLoginPasswordSecretRef - - storageKeySecretRef type: object ledgerEnabled: description: A boolean that specifies if this is a ledger database. @@ -2055,6 +2052,23 @@ spec: administratorLogin: description: Specifies the name of the SQL administrator. type: string + administratorLoginPasswordSecretRef: + description: Specifies the password of the SQL administrator. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object authenticationType: description: Specifies the type of authentication used to access the server. Valid values are SQL or ADPassword. @@ -2065,6 +2079,23 @@ spec: will be created for the storage account. Must match storage account used for storage_uri parameter. type: string + storageKeySecretRef: + description: Specifies the access key for the storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageKeyType: description: Specifies the type of access key for the storage account. Valid values are StorageAccessKey or SharedAccessKey. @@ -2072,6 +2103,9 @@ spec: storageUri: description: Specifies the blob URI of the .bacpac file. type: string + required: + - administratorLoginPasswordSecretRef + - storageKeySecretRef type: object ledgerEnabled: description: A boolean that specifies if this is a ledger database. @@ -2241,6 +2275,24 @@ spec: description: The State of the Policy. Possible values are Enabled or Disabled. Defaults to Disabled. type: string + storageAccountAccessKeySecretRef: + description: Specifies the identifier key of the Threat Detection + audit storage account. Required if state is Enabled. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageEndpoint: description: Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. diff --git a/package/crds/sql.azure.upbound.io_mssqljobcredentials.yaml b/package/crds/sql.azure.upbound.io_mssqljobcredentials.yaml index 92d645efd..71f817237 100644 --- a/package/crds/sql.azure.upbound.io_mssqljobcredentials.yaml +++ b/package/crds/sql.azure.upbound.io_mssqljobcredentials.yaml @@ -185,9 +185,28 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + passwordSecretRef: + description: The password part of the credential. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username part of the credential. type: string + required: + - passwordSecretRef type: object managementPolicies: default: diff --git a/package/crds/sql.azure.upbound.io_mssqlmanagedinstances.yaml b/package/crds/sql.azure.upbound.io_mssqlmanagedinstances.yaml index 51f13f536..12acb7dc1 100644 --- a/package/crds/sql.azure.upbound.io_mssqlmanagedinstances.yaml +++ b/package/crds/sql.azure.upbound.io_mssqlmanagedinstances.yaml @@ -1498,6 +1498,24 @@ spec: description: The administrator login name for the new SQL Managed Instance. Changing this forces a new resource to be created. type: string + administratorLoginPasswordSecretRef: + description: The password associated with the administrator_login + user. Needs to comply with Azure's Password Policy + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object collation: description: Specifies how the SQL Managed Instance will be collated. Default value is SQL_Latin1_General_CP1_CI_AS. Changing this @@ -1743,6 +1761,8 @@ spec: description: Specifies whether or not the SQL Managed Instance is zone redundant. Defaults to false. type: boolean + required: + - administratorLoginPasswordSecretRef type: object managementPolicies: default: diff --git a/package/crds/sql.azure.upbound.io_mssqlmanagedinstancevulnerabilityassessments.yaml b/package/crds/sql.azure.upbound.io_mssqlmanagedinstancevulnerabilityassessments.yaml index 86d365283..7e53c04c1 100644 --- a/package/crds/sql.azure.upbound.io_mssqlmanagedinstancevulnerabilityassessments.yaml +++ b/package/crds/sql.azure.upbound.io_mssqlmanagedinstancevulnerabilityassessments.yaml @@ -768,10 +768,49 @@ spec: is enabled or disabled. Defaults to false. type: boolean type: object + storageAccountAccessKeySecretRef: + description: Specifies the identifier key of the storage account + for vulnerability assessment scan results. If storage_container_sas_key + isn't specified, storage_account_access_key is required. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageContainerPath: description: A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/). type: string + storageContainerSasKeySecretRef: + description: A shared access signature (SAS Key) that has write + access to the blob container specified in storage_container_path + parameter. If storage_account_access_key isn't specified, storage_container_sas_key + is required. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object managementPolicies: default: diff --git a/package/crds/sql.azure.upbound.io_mssqlservermicrosoftsupportauditingpolicies.yaml b/package/crds/sql.azure.upbound.io_mssqlservermicrosoftsupportauditingpolicies.yaml index 5bb5f89de..8a0c364fe 100644 --- a/package/crds/sql.azure.upbound.io_mssqlservermicrosoftsupportauditingpolicies.yaml +++ b/package/crds/sql.azure.upbound.io_mssqlservermicrosoftsupportauditingpolicies.yaml @@ -376,6 +376,41 @@ spec: audit events to Azure Monitor, please enable its main database audit events to Azure Monitor. Defaults to true. type: boolean + storageAccountAccessKeySecretRef: + description: The access key to use for the auditing storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + storageAccountSubscriptionIdSecretRef: + description: The ID of the Subscription containing the Storage + Account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object managementPolicies: default: diff --git a/package/crds/sql.azure.upbound.io_mssqlservers.yaml b/package/crds/sql.azure.upbound.io_mssqlservers.yaml index d389786c7..ba2bf04f1 100644 --- a/package/crds/sql.azure.upbound.io_mssqlservers.yaml +++ b/package/crds/sql.azure.upbound.io_mssqlservers.yaml @@ -1905,6 +1905,26 @@ spec: which cannot be subsequently changed. Changing this forces a new resource to be created. type: string + administratorLoginPasswordSecretRef: + description: The password associated with the administrator_login + user. Needs to comply with Azure's Password Policy. Required + unless azuread_authentication_only in the azuread_administrator + block is true. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object azureadAdministrator: description: An azuread_administrator block as defined below. properties: diff --git a/package/crds/sql.azure.upbound.io_mssqlserversecurityalertpolicies.yaml b/package/crds/sql.azure.upbound.io_mssqlserversecurityalertpolicies.yaml index cc0dc8b24..2d998e277 100644 --- a/package/crds/sql.azure.upbound.io_mssqlserversecurityalertpolicies.yaml +++ b/package/crds/sql.azure.upbound.io_mssqlserversecurityalertpolicies.yaml @@ -401,6 +401,25 @@ spec: the specific database server. Possible values are Disabled, Enabled and New. type: string + storageAccountAccessKeySecretRef: + description: Specifies the identifier key of the Threat Detection + audit storage account. This is mandatory when you use storage_endpoint + to specify a storage account blob endpoint. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageEndpoint: description: Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. diff --git a/package/crds/sql.azure.upbound.io_mssqlservervulnerabilityassessments.yaml b/package/crds/sql.azure.upbound.io_mssqlservervulnerabilityassessments.yaml index 616b7d010..438b9cef7 100644 --- a/package/crds/sql.azure.upbound.io_mssqlservervulnerabilityassessments.yaml +++ b/package/crds/sql.azure.upbound.io_mssqlservervulnerabilityassessments.yaml @@ -926,10 +926,49 @@ spec: type: string type: object type: object + storageAccountAccessKeySecretRef: + description: Specifies the identifier key of the storage account + for vulnerability assessment scan results. If storage_container_sas_key + isn't specified, storage_account_access_key is required. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageContainerPath: description: A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/). type: string + storageContainerSasKeySecretRef: + description: A shared access signature (SAS Key) that has write + access to the blob container specified in storage_container_path + parameter. If storage_account_access_key isn't specified, storage_container_sas_key + is required. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object managementPolicies: default: diff --git a/package/crds/storagecache.azure.upbound.io_hpccaches.yaml b/package/crds/storagecache.azure.upbound.io_hpccaches.yaml index cbb26ac39..9fbfe72cc 100644 --- a/package/crds/storagecache.azure.upbound.io_hpccaches.yaml +++ b/package/crds/storagecache.azure.upbound.io_hpccaches.yaml @@ -1399,8 +1399,6 @@ spec: username: description: The username of the Active Directory domain administrator. type: string - required: - - passwordSecretRef type: object directoryFlatFile: description: A directory_flat_file block as defined below. @@ -1446,8 +1444,6 @@ spec: - name - namespace type: object - required: - - passwordSecretRef type: object certificateValidationUri: description: The URI of the CA certificate to validate the @@ -1778,9 +1774,28 @@ spec: domainNetbiosName: description: The Active Directory domain's NetBIOS name. type: string + passwordSecretRef: + description: The password of the Active Directory domain administrator. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object username: description: The username of the Active Directory domain administrator. type: string + required: + - passwordSecretRef type: object directoryFlatFile: description: A directory_flat_file block as defined below. @@ -1808,6 +1823,26 @@ spec: description: The Bind Distinguished Name (DN) identity to be used in the secure LDAP connection. type: string + passwordSecretRef: + description: The password of the Active Directory domain + administrator. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - passwordSecretRef type: object certificateValidationUri: description: The URI of the CA certificate to validate the diff --git a/package/crds/streamanalytics.azure.upbound.io_jobs.yaml b/package/crds/streamanalytics.azure.upbound.io_jobs.yaml index 93c5a1592..39a9c4e1c 100644 --- a/package/crds/streamanalytics.azure.upbound.io_jobs.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_jobs.yaml @@ -887,8 +887,6 @@ spec: The only supported value is ConnectionString. Defaults to ConnectionString. type: string - required: - - accountKeySecretRef type: object type: array location: @@ -1076,6 +1074,23 @@ spec: block as defined below. items: properties: + accountKeySecretRef: + description: The account key for the Azure storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object accountName: description: The name of the Azure storage account. type: string @@ -1084,6 +1099,8 @@ spec: The only supported value is ConnectionString. Defaults to ConnectionString. type: string + required: + - accountKeySecretRef type: object type: array location: diff --git a/package/crds/streamanalytics.azure.upbound.io_outputblobs.yaml b/package/crds/streamanalytics.azure.upbound.io_outputblobs.yaml index 6007556a5..df81f3bab 100644 --- a/package/crds/streamanalytics.azure.upbound.io_outputblobs.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_outputblobs.yaml @@ -1593,6 +1593,24 @@ spec: streams. Possible values are Avro, Csv, Json and Parquet. type: string type: object + storageAccountKeySecretRef: + description: The Access Key which should be used to connect to + this Storage Account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountName: description: The name of the Storage Account. type: string diff --git a/package/crds/streamanalytics.azure.upbound.io_outputeventhubs.yaml b/package/crds/streamanalytics.azure.upbound.io_outputeventhubs.yaml index 56be3e10b..87ff920ed 100644 --- a/package/crds/streamanalytics.azure.upbound.io_outputeventhubs.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_outputeventhubs.yaml @@ -1459,6 +1459,24 @@ spec: type: string type: object type: object + sharedAccessPolicyKeySecretRef: + description: The shared access policy key for the specified shared + access policy. Required when authentication_mode is set to ConnectionString. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object sharedAccessPolicyName: description: The shared access policy name for the Event Hub, Service Bus Queue, Service Bus Topic, etc. Required when authentication_mode diff --git a/package/crds/streamanalytics.azure.upbound.io_outputfunctions.yaml b/package/crds/streamanalytics.azure.upbound.io_outputfunctions.yaml index 74cde07a2..bc252cad6 100644 --- a/package/crds/streamanalytics.azure.upbound.io_outputfunctions.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_outputfunctions.yaml @@ -353,6 +353,23 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + apiKeySecretRef: + description: The API key for the Function. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object batchMaxCount: description: The maximum number of events in each batch that's sent to the function. Defaults to 100. @@ -521,6 +538,8 @@ spec: type: string type: object type: object + required: + - apiKeySecretRef type: object managementPolicies: default: diff --git a/package/crds/streamanalytics.azure.upbound.io_outputmssqls.yaml b/package/crds/streamanalytics.azure.upbound.io_outputmssqls.yaml index 037119cfa..2ba37739c 100644 --- a/package/crds/streamanalytics.azure.upbound.io_outputmssqls.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_outputmssqls.yaml @@ -469,6 +469,25 @@ spec: description: The name of the Stream Output. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: Password used together with username, to login to + the Microsoft SQL Server. Required if authentication_mode is + ConnectionString. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object resourceGroupName: description: The name of the Resource Group where the Stream Analytics Job exists. Changing this forces a new resource to be created. diff --git a/package/crds/streamanalytics.azure.upbound.io_outputservicebusqueues.yaml b/package/crds/streamanalytics.azure.upbound.io_outputservicebusqueues.yaml index 65fd674af..2c2dd92eb 100644 --- a/package/crds/streamanalytics.azure.upbound.io_outputservicebusqueues.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_outputservicebusqueues.yaml @@ -1885,6 +1885,24 @@ spec: type: string type: object type: object + sharedAccessPolicyKeySecretRef: + description: The shared access policy key for the specified shared + access policy. Required if authentication_mode is ConnectionString. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object sharedAccessPolicyName: description: The shared access policy name for the Event Hub, Service Bus Queue, Service Bus Topic, etc. Required if authentication_mode diff --git a/package/crds/streamanalytics.azure.upbound.io_outputservicebustopics.yaml b/package/crds/streamanalytics.azure.upbound.io_outputservicebustopics.yaml index 8d3b523ff..f2a571ed1 100644 --- a/package/crds/streamanalytics.azure.upbound.io_outputservicebustopics.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_outputservicebustopics.yaml @@ -1808,6 +1808,24 @@ spec: type: string type: object type: object + sharedAccessPolicyKeySecretRef: + description: The shared access policy key for the specified shared + access policy. Required if authentication_mode is ConnectionString. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object sharedAccessPolicyName: description: The shared access policy name for the Event Hub, Service Bus Queue, Service Bus Topic, etc. Required if authentication_mode diff --git a/package/crds/streamanalytics.azure.upbound.io_outputsynapses.yaml b/package/crds/streamanalytics.azure.upbound.io_outputsynapses.yaml index 11d6cdd67..38de9aca8 100644 --- a/package/crds/streamanalytics.azure.upbound.io_outputsynapses.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_outputsynapses.yaml @@ -360,6 +360,24 @@ spec: description: The name of the Azure SQL database. Changing this forces a new resource to be created. type: string + passwordSecretRef: + description: The password that will be used to connect to the + Azure SQL database. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object server: description: The name of the SQL server containing the Azure SQL database. Changing this forces a new resource to be created. @@ -447,6 +465,8 @@ spec: type: string type: object type: object + required: + - passwordSecretRef type: object managementPolicies: default: diff --git a/package/crds/streamanalytics.azure.upbound.io_outputtables.yaml b/package/crds/streamanalytics.azure.upbound.io_outputtables.yaml index b6c492df2..6f2895426 100644 --- a/package/crds/streamanalytics.azure.upbound.io_outputtables.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_outputtables.yaml @@ -382,6 +382,24 @@ spec: description: The name of the output column that contains the row key. type: string + storageAccountKeySecretRef: + description: The Access Key which should be used to connect to + this Storage Account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountName: description: The name of the Storage Account. type: string @@ -537,6 +555,8 @@ spec: type: string type: object type: object + required: + - storageAccountKeySecretRef type: object managementPolicies: default: diff --git a/package/crds/streamanalytics.azure.upbound.io_referenceinputblobs.yaml b/package/crds/streamanalytics.azure.upbound.io_referenceinputblobs.yaml index 1e34b29a5..2026e1112 100644 --- a/package/crds/streamanalytics.azure.upbound.io_referenceinputblobs.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_referenceinputblobs.yaml @@ -1698,6 +1698,24 @@ spec: data. Possible values are Avro, Csv and Json. type: string type: object + storageAccountKeySecretRef: + description: The Access Key which should be used to connect to + this Storage Account. Required if authentication_mode is ConnectionString. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountName: description: The name of the Storage Account that has the blob container with reference data. diff --git a/package/crds/streamanalytics.azure.upbound.io_referenceinputmssqls.yaml b/package/crds/streamanalytics.azure.upbound.io_referenceinputmssqls.yaml index 5a48ac894..cc018820d 100644 --- a/package/crds/streamanalytics.azure.upbound.io_referenceinputmssqls.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_referenceinputmssqls.yaml @@ -459,6 +459,23 @@ spec: description: The query used to retrieve the reference data from the MS SQL database. type: string + passwordSecretRef: + description: The password to connect to the MS SQL database. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object refreshIntervalDuration: description: The frequency in hh:mm:ss with which the reference data should be retrieved from the MS SQL database e.g. 00:20:00 @@ -553,6 +570,8 @@ spec: username: description: The username to connect to the MS SQL database. type: string + required: + - passwordSecretRef type: object managementPolicies: default: diff --git a/package/crds/streamanalytics.azure.upbound.io_streaminputblobs.yaml b/package/crds/streamanalytics.azure.upbound.io_streaminputblobs.yaml index 64119a8a7..4feec53e7 100644 --- a/package/crds/streamanalytics.azure.upbound.io_streaminputblobs.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_streaminputblobs.yaml @@ -1672,6 +1672,24 @@ spec: streams. Possible values are Avro, Csv and Json. type: string type: object + storageAccountKeySecretRef: + description: The Access Key which should be used to connect to + this Storage Account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountName: description: The name of the Storage Account. type: string @@ -1910,6 +1928,8 @@ spec: description: The time format. Wherever {time} appears in path_pattern, the value of this property is used as the time format instead. type: string + required: + - storageAccountKeySecretRef type: object managementPolicies: default: diff --git a/package/crds/streamanalytics.azure.upbound.io_streaminputeventhubs.yaml b/package/crds/streamanalytics.azure.upbound.io_streaminputeventhubs.yaml index 7fd3700e8..1a5da20da 100644 --- a/package/crds/streamanalytics.azure.upbound.io_streaminputeventhubs.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_streaminputeventhubs.yaml @@ -2153,6 +2153,24 @@ spec: type: string type: object type: object + sharedAccessPolicyKeySecretRef: + description: The shared access policy key for the specified shared + access policy. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object sharedAccessPolicyName: description: The shared access policy name for the Event Hub, Service Bus Queue, Service Bus Topic, etc. diff --git a/package/crds/streamanalytics.azure.upbound.io_streaminputiothubs.yaml b/package/crds/streamanalytics.azure.upbound.io_streaminputiothubs.yaml index efd199407..3d5a50748 100644 --- a/package/crds/streamanalytics.azure.upbound.io_streaminputiothubs.yaml +++ b/package/crds/streamanalytics.azure.upbound.io_streaminputiothubs.yaml @@ -1816,6 +1816,24 @@ spec: streams. Possible values are Avro, Csv and Json. type: string type: object + sharedAccessPolicyKeySecretRef: + description: The shared access policy key for the specified shared + access policy. Changing this forces a new resource to be created. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object sharedAccessPolicyName: description: The shared access policy name for the Event Hub, Service Bus Queue, Service Bus Topic, etc. @@ -1900,6 +1918,8 @@ spec: type: string type: object type: object + required: + - sharedAccessPolicyKeySecretRef type: object managementPolicies: default: diff --git a/package/crds/synapse.azure.upbound.io_sqlpoolextendedauditingpolicies.yaml b/package/crds/synapse.azure.upbound.io_sqlpoolextendedauditingpolicies.yaml index 8b122d859..b88600a55 100644 --- a/package/crds/synapse.azure.upbound.io_sqlpoolextendedauditingpolicies.yaml +++ b/package/crds/synapse.azure.upbound.io_sqlpoolextendedauditingpolicies.yaml @@ -287,6 +287,23 @@ spec: description: Is storage_account_access_key value the storage's secondary key? type: boolean + storageAccountAccessKeySecretRef: + description: The access key to use for the auditing storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageEndpoint: description: The blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all extended auditing logs. diff --git a/package/crds/synapse.azure.upbound.io_sqlpoolsecurityalertpolicies.yaml b/package/crds/synapse.azure.upbound.io_sqlpoolsecurityalertpolicies.yaml index 2da3c6fdf..a97ffc116 100644 --- a/package/crds/synapse.azure.upbound.io_sqlpoolsecurityalertpolicies.yaml +++ b/package/crds/synapse.azure.upbound.io_sqlpoolsecurityalertpolicies.yaml @@ -320,6 +320,24 @@ spec: description: Specifies the number of days to keep in the Threat Detection audit logs. Defaults to 0. type: number + storageAccountAccessKeySecretRef: + description: Specifies the identifier key of the Threat Detection + audit storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageEndpoint: description: Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. diff --git a/package/crds/synapse.azure.upbound.io_workspaceextendedauditingpolicies.yaml b/package/crds/synapse.azure.upbound.io_workspaceextendedauditingpolicies.yaml index 7cc46b659..c106f19cd 100644 --- a/package/crds/synapse.azure.upbound.io_workspaceextendedauditingpolicies.yaml +++ b/package/crds/synapse.azure.upbound.io_workspaceextendedauditingpolicies.yaml @@ -287,6 +287,23 @@ spec: description: Is storage_account_access_key value the storage's secondary key? type: boolean + storageAccountAccessKeySecretRef: + description: The access key to use for the auditing storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageEndpoint: description: The blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all extended auditing logs. diff --git a/package/crds/synapse.azure.upbound.io_workspaces.yaml b/package/crds/synapse.azure.upbound.io_workspaces.yaml index 0e5ac45eb..8db224e25 100644 --- a/package/crds/synapse.azure.upbound.io_workspaces.yaml +++ b/package/crds/synapse.azure.upbound.io_workspaces.yaml @@ -2654,6 +2654,25 @@ spec: Changing this forces a new resource to be created. If this is not provided aad_admin or customer_managed_key must be provided. type: string + sqlAdministratorLoginPasswordSecretRef: + description: The Password associated with the sql_administrator_login + for the SQL administrator. If this is not provided aad_admin + or customer_managed_key must be provided. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object sqlIdentityControlEnabled: description: Are pipelines (running as workspace's system assigned identity) allowed to access SQL pools? diff --git a/package/crds/synapse.azure.upbound.io_workspacesecurityalertpolicies.yaml b/package/crds/synapse.azure.upbound.io_workspacesecurityalertpolicies.yaml index 19338686a..a8eb83ee9 100644 --- a/package/crds/synapse.azure.upbound.io_workspacesecurityalertpolicies.yaml +++ b/package/crds/synapse.azure.upbound.io_workspacesecurityalertpolicies.yaml @@ -320,6 +320,24 @@ spec: description: Specifies the number of days to keep in the Threat Detection audit logs. Defaults to 0. type: number + storageAccountAccessKeySecretRef: + description: Specifies the identifier key of the Threat Detection + audit storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageEndpoint: description: Specifies the blob storage endpoint (e.g. https://example.blob.core.windows.net). This blob storage will hold all Threat Detection audit logs. diff --git a/package/crds/synapse.azure.upbound.io_workspacevulnerabilityassessments.yaml b/package/crds/synapse.azure.upbound.io_workspacevulnerabilityassessments.yaml index 097aed0d5..18b78f1fb 100644 --- a/package/crds/synapse.azure.upbound.io_workspacevulnerabilityassessments.yaml +++ b/package/crds/synapse.azure.upbound.io_workspacevulnerabilityassessments.yaml @@ -846,10 +846,49 @@ spec: is enabled or disabled. Defaults to false. type: boolean type: object + storageAccountAccessKeySecretRef: + description: Specifies the identifier key of the storage account + for vulnerability assessment scan results. If storage_container_sas_key + isn't specified, storage_account_access_key is required. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageContainerPath: description: A blob storage container path to hold the scan results (e.g. https://example.blob.core.windows.net/VaScans/). type: string + storageContainerSasKeySecretRef: + description: A shared access signature (SAS Key) that has write + access to the blob container specified in storage_container_path + parameter. If storage_account_access_key isn't specified, storage_container_sas_key + is required. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object workspaceSecurityAlertPolicyId: description: The ID of the security alert policy of the Synapse Workspace. Changing this forces a new resource to be created. diff --git a/package/crds/timeseriesinsights.azure.upbound.io_eventsourceeventhubs.yaml b/package/crds/timeseriesinsights.azure.upbound.io_eventsourceeventhubs.yaml index dba3c1444..7cf78edf4 100644 --- a/package/crds/timeseriesinsights.azure.upbound.io_eventsourceeventhubs.yaml +++ b/package/crds/timeseriesinsights.azure.upbound.io_eventsourceeventhubs.yaml @@ -996,6 +996,25 @@ spec: type: string type: object type: object + sharedAccessKeySecretRef: + description: Specifies the value of the Shared Access Policy key + that grants the Time Series Insights service read access to + the EventHub. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object tags: additionalProperties: type: string @@ -1007,6 +1026,8 @@ spec: source's timestamp. This value defaults to the event creation time. type: string + required: + - sharedAccessKeySecretRef type: object managementPolicies: default: diff --git a/package/crds/timeseriesinsights.azure.upbound.io_eventsourceiothubs.yaml b/package/crds/timeseriesinsights.azure.upbound.io_eventsourceiothubs.yaml index 32a585cd1..c3be7a691 100644 --- a/package/crds/timeseriesinsights.azure.upbound.io_eventsourceiothubs.yaml +++ b/package/crds/timeseriesinsights.azure.upbound.io_eventsourceiothubs.yaml @@ -686,6 +686,25 @@ spec: description: Specifies the name of the Shared Access key that grants the Event Source access to the IotHub. type: string + sharedAccessKeySecretRef: + description: Specifies the value of the Shared Access Policy key + that grants the Time Series Insights service read access to + the IotHub. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object tags: additionalProperties: type: string @@ -697,6 +716,8 @@ spec: source's timestamp. This value defaults to the event creation time. type: string + required: + - sharedAccessKeySecretRef type: object managementPolicies: default: diff --git a/package/crds/timeseriesinsights.azure.upbound.io_gen2environments.yaml b/package/crds/timeseriesinsights.azure.upbound.io_gen2environments.yaml index d3338f34d..029fa64c9 100644 --- a/package/crds/timeseriesinsights.azure.upbound.io_gen2environments.yaml +++ b/package/crds/timeseriesinsights.azure.upbound.io_gen2environments.yaml @@ -975,8 +975,6 @@ spec: type: string type: object type: object - required: - - keySecretRef type: object tags: additionalProperties: @@ -1023,6 +1021,24 @@ spec: storage: description: A storage block as defined below. properties: + keySecretRef: + description: Access key of storage account for Azure IoT Time + Series Insights Gen2 Environment + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object name: description: Name of storage account for Azure IoT Time Series Insights Gen2 Environment. Changing this forces a new resource @@ -1104,6 +1120,8 @@ spec: type: string type: object type: object + required: + - keySecretRef type: object tags: additionalProperties: diff --git a/package/crds/web.azure.upbound.io_functionapps.yaml b/package/crds/web.azure.upbound.io_functionapps.yaml index b48274581..d127c65e9 100644 --- a/package/crds/web.azure.upbound.io_functionapps.yaml +++ b/package/crds/web.azure.upbound.io_functionapps.yaml @@ -2990,8 +2990,6 @@ spec: items: type: string type: array - required: - - appSecretSecretRef type: object google: description: A google block as defined below. @@ -3024,8 +3022,6 @@ spec: items: type: string type: array - required: - - clientSecretSecretRef type: object issuer: description: Issuer URI. When using Azure Active Directory, @@ -3062,8 +3058,6 @@ spec: items: type: string type: array - required: - - clientSecretSecretRef type: object runtimeVersion: description: The runtime version of the Authentication/Authorization @@ -3104,8 +3098,6 @@ spec: - name - namespace type: object - required: - - consumerSecretSecretRef type: object unauthenticatedClientAction: description: The action to take when an unauthenticated client @@ -3147,8 +3139,6 @@ spec: - name - namespace type: object - required: - - valueSecretRef type: object type: array dailyMemoryTimeQuota: @@ -3914,6 +3904,24 @@ spec: description: The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: The OAuth 2.0 client secret that was created + for the app used for authentication. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object additionalLoginParams: additionalProperties: @@ -3943,12 +3951,32 @@ spec: appId: description: The App ID of the Facebook app used for login type: string + appSecretSecretRef: + description: The App Secret of the Facebook app used for + Facebook login. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object oauthScopes: description: The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx items: type: string type: array + required: + - appSecretSecretRef type: object google: description: A google block as defined below. @@ -3957,12 +3985,32 @@ spec: description: The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: The OAuth 2.0 client secret that was created + for the app used for authentication. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object oauthScopes: description: The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx items: type: string type: array + required: + - clientSecretSecretRef type: object issuer: description: Issuer URI. When using Azure Active Directory, @@ -3975,12 +4023,32 @@ spec: description: The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: The OAuth 2.0 client secret that was created + for the app used for authentication. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object oauthScopes: description: The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx items: type: string type: array + required: + - clientSecretSecretRef type: object runtimeVersion: description: The runtime version of the Authentication/Authorization @@ -4003,6 +4071,26 @@ spec: description: The OAuth 1.0a consumer key of the Twitter application used for sign-in. type: string + consumerSecretSecretRef: + description: The OAuth 1.0a consumer secret of the Twitter + application used for sign-in. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - consumerSecretSecretRef type: object unauthenticatedClientAction: description: The action to take when an unauthenticated client @@ -4027,6 +4115,25 @@ spec: values are APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure and SQLServer. type: string + valueSecretRef: + description: The value for the Connection String. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object type: array dailyMemoryTimeQuota: @@ -4568,6 +4675,24 @@ spec: description: Use Mercurial if true, otherwise uses Git. type: boolean type: object + storageAccountAccessKeySecretRef: + description: The access key which will be used to access the backend + storage account for the Function App. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountName: description: The backend storage account name which will be used by this Function App (such as the dashboard, logs). Changing @@ -4657,6 +4782,8 @@ spec: description: The runtime version associated with the Function App. Defaults to ~1. type: string + required: + - storageAccountAccessKeySecretRef type: object managementPolicies: default: diff --git a/package/crds/web.azure.upbound.io_functionappslots.yaml b/package/crds/web.azure.upbound.io_functionappslots.yaml index b8237a0cb..4c35b93fe 100644 --- a/package/crds/web.azure.upbound.io_functionappslots.yaml +++ b/package/crds/web.azure.upbound.io_functionappslots.yaml @@ -2857,8 +2857,6 @@ spec: items: type: string type: array - required: - - appSecretSecretRef type: object google: description: A google block as defined below. @@ -2891,8 +2889,6 @@ spec: items: type: string type: array - required: - - clientSecretSecretRef type: object issuer: description: Issuer URI. When using Azure Active Directory, @@ -2929,8 +2925,6 @@ spec: items: type: string type: array - required: - - clientSecretSecretRef type: object runtimeVersion: description: The runtime version of the Authentication/Authorization @@ -2971,8 +2965,6 @@ spec: - name - namespace type: object - required: - - consumerSecretSecretRef type: object unauthenticatedClientAction: description: The action to take when an unauthenticated client @@ -3009,8 +3001,6 @@ spec: - name - namespace type: object - required: - - valueSecretRef type: object type: array dailyMemoryTimeQuota: @@ -3818,6 +3808,24 @@ spec: description: The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: The OAuth 2.0 client secret that was created + for the app used for authentication. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object additionalLoginParams: additionalProperties: @@ -3847,12 +3855,32 @@ spec: appId: description: The App ID of the Facebook app used for login type: string + appSecretSecretRef: + description: The App Secret of the Facebook app used for + Facebook login. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object oauthScopes: description: The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx items: type: string type: array + required: + - appSecretSecretRef type: object google: description: A google block as defined below. @@ -3861,12 +3889,32 @@ spec: description: The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: The OAuth 2.0 client secret that was created + for the app used for authentication. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object oauthScopes: description: The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx items: type: string type: array + required: + - clientSecretSecretRef type: object issuer: description: Issuer URI. When using Azure Active Directory, @@ -3879,12 +3927,32 @@ spec: description: The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: The OAuth 2.0 client secret that was created + for the app used for authentication. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object oauthScopes: description: The OAuth 2.0 scopes that will be requested as part of Microsoft Account authentication. https://msdn.microsoft.com/en-us/library/dn631845.aspx items: type: string type: array + required: + - clientSecretSecretRef type: object runtimeVersion: description: The runtime version of the Authentication/Authorization @@ -3907,6 +3975,26 @@ spec: description: The OAuth 1.0a consumer key of the Twitter application used for sign-in. type: string + consumerSecretSecretRef: + description: The OAuth 1.0a consumer secret of the Twitter + application used for sign-in. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - consumerSecretSecretRef type: object unauthenticatedClientAction: description: The action to take when an unauthenticated client @@ -3926,6 +4014,25 @@ spec: values are APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure and SQLServer. type: string + valueSecretRef: + description: The value for the Connection String. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object type: array dailyMemoryTimeQuota: @@ -4349,6 +4456,24 @@ spec: description: Should WebSockets be enabled? type: boolean type: object + storageAccountAccessKeySecretRef: + description: The access key which will be used to access the backend + storage account for the Function App. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountName: description: The backend storage account name which will be used by the Function App (such as the dashboard, logs). Changing @@ -4438,6 +4563,8 @@ spec: description: The runtime version associated with the Function App. Defaults to ~1. type: string + required: + - storageAccountAccessKeySecretRef type: object managementPolicies: default: diff --git a/package/crds/web.azure.upbound.io_linuxfunctionapps.yaml b/package/crds/web.azure.upbound.io_linuxfunctionapps.yaml index e75895962..9f69851dc 100644 --- a/package/crds/web.azure.upbound.io_linuxfunctionapps.yaml +++ b/package/crds/web.azure.upbound.io_linuxfunctionapps.yaml @@ -6073,8 +6073,6 @@ spec: - name - namespace type: object - required: - - storageAccountUrlSecretRef type: object builtinLoggingEnabled: description: |- @@ -6129,8 +6127,6 @@ spec: - name - namespace type: object - required: - - valueSecretRef type: object type: array contentShareForceDisabled: @@ -7024,8 +7020,6 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob. type: string - required: - - accessKeySecretRef type: object type: array storageAccountAccessKeySecretRef: @@ -7270,6 +7264,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the Client to use to authenticate with Azure Active Directory. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7309,6 +7322,25 @@ spec: The App ID of the Facebook app used for login. The App ID of the Facebook app used for login. type: string + appSecretSecretRef: + description: |- + The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object appSecretSettingName: description: |- The app setting name that contains the app_secret value used for Facebook Login. @@ -7330,6 +7362,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the GitHub app used for login. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7351,6 +7402,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OpenID Connect Client ID for the Google web application. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7377,6 +7447,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7413,6 +7502,25 @@ spec: The OAuth 1.0a consumer key of the Twitter application used for sign-in. The OAuth 1.0a consumer key of the Twitter application used for sign-in. type: string + consumerSecretSecretRef: + description: |- + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object consumerSecretSettingName: description: |- The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. @@ -7847,6 +7955,27 @@ spec: When the schedule should start working in RFC-3339 format. type: string type: object + storageAccountUrlSecretRef: + description: |- + The SAS URL to the container. + The SAS URL to the container. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - storageAccountUrlSecretRef type: object builtinLoggingEnabled: description: |- @@ -7882,6 +8011,27 @@ spec: Type of database. Possible values include: MySQL, SQLServer, SQLAzure, Custom, NotificationHub, ServiceBus, EventHub, APIHub, DocDb, RedisCache, and PostgreSQL. Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. type: string + valueSecretRef: + description: |- + The connection string value. + The connection string value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object type: array contentShareForceDisabled: @@ -8150,6 +8300,44 @@ spec: The retention period for logs in days. Valid values are between `0` and `99999`. Defaults to `0` (never delete). type: number type: object + applicationInsightsConnectionStringSecretRef: + description: |- + The Connection String for linking the Linux Function App to Application Insights. + The Connection String for linking the Linux Function App to Application Insights. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + applicationInsightsKeySecretRef: + description: |- + The Instrumentation Key for connecting the Linux Function App to Application Insights. + The Instrumentation Key for connecting the Linux Function App to Application Insights. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object applicationStack: description: An application_stack block as defined above. properties: @@ -8169,11 +8357,49 @@ spec: The image tag of the image to use. The image tag of the image to use. type: string + registryPasswordSecretRef: + description: |- + The password for the account to use to connect to the registry. + The password for the account to use to connect to the registry. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object registryUrl: description: |- The URL of the docker registry. The URL of the docker registry. type: string + registryUsernameSecretRef: + description: |- + The username to use for connections to the registry. + The username to use for connections to the registry. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object type: array dotnetVersion: @@ -8664,6 +8890,23 @@ spec: description: One or more storage_account blocks as defined below. items: properties: + accessKeySecretRef: + description: The Access key for the storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object accountName: description: The Name of the Storage Account. type: string @@ -8682,8 +8925,29 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob. type: string + required: + - accessKeySecretRef type: object type: array + storageAccountAccessKeySecretRef: + description: |- + The access key which will be used to access the backend storage account for the Function App. Conflicts with storage_uses_managed_identity. + The access key which will be used to access the storage account for the Function App. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountName: description: |- The backend storage account name which will be used by this Function App. diff --git a/package/crds/web.azure.upbound.io_linuxfunctionappslots.yaml b/package/crds/web.azure.upbound.io_linuxfunctionappslots.yaml index 77f0a66ad..de7e2c3ec 100644 --- a/package/crds/web.azure.upbound.io_linuxfunctionappslots.yaml +++ b/package/crds/web.azure.upbound.io_linuxfunctionappslots.yaml @@ -5748,8 +5748,6 @@ spec: - name - namespace type: object - required: - - storageAccountUrlSecretRef type: object builtinLoggingEnabled: description: |- @@ -5804,8 +5802,6 @@ spec: - name - namespace type: object - required: - - valueSecretRef type: object type: array contentShareForceDisabled: @@ -6600,8 +6596,6 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob. type: string - required: - - accessKeySecretRef type: object type: array storageAccountAccessKeySecretRef: @@ -6841,6 +6835,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the Client to use to authenticate with Azure Active Directory. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -6880,6 +6893,25 @@ spec: The App ID of the Facebook app used for login. The App ID of the Facebook app used for login. type: string + appSecretSecretRef: + description: |- + The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object appSecretSettingName: description: |- The app setting name that contains the app_secret value used for Facebook Login. @@ -6901,6 +6933,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the GitHub app used for login. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -6922,6 +6973,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OpenID Connect Client ID for the Google web application. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -6948,6 +7018,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -6984,6 +7073,25 @@ spec: The OAuth 1.0a consumer key of the Twitter application used for sign-in. The OAuth 1.0a consumer key of the Twitter application used for sign-in. type: string + consumerSecretSecretRef: + description: |- + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object consumerSecretSettingName: description: |- The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. @@ -7418,6 +7526,27 @@ spec: When the schedule should start working in RFC-3339 format. type: string type: object + storageAccountUrlSecretRef: + description: |- + The SAS URL to the container. + The SAS URL to the container. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - storageAccountUrlSecretRef type: object builtinLoggingEnabled: description: |- @@ -7453,6 +7582,27 @@ spec: Type of database. Possible values include: APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. type: string + valueSecretRef: + description: |- + The connection string value. + The connection string value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object type: array contentShareForceDisabled: @@ -7557,6 +7707,44 @@ spec: The retention period for logs in days. Valid values are between `0` and `99999`. Defaults to `0` (never delete). type: number type: object + applicationInsightsConnectionStringSecretRef: + description: |- + The Connection String for linking the Linux Function App to Application Insights. + The Connection String for linking the Linux Function App to Application Insights. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + applicationInsightsKeySecretRef: + description: |- + The Instrumentation Key for connecting the Linux Function App to Application Insights. + The Instrumentation Key for connecting the Linux Function App to Application Insights. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object applicationStack: description: an application_stack block as detailed below. properties: @@ -7576,11 +7764,49 @@ spec: The image tag of the image to use. The image tag of the image to use. type: string + registryPasswordSecretRef: + description: |- + The password for the account to use to connect to the registry. + The password for the account to use to connect to the registry. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object registryUrl: description: |- The URL of the docker registry. The URL of the docker registry. type: string + registryUsernameSecretRef: + description: |- + The username to use for connections to the registry. + The username to use for connections to the registry. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: object type: array dotnetVersion: @@ -8055,6 +8281,23 @@ spec: description: One or more storage_account blocks as defined below. items: properties: + accessKeySecretRef: + description: The Access key for the storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object accountName: description: The Name of the Storage Account. type: string @@ -8073,8 +8316,29 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob. type: string + required: + - accessKeySecretRef type: object type: array + storageAccountAccessKeySecretRef: + description: |- + The access key which will be used to access the storage account for the Function App Slot. + The access key which will be used to access the storage account for the Function App Slot. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountName: description: |- The backend storage account name which will be used by this Function App Slot. diff --git a/package/crds/web.azure.upbound.io_linuxwebapps.yaml b/package/crds/web.azure.upbound.io_linuxwebapps.yaml index c5348b77f..3ad4ef4f1 100644 --- a/package/crds/web.azure.upbound.io_linuxwebapps.yaml +++ b/package/crds/web.azure.upbound.io_linuxwebapps.yaml @@ -6034,8 +6034,6 @@ spec: - name - namespace type: object - required: - - storageAccountUrlSecretRef type: object clientAffinityEnabled: description: Should Client Affinity be enabled? @@ -6087,8 +6085,6 @@ spec: - name - namespace type: object - required: - - valueSecretRef type: object type: array enabled: @@ -6194,8 +6190,6 @@ spec: - name - namespace type: object - required: - - sasurlSecretRef type: object fileSystem: description: A file_system block as defined above. @@ -7022,8 +7016,6 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob type: string - required: - - accessKeySecretRef type: object type: array tags: @@ -7158,6 +7150,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the Client to use to authenticate with Azure Active Directory. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7197,6 +7208,25 @@ spec: The App ID of the Facebook app used for login. The App ID of the Facebook app used for login. type: string + appSecretSecretRef: + description: |- + The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object appSecretSettingName: description: |- The app setting name that contains the app_secret value used for Facebook Login. @@ -7218,6 +7248,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the GitHub app used for login. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7239,6 +7288,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OpenID Connect Client ID for the Google web application. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7265,6 +7333,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7301,6 +7388,25 @@ spec: The OAuth 1.0a consumer key of the Twitter application used for sign-in. The OAuth 1.0a consumer key of the Twitter application used for sign-in. type: string + consumerSecretSecretRef: + description: |- + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object consumerSecretSettingName: description: |- The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. @@ -7735,6 +7841,27 @@ spec: When the schedule should start working in RFC-3339 format. type: string type: object + storageAccountUrlSecretRef: + description: |- + The SAS URL to the container. + The SAS URL to the container. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - storageAccountUrlSecretRef type: object clientAffinityEnabled: description: Should Client Affinity be enabled? @@ -7767,6 +7894,27 @@ spec: Type of database. Possible values include: MySQL, SQLServer, SQLAzure, Custom, NotificationHub, ServiceBus, EventHub, APIHub, DocDb, RedisCache, and PostgreSQL. Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. type: string + valueSecretRef: + description: |- + The connection string value. + The connection string value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object type: array enabled: @@ -7854,6 +8002,26 @@ spec: description: The retention period in days. A value of 0 means no retention. type: number + sasurlSecretRef: + description: SAS url to an Azure blob container with + read/write/list/delete permissions. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - sasurlSecretRef type: object fileSystem: description: A file_system block as defined above. @@ -7980,6 +8148,24 @@ spec: type: string dockerImageTag: type: string + dockerRegistryPasswordSecretRef: + description: The User Name to use for authentication against + the registry to pull the image. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object dockerRegistryUrl: description: The URL of the container registry where the docker_image_name is located. e.g. https://index.docker.io @@ -8546,6 +8732,23 @@ spec: description: One or more storage_account blocks as defined below. items: properties: + accessKeySecretRef: + description: The Access key for the storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object accountName: description: The Name of the Storage Account. type: string @@ -8564,6 +8767,8 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob type: string + required: + - accessKeySecretRef type: object type: array tags: diff --git a/package/crds/web.azure.upbound.io_linuxwebappslots.yaml b/package/crds/web.azure.upbound.io_linuxwebappslots.yaml index 47a6ba7d9..6e24fe613 100644 --- a/package/crds/web.azure.upbound.io_linuxwebappslots.yaml +++ b/package/crds/web.azure.upbound.io_linuxwebappslots.yaml @@ -6005,8 +6005,6 @@ spec: - name - namespace type: object - required: - - storageAccountUrlSecretRef type: object clientAffinityEnabled: description: Should Client Affinity be enabled? @@ -6058,8 +6056,6 @@ spec: - name - namespace type: object - required: - - valueSecretRef type: object type: array enabled: @@ -6161,8 +6157,6 @@ spec: - name - namespace type: object - required: - - sasurlSecretRef type: object fileSystem: description: A file_system block as defined above. @@ -6827,8 +6821,6 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob type: string - required: - - accessKeySecretRef type: object type: array tags: @@ -7041,6 +7033,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the Client to use to authenticate with Azure Active Directory. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7080,6 +7091,25 @@ spec: The App ID of the Facebook app used for login. The App ID of the Facebook app used for login. type: string + appSecretSecretRef: + description: |- + The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object appSecretSettingName: description: |- The app setting name that contains the app_secret value used for Facebook Login. @@ -7101,6 +7131,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the GitHub app used for login. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7122,6 +7171,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OpenID Connect Client ID for the Google web application. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7148,6 +7216,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7184,6 +7271,25 @@ spec: The OAuth 1.0a consumer key of the Twitter application used for sign-in. The OAuth 1.0a consumer key of the Twitter application used for sign-in. type: string + consumerSecretSecretRef: + description: |- + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object consumerSecretSettingName: description: |- The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. @@ -7618,6 +7724,27 @@ spec: When the schedule should start working in RFC-3339 format. type: string type: object + storageAccountUrlSecretRef: + description: |- + The SAS URL to the container. + The SAS URL to the container. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - storageAccountUrlSecretRef type: object clientAffinityEnabled: description: Should Client Affinity be enabled? @@ -7650,6 +7777,27 @@ spec: Type of database. Possible values include APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. type: string + valueSecretRef: + description: |- + The connection string value. + The connection string value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object type: array enabled: @@ -7733,6 +7881,26 @@ spec: description: The retention period in days. A values of 0 means no retention. type: number + sasurlSecretRef: + description: SAS url to an Azure blob container with + read/write/list/delete permissions. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - sasurlSecretRef type: object fileSystem: description: A file_system block as defined above. @@ -7791,6 +7959,24 @@ spec: type: string dockerImageTag: type: string + dockerRegistryPasswordSecretRef: + description: The User Name to use for authentication against + the registry to pull the image. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object dockerRegistryUrl: description: The URL of the container registry where the docker_image_name is located. e.g. https://index.docker.io @@ -8344,6 +8530,23 @@ spec: description: One or more storage_account blocks as defined below. items: properties: + accessKeySecretRef: + description: The Access key for the storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object accountName: description: The Name of the Storage Account. type: string @@ -8362,6 +8565,8 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob type: string + required: + - accessKeySecretRef type: object type: array tags: diff --git a/package/crds/web.azure.upbound.io_sourcecontroltokens.yaml b/package/crds/web.azure.upbound.io_sourcecontroltokens.yaml index 1cf31b47c..0056300c3 100644 --- a/package/crds/web.azure.upbound.io_sourcecontroltokens.yaml +++ b/package/crds/web.azure.upbound.io_sourcecontroltokens.yaml @@ -125,10 +125,46 @@ spec: for example because of an external controller is managing them, like an autoscaler. properties: + tokenSecretRef: + description: The Access Token. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + tokenSecretSecretRef: + description: The Access Token Secret. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object type: description: The Token type. Possible values include Bitbucket, Dropbox, Github, and OneDrive. type: string + required: + - tokenSecretRef type: object managementPolicies: default: diff --git a/package/crds/web.azure.upbound.io_windowsfunctionapps.yaml b/package/crds/web.azure.upbound.io_windowsfunctionapps.yaml index 865ab8fe2..960894736 100644 --- a/package/crds/web.azure.upbound.io_windowsfunctionapps.yaml +++ b/package/crds/web.azure.upbound.io_windowsfunctionapps.yaml @@ -5828,8 +5828,6 @@ spec: - name - namespace type: object - required: - - storageAccountUrlSecretRef type: object builtinLoggingEnabled: description: |- @@ -5884,8 +5882,6 @@ spec: - name - namespace type: object - required: - - valueSecretRef type: object type: array contentShareForceDisabled: @@ -6700,8 +6696,6 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles. type: string - required: - - accessKeySecretRef type: object type: array storageAccountAccessKeySecretRef: @@ -6946,6 +6940,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the Client to use to authenticate with Azure Active Directory. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -6985,6 +6998,25 @@ spec: The App ID of the Facebook app used for login. The App ID of the Facebook app used for login. type: string + appSecretSecretRef: + description: |- + The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object appSecretSettingName: description: |- The app setting name that contains the app_secret value used for Facebook Login. @@ -7006,6 +7038,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the GitHub app used for login. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7027,6 +7078,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OpenID Connect Client ID for the Google web application. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7053,6 +7123,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7089,6 +7178,25 @@ spec: The OAuth 1.0a consumer key of the Twitter application used for sign-in. The OAuth 1.0a consumer key of the Twitter application used for sign-in. type: string + consumerSecretSecretRef: + description: |- + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object consumerSecretSettingName: description: |- The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. @@ -7523,6 +7631,27 @@ spec: When the schedule should start working in RFC-3339 format. type: string type: object + storageAccountUrlSecretRef: + description: |- + The SAS URL to the container. + The SAS URL to the container. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - storageAccountUrlSecretRef type: object builtinLoggingEnabled: description: |- @@ -7558,6 +7687,27 @@ spec: Type of database. Possible values include: APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. type: string + valueSecretRef: + description: |- + The connection string value. + The connection string value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object type: array contentShareForceDisabled: @@ -7741,6 +7891,44 @@ spec: The retention period for logs in days. Valid values are between `0` and `99999`. Defaults to `0` (never delete). type: number type: object + applicationInsightsConnectionStringSecretRef: + description: |- + The Connection String for linking the Windows Function App to Application Insights. + The Connection String for linking the Windows Function App to Application Insights. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + applicationInsightsKeySecretRef: + description: |- + The Instrumentation Key for connecting the Windows Function App to Application Insights. + The Instrumentation Key for connecting the Windows Function App to Application Insights. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object applicationStack: description: An application_stack block as defined above. properties: @@ -8218,6 +8406,23 @@ spec: description: One or more storage_account blocks as defined below. items: properties: + accessKeySecretRef: + description: The Access key for the storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object accountName: description: The Name of the Storage Account. type: string @@ -8236,8 +8441,29 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles. type: string + required: + - accessKeySecretRef type: object type: array + storageAccountAccessKeySecretRef: + description: |- + The access key which will be used to access the backend storage account for the Function App. Conflicts with storage_uses_managed_identity. + The access key which will be used to access the storage account for the Function App. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountName: description: |- The backend storage account name which will be used by this Function App. diff --git a/package/crds/web.azure.upbound.io_windowsfunctionappslots.yaml b/package/crds/web.azure.upbound.io_windowsfunctionappslots.yaml index 498cc9918..73121848a 100644 --- a/package/crds/web.azure.upbound.io_windowsfunctionappslots.yaml +++ b/package/crds/web.azure.upbound.io_windowsfunctionappslots.yaml @@ -5604,8 +5604,6 @@ spec: - name - namespace type: object - required: - - storageAccountUrlSecretRef type: object builtinLoggingEnabled: description: |- @@ -5660,8 +5658,6 @@ spec: - name - namespace type: object - required: - - valueSecretRef type: object type: array contentShareForceDisabled: @@ -6381,8 +6377,6 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles. type: string - required: - - accessKeySecretRef type: object type: array storageAccountAccessKeySecretRef: @@ -6622,6 +6616,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the Client to use to authenticate with Azure Active Directory. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -6661,6 +6674,25 @@ spec: The App ID of the Facebook app used for login. The App ID of the Facebook app used for login. type: string + appSecretSecretRef: + description: |- + The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object appSecretSettingName: description: |- The app setting name that contains the app_secret value used for Facebook Login. @@ -6682,6 +6714,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the GitHub app used for login. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -6703,6 +6754,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OpenID Connect Client ID for the Google web application. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -6729,6 +6799,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -6765,6 +6854,25 @@ spec: The OAuth 1.0a consumer key of the Twitter application used for sign-in. The OAuth 1.0a consumer key of the Twitter application used for sign-in. type: string + consumerSecretSecretRef: + description: |- + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object consumerSecretSettingName: description: |- The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. @@ -7199,6 +7307,27 @@ spec: When the schedule should start working in RFC-3339 format. type: string type: object + storageAccountUrlSecretRef: + description: |- + The SAS URL to the container. + The SAS URL to the container. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - storageAccountUrlSecretRef type: object builtinLoggingEnabled: description: |- @@ -7234,6 +7363,27 @@ spec: Type of database. Possible values include: APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. type: string + valueSecretRef: + description: |- + The connection string value. + The connection string value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object type: array contentShareForceDisabled: @@ -7338,6 +7488,44 @@ spec: The retention period for logs in days. Valid values are between `0` and `99999`. Defaults to `0` (never delete). type: number type: object + applicationInsightsConnectionStringSecretRef: + description: |- + The Connection String for linking the Windows Function App to Application Insights. + The Connection String for linking the Windows Function App to Application Insights. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + applicationInsightsKeySecretRef: + description: |- + The Instrumentation Key for connecting the Windows Function App to Application Insights. + The Instrumentation Key for connecting the Windows Function App to Application Insights. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object applicationStack: description: an application_stack block as detailed below. properties: @@ -7799,6 +7987,23 @@ spec: description: One or more storage_account blocks as defined below. items: properties: + accessKeySecretRef: + description: The Access key for the storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object accountName: description: The Name of the Storage Account. type: string @@ -7817,8 +8022,29 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles. type: string + required: + - accessKeySecretRef type: object type: array + storageAccountAccessKeySecretRef: + description: |- + The access key which will be used to access the storage account for the Function App Slot. + The access key which will be used to access the storage account for the Function App Slot. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object storageAccountName: description: |- The backend storage account name which will be used by this Function App Slot. diff --git a/package/crds/web.azure.upbound.io_windowswebapps.yaml b/package/crds/web.azure.upbound.io_windowswebapps.yaml index a9fb9dd0c..41fd3b394 100644 --- a/package/crds/web.azure.upbound.io_windowswebapps.yaml +++ b/package/crds/web.azure.upbound.io_windowswebapps.yaml @@ -6243,8 +6243,6 @@ spec: - name - namespace type: object - required: - - storageAccountUrlSecretRef type: object clientAffinityEnabled: description: Should Client Affinity be enabled? @@ -6296,8 +6294,6 @@ spec: - name - namespace type: object - required: - - valueSecretRef type: object type: array enabled: @@ -6403,8 +6399,6 @@ spec: - name - namespace type: object - required: - - sasurlSecretRef type: object fileSystem: description: A file_system block as defined above. @@ -7294,8 +7288,6 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob type: string - required: - - accessKeySecretRef type: object type: array tags: @@ -7430,6 +7422,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the Client to use to authenticate with Azure Active Directory. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7469,6 +7480,25 @@ spec: The App ID of the Facebook app used for login. The App ID of the Facebook app used for login. type: string + appSecretSecretRef: + description: |- + The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object appSecretSettingName: description: |- The app setting name that contains the app_secret value used for Facebook Login. @@ -7490,6 +7520,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the GitHub app used for login. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7511,6 +7560,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OpenID Connect Client ID for the Google web application. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7537,6 +7605,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7573,6 +7660,25 @@ spec: The OAuth 1.0a consumer key of the Twitter application used for sign-in. The OAuth 1.0a consumer key of the Twitter application used for sign-in. type: string + consumerSecretSecretRef: + description: |- + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object consumerSecretSettingName: description: |- The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. @@ -8007,6 +8113,27 @@ spec: When the schedule should start working in RFC-3339 format. type: string type: object + storageAccountUrlSecretRef: + description: |- + The SAS URL to the container. + The SAS URL to the container. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - storageAccountUrlSecretRef type: object clientAffinityEnabled: description: Should Client Affinity be enabled? @@ -8039,6 +8166,27 @@ spec: Type of database. Possible values include: APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. type: string + valueSecretRef: + description: |- + The connection string value. + The connection string value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object type: array enabled: @@ -8126,6 +8274,26 @@ spec: description: The retention period in days. A values of 0 means no retention. type: number + sasurlSecretRef: + description: SAS url to an Azure blob container with + read/write/list/delete permissions. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - sasurlSecretRef type: object fileSystem: description: A file_system block as defined above. @@ -8263,6 +8431,24 @@ spec: description: The docker image, including tag, to be used. e.g. azure-app-service/windows/parkingpage:latest. type: string + dockerRegistryPasswordSecretRef: + description: The User Name to use for authentication against + the registry to pull the image. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object dockerRegistryUrl: description: The URL of the container registry where the docker_image_name is located. e.g. https://index.docker.io @@ -8882,6 +9068,23 @@ spec: description: One or more storage_account blocks as defined below. items: properties: + accessKeySecretRef: + description: The Access key for the storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object accountName: description: The Name of the Storage Account. type: string @@ -8899,6 +9102,8 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob type: string + required: + - accessKeySecretRef type: object type: array tags: diff --git a/package/crds/web.azure.upbound.io_windowswebappslots.yaml b/package/crds/web.azure.upbound.io_windowswebappslots.yaml index 14b19a415..59e66d354 100644 --- a/package/crds/web.azure.upbound.io_windowswebappslots.yaml +++ b/package/crds/web.azure.upbound.io_windowswebappslots.yaml @@ -6115,8 +6115,6 @@ spec: - name - namespace type: object - required: - - storageAccountUrlSecretRef type: object clientAffinityEnabled: description: Should Client Affinity be enabled? @@ -6168,8 +6166,6 @@ spec: - name - namespace type: object - required: - - valueSecretRef type: object type: array enabled: @@ -6271,8 +6267,6 @@ spec: - name - namespace type: object - required: - - sasurlSecretRef type: object fileSystem: description: A file_system block as defined above. @@ -6996,8 +6990,6 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob type: string - required: - - accessKeySecretRef type: object type: array tags: @@ -7132,6 +7124,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the Client to use to authenticate with Azure Active Directory. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret for the Client ID. Cannot be used with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7171,6 +7182,25 @@ spec: The App ID of the Facebook app used for login. The App ID of the Facebook app used for login. type: string + appSecretSecretRef: + description: |- + The App Secret of the Facebook app used for Facebook login. Cannot be specified with app_secret_setting_name. + The App Secret of the Facebook app used for Facebook Login. Cannot be specified with `app_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object appSecretSettingName: description: |- The app setting name that contains the app_secret value used for Facebook Login. @@ -7192,6 +7222,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The ID of the GitHub app used for login. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The Client Secret of the GitHub app used for GitHub Login. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7213,6 +7262,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OpenID Connect Client ID for the Google web application. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The client secret associated with the Google web application. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7239,6 +7307,25 @@ spec: The OAuth 2.0 client ID that was created for the app used for authentication. The OAuth 2.0 client ID that was created for the app used for authentication. type: string + clientSecretSecretRef: + description: |- + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with client_secret_setting_name. + The OAuth 2.0 client secret that was created for the app used for authentication. Cannot be specified with `client_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object clientSecretSettingName: description: |- The app setting name containing the OAuth 2.0 client secret that was created for the app used for authentication. @@ -7275,6 +7362,25 @@ spec: The OAuth 1.0a consumer key of the Twitter application used for sign-in. The OAuth 1.0a consumer key of the Twitter application used for sign-in. type: string + consumerSecretSecretRef: + description: |- + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with consumer_secret_setting_name. + The OAuth 1.0a consumer secret of the Twitter application used for sign-in. Cannot be specified with `consumer_secret_setting_name`. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object consumerSecretSettingName: description: |- The app setting name that contains the OAuth 1.0a consumer secret of the Twitter application used for sign-in. @@ -7709,6 +7815,27 @@ spec: When the schedule should start working in RFC-3339 format. type: string type: object + storageAccountUrlSecretRef: + description: |- + The SAS URL to the container. + The SAS URL to the container. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - storageAccountUrlSecretRef type: object clientAffinityEnabled: description: Should Client Affinity be enabled? @@ -7741,6 +7868,27 @@ spec: Type of database. Possible values include: APIHub, Custom, DocDb, EventHub, MySQL, NotificationHub, PostgreSQL, RedisCache, ServiceBus, SQLAzure, and SQLServer. Type of database. Possible values include: `MySQL`, `SQLServer`, `SQLAzure`, `Custom`, `NotificationHub`, `ServiceBus`, `EventHub`, `APIHub`, `DocDb`, `RedisCache`, and `PostgreSQL`. type: string + valueSecretRef: + description: |- + The connection string value. + The connection string value. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - valueSecretRef type: object type: array enabled: @@ -7824,6 +7972,26 @@ spec: description: The retention period in days. A values of 0 means no retention. type: number + sasurlSecretRef: + description: SAS url to an Azure blob container with + read/write/list/delete permissions. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object + required: + - sasurlSecretRef type: object fileSystem: description: A file_system block as defined above. @@ -7888,6 +8056,24 @@ spec: description: The docker image, including tag, to be used. e.g. azure-app-service/windows/parkingpage:latest. type: string + dockerRegistryPasswordSecretRef: + description: The User Name to use for authentication against + the registry to pull the image. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object dockerRegistryUrl: description: The URL of the container registry where the docker_image_name is located. e.g. https://index.docker.io @@ -8494,6 +8680,23 @@ spec: description: One or more storage_account blocks as defined below. items: properties: + accessKeySecretRef: + description: The Access key for the storage account. + properties: + key: + description: The key to select. + type: string + name: + description: Name of the secret. + type: string + namespace: + description: Namespace of the secret. + type: string + required: + - key + - name + - namespace + type: object accountName: description: The Name of the Storage Account. type: string @@ -8512,6 +8715,8 @@ spec: description: The Azure Storage Type. Possible values include AzureFiles and AzureBlob type: string + required: + - accessKeySecretRef type: object type: array tags: From 9ef075e7a207e3eeced211128f20efe7363f7831 Mon Sep 17 00:00:00 2001 From: Christian Artin Date: Mon, 3 Jun 2024 12:42:08 -0400 Subject: [PATCH 4/4] Fix go fmt Signed-off-by: Christian Artin --- cmd/provider/alertsmanagement/zz_main.go | 2 +- cmd/provider/analysisservices/zz_main.go | 2 +- cmd/provider/apimanagement/zz_main.go | 2 +- cmd/provider/appconfiguration/zz_main.go | 2 +- cmd/provider/appplatform/zz_main.go | 2 +- cmd/provider/attestation/zz_main.go | 2 +- cmd/provider/authorization/zz_main.go | 2 +- cmd/provider/automation/zz_main.go | 2 +- cmd/provider/azure/zz_main.go | 2 +- cmd/provider/azurestackhci/zz_main.go | 2 +- cmd/provider/botservice/zz_main.go | 2 +- cmd/provider/cache/zz_main.go | 2 +- cmd/provider/cdn/zz_main.go | 2 +- cmd/provider/certificateregistration/zz_main.go | 2 +- cmd/provider/cognitiveservices/zz_main.go | 2 +- cmd/provider/communication/zz_main.go | 2 +- cmd/provider/compute/zz_main.go | 2 +- cmd/provider/confidentialledger/zz_main.go | 2 +- cmd/provider/config/zz_main.go | 2 +- cmd/provider/consumption/zz_main.go | 2 +- cmd/provider/containerapp/zz_main.go | 2 +- cmd/provider/containerregistry/zz_main.go | 2 +- cmd/provider/containerservice/zz_main.go | 2 +- cmd/provider/cosmosdb/zz_main.go | 2 +- cmd/provider/costmanagement/zz_main.go | 2 +- cmd/provider/customproviders/zz_main.go | 2 +- cmd/provider/databoxedge/zz_main.go | 2 +- cmd/provider/databricks/zz_main.go | 2 +- cmd/provider/datafactory/zz_main.go | 2 +- cmd/provider/datamigration/zz_main.go | 2 +- cmd/provider/dataprotection/zz_main.go | 2 +- cmd/provider/datashare/zz_main.go | 2 +- cmd/provider/dbformariadb/zz_main.go | 2 +- cmd/provider/dbformysql/zz_main.go | 2 +- cmd/provider/dbforpostgresql/zz_main.go | 2 +- cmd/provider/devices/zz_main.go | 2 +- cmd/provider/deviceupdate/zz_main.go | 2 +- cmd/provider/devtestlab/zz_main.go | 2 +- cmd/provider/digitaltwins/zz_main.go | 2 +- cmd/provider/elastic/zz_main.go | 2 +- cmd/provider/eventgrid/zz_main.go | 2 +- cmd/provider/eventhub/zz_main.go | 2 +- cmd/provider/fluidrelay/zz_main.go | 2 +- cmd/provider/guestconfiguration/zz_main.go | 2 +- cmd/provider/hdinsight/zz_main.go | 2 +- cmd/provider/healthbot/zz_main.go | 2 +- cmd/provider/healthcareapis/zz_main.go | 2 +- cmd/provider/insights/zz_main.go | 2 +- cmd/provider/iotcentral/zz_main.go | 2 +- cmd/provider/keyvault/zz_main.go | 2 +- cmd/provider/kusto/zz_main.go | 2 +- cmd/provider/labservices/zz_main.go | 2 +- cmd/provider/loadtestservice/zz_main.go | 2 +- cmd/provider/logic/zz_main.go | 2 +- cmd/provider/logz/zz_main.go | 2 +- cmd/provider/machinelearningservices/zz_main.go | 2 +- cmd/provider/maintenance/zz_main.go | 2 +- cmd/provider/managedidentity/zz_main.go | 2 +- cmd/provider/management/zz_main.go | 2 +- cmd/provider/maps/zz_main.go | 2 +- cmd/provider/marketplaceordering/zz_main.go | 2 +- cmd/provider/media/zz_main.go | 2 +- cmd/provider/mixedreality/zz_main.go | 2 +- cmd/provider/monolith/zz_main.go | 2 +- cmd/provider/netapp/zz_main.go | 2 +- cmd/provider/network/zz_main.go | 2 +- cmd/provider/notificationhubs/zz_main.go | 2 +- cmd/provider/operationalinsights/zz_main.go | 2 +- cmd/provider/operationsmanagement/zz_main.go | 2 +- cmd/provider/orbital/zz_main.go | 2 +- cmd/provider/policyinsights/zz_main.go | 2 +- cmd/provider/portal/zz_main.go | 2 +- cmd/provider/powerbidedicated/zz_main.go | 2 +- cmd/provider/purview/zz_main.go | 2 +- cmd/provider/recoveryservices/zz_main.go | 2 +- cmd/provider/relay/zz_main.go | 2 +- cmd/provider/resources/zz_main.go | 2 +- cmd/provider/search/zz_main.go | 2 +- cmd/provider/security/zz_main.go | 2 +- cmd/provider/securityinsights/zz_main.go | 2 +- cmd/provider/servicebus/zz_main.go | 2 +- cmd/provider/servicefabric/zz_main.go | 2 +- cmd/provider/servicelinker/zz_main.go | 2 +- cmd/provider/signalrservice/zz_main.go | 2 +- cmd/provider/solutions/zz_main.go | 2 +- cmd/provider/spring/zz_main.go | 2 +- cmd/provider/sql/zz_main.go | 2 +- cmd/provider/storage/zz_main.go | 2 +- cmd/provider/storagecache/zz_main.go | 2 +- cmd/provider/storagepool/zz_main.go | 2 +- cmd/provider/storagesync/zz_main.go | 2 +- cmd/provider/streamanalytics/zz_main.go | 2 +- cmd/provider/synapse/zz_main.go | 2 +- cmd/provider/timeseriesinsights/zz_main.go | 2 +- cmd/provider/web/zz_main.go | 2 +- hack/main.go.tmpl | 2 +- 96 files changed, 96 insertions(+), 96 deletions(-) diff --git a/cmd/provider/alertsmanagement/zz_main.go b/cmd/provider/alertsmanagement/zz_main.go index deccd94e1..ac513d978 100644 --- a/cmd/provider/alertsmanagement/zz_main.go +++ b/cmd/provider/alertsmanagement/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/analysisservices/zz_main.go b/cmd/provider/analysisservices/zz_main.go index 72ef5a602..18e7d95e1 100644 --- a/cmd/provider/analysisservices/zz_main.go +++ b/cmd/provider/analysisservices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/apimanagement/zz_main.go b/cmd/provider/apimanagement/zz_main.go index 261b2f272..7601a25f5 100644 --- a/cmd/provider/apimanagement/zz_main.go +++ b/cmd/provider/apimanagement/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/appconfiguration/zz_main.go b/cmd/provider/appconfiguration/zz_main.go index e026b04e1..538106a0a 100644 --- a/cmd/provider/appconfiguration/zz_main.go +++ b/cmd/provider/appconfiguration/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/appplatform/zz_main.go b/cmd/provider/appplatform/zz_main.go index 3b933a78a..4273c62d9 100644 --- a/cmd/provider/appplatform/zz_main.go +++ b/cmd/provider/appplatform/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/attestation/zz_main.go b/cmd/provider/attestation/zz_main.go index aacbff2db..430944721 100644 --- a/cmd/provider/attestation/zz_main.go +++ b/cmd/provider/attestation/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/authorization/zz_main.go b/cmd/provider/authorization/zz_main.go index bf6959126..ba35133cb 100644 --- a/cmd/provider/authorization/zz_main.go +++ b/cmd/provider/authorization/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/automation/zz_main.go b/cmd/provider/automation/zz_main.go index 6b126f883..0dc1b2c99 100644 --- a/cmd/provider/automation/zz_main.go +++ b/cmd/provider/automation/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/azure/zz_main.go b/cmd/provider/azure/zz_main.go index e1804cd67..f0134a90c 100644 --- a/cmd/provider/azure/zz_main.go +++ b/cmd/provider/azure/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/azurestackhci/zz_main.go b/cmd/provider/azurestackhci/zz_main.go index a1349913c..f949d6d80 100644 --- a/cmd/provider/azurestackhci/zz_main.go +++ b/cmd/provider/azurestackhci/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/botservice/zz_main.go b/cmd/provider/botservice/zz_main.go index 3e750e166..2156c356e 100644 --- a/cmd/provider/botservice/zz_main.go +++ b/cmd/provider/botservice/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cache/zz_main.go b/cmd/provider/cache/zz_main.go index 63cb4da3a..b12148a2b 100644 --- a/cmd/provider/cache/zz_main.go +++ b/cmd/provider/cache/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cdn/zz_main.go b/cmd/provider/cdn/zz_main.go index d3c56ec6e..6a5cb964a 100644 --- a/cmd/provider/cdn/zz_main.go +++ b/cmd/provider/cdn/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/certificateregistration/zz_main.go b/cmd/provider/certificateregistration/zz_main.go index befde1e75..46ce17e9c 100644 --- a/cmd/provider/certificateregistration/zz_main.go +++ b/cmd/provider/certificateregistration/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cognitiveservices/zz_main.go b/cmd/provider/cognitiveservices/zz_main.go index fb27bc934..abfe4e3d5 100644 --- a/cmd/provider/cognitiveservices/zz_main.go +++ b/cmd/provider/cognitiveservices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/communication/zz_main.go b/cmd/provider/communication/zz_main.go index 2bf1c80f0..9c33139fd 100644 --- a/cmd/provider/communication/zz_main.go +++ b/cmd/provider/communication/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/compute/zz_main.go b/cmd/provider/compute/zz_main.go index d50faf326..f28f910af 100644 --- a/cmd/provider/compute/zz_main.go +++ b/cmd/provider/compute/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/confidentialledger/zz_main.go b/cmd/provider/confidentialledger/zz_main.go index 5e33ec715..485a282a1 100644 --- a/cmd/provider/confidentialledger/zz_main.go +++ b/cmd/provider/confidentialledger/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/config/zz_main.go b/cmd/provider/config/zz_main.go index 2ee05aaa8..32e4e07b9 100644 --- a/cmd/provider/config/zz_main.go +++ b/cmd/provider/config/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/consumption/zz_main.go b/cmd/provider/consumption/zz_main.go index 5a724a50a..b9bb2ac7d 100644 --- a/cmd/provider/consumption/zz_main.go +++ b/cmd/provider/consumption/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/containerapp/zz_main.go b/cmd/provider/containerapp/zz_main.go index 5d822826c..c2bfe899d 100644 --- a/cmd/provider/containerapp/zz_main.go +++ b/cmd/provider/containerapp/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/containerregistry/zz_main.go b/cmd/provider/containerregistry/zz_main.go index f84c8cc49..11cf9f353 100644 --- a/cmd/provider/containerregistry/zz_main.go +++ b/cmd/provider/containerregistry/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/containerservice/zz_main.go b/cmd/provider/containerservice/zz_main.go index e301074e3..ba85ad517 100644 --- a/cmd/provider/containerservice/zz_main.go +++ b/cmd/provider/containerservice/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/cosmosdb/zz_main.go b/cmd/provider/cosmosdb/zz_main.go index ae4c5653d..e1448e7c2 100644 --- a/cmd/provider/cosmosdb/zz_main.go +++ b/cmd/provider/cosmosdb/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/costmanagement/zz_main.go b/cmd/provider/costmanagement/zz_main.go index 2e158817d..9d398bd74 100644 --- a/cmd/provider/costmanagement/zz_main.go +++ b/cmd/provider/costmanagement/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/customproviders/zz_main.go b/cmd/provider/customproviders/zz_main.go index 87bc66658..56e366872 100644 --- a/cmd/provider/customproviders/zz_main.go +++ b/cmd/provider/customproviders/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/databoxedge/zz_main.go b/cmd/provider/databoxedge/zz_main.go index 396ca48c5..6f85633f9 100644 --- a/cmd/provider/databoxedge/zz_main.go +++ b/cmd/provider/databoxedge/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/databricks/zz_main.go b/cmd/provider/databricks/zz_main.go index a8662715c..53b0dea6d 100644 --- a/cmd/provider/databricks/zz_main.go +++ b/cmd/provider/databricks/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/datafactory/zz_main.go b/cmd/provider/datafactory/zz_main.go index 9e5f2004d..32c6ae161 100644 --- a/cmd/provider/datafactory/zz_main.go +++ b/cmd/provider/datafactory/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/datamigration/zz_main.go b/cmd/provider/datamigration/zz_main.go index fc603aecc..a1943d0ad 100644 --- a/cmd/provider/datamigration/zz_main.go +++ b/cmd/provider/datamigration/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dataprotection/zz_main.go b/cmd/provider/dataprotection/zz_main.go index 6537acd3a..0a6af2cee 100644 --- a/cmd/provider/dataprotection/zz_main.go +++ b/cmd/provider/dataprotection/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/datashare/zz_main.go b/cmd/provider/datashare/zz_main.go index 2e72ef6f4..de1b1eaf8 100644 --- a/cmd/provider/datashare/zz_main.go +++ b/cmd/provider/datashare/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dbformariadb/zz_main.go b/cmd/provider/dbformariadb/zz_main.go index 3577d1345..86725a8ae 100644 --- a/cmd/provider/dbformariadb/zz_main.go +++ b/cmd/provider/dbformariadb/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dbformysql/zz_main.go b/cmd/provider/dbformysql/zz_main.go index 743447797..d9668f1d9 100644 --- a/cmd/provider/dbformysql/zz_main.go +++ b/cmd/provider/dbformysql/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/dbforpostgresql/zz_main.go b/cmd/provider/dbforpostgresql/zz_main.go index 1bab222af..e788b11e2 100644 --- a/cmd/provider/dbforpostgresql/zz_main.go +++ b/cmd/provider/dbforpostgresql/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/devices/zz_main.go b/cmd/provider/devices/zz_main.go index cbb2ea164..d1e5edd78 100644 --- a/cmd/provider/devices/zz_main.go +++ b/cmd/provider/devices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/deviceupdate/zz_main.go b/cmd/provider/deviceupdate/zz_main.go index fffd9c977..dd8600023 100644 --- a/cmd/provider/deviceupdate/zz_main.go +++ b/cmd/provider/deviceupdate/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/devtestlab/zz_main.go b/cmd/provider/devtestlab/zz_main.go index 5b5c94352..21cb82757 100644 --- a/cmd/provider/devtestlab/zz_main.go +++ b/cmd/provider/devtestlab/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/digitaltwins/zz_main.go b/cmd/provider/digitaltwins/zz_main.go index 063b2645e..601dd07d4 100644 --- a/cmd/provider/digitaltwins/zz_main.go +++ b/cmd/provider/digitaltwins/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/elastic/zz_main.go b/cmd/provider/elastic/zz_main.go index 54bebc8c0..5e9fac609 100644 --- a/cmd/provider/elastic/zz_main.go +++ b/cmd/provider/elastic/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/eventgrid/zz_main.go b/cmd/provider/eventgrid/zz_main.go index 506d78de2..6398f12e3 100644 --- a/cmd/provider/eventgrid/zz_main.go +++ b/cmd/provider/eventgrid/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/eventhub/zz_main.go b/cmd/provider/eventhub/zz_main.go index c6c6202e3..bef3eb4ee 100644 --- a/cmd/provider/eventhub/zz_main.go +++ b/cmd/provider/eventhub/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/fluidrelay/zz_main.go b/cmd/provider/fluidrelay/zz_main.go index 96eebc4b3..4c78ab9b1 100644 --- a/cmd/provider/fluidrelay/zz_main.go +++ b/cmd/provider/fluidrelay/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/guestconfiguration/zz_main.go b/cmd/provider/guestconfiguration/zz_main.go index 70f86b2ba..326748a40 100644 --- a/cmd/provider/guestconfiguration/zz_main.go +++ b/cmd/provider/guestconfiguration/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/hdinsight/zz_main.go b/cmd/provider/hdinsight/zz_main.go index b8e89c298..ad717c82b 100644 --- a/cmd/provider/hdinsight/zz_main.go +++ b/cmd/provider/hdinsight/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/healthbot/zz_main.go b/cmd/provider/healthbot/zz_main.go index 54a82f377..b3a8fb9d1 100644 --- a/cmd/provider/healthbot/zz_main.go +++ b/cmd/provider/healthbot/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/healthcareapis/zz_main.go b/cmd/provider/healthcareapis/zz_main.go index c9e564c85..2b8cb555b 100644 --- a/cmd/provider/healthcareapis/zz_main.go +++ b/cmd/provider/healthcareapis/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/insights/zz_main.go b/cmd/provider/insights/zz_main.go index b2e195fb4..444259f4c 100644 --- a/cmd/provider/insights/zz_main.go +++ b/cmd/provider/insights/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/iotcentral/zz_main.go b/cmd/provider/iotcentral/zz_main.go index 59a0719d6..194532a9f 100644 --- a/cmd/provider/iotcentral/zz_main.go +++ b/cmd/provider/iotcentral/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/keyvault/zz_main.go b/cmd/provider/keyvault/zz_main.go index 8e73e9be5..6811bdade 100644 --- a/cmd/provider/keyvault/zz_main.go +++ b/cmd/provider/keyvault/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/kusto/zz_main.go b/cmd/provider/kusto/zz_main.go index 2a32c009a..d393e3be4 100644 --- a/cmd/provider/kusto/zz_main.go +++ b/cmd/provider/kusto/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/labservices/zz_main.go b/cmd/provider/labservices/zz_main.go index 104c88524..bc38f253a 100644 --- a/cmd/provider/labservices/zz_main.go +++ b/cmd/provider/labservices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/loadtestservice/zz_main.go b/cmd/provider/loadtestservice/zz_main.go index 6962efaf4..506d0db4b 100644 --- a/cmd/provider/loadtestservice/zz_main.go +++ b/cmd/provider/loadtestservice/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/logic/zz_main.go b/cmd/provider/logic/zz_main.go index bcf09138b..9b706cf25 100644 --- a/cmd/provider/logic/zz_main.go +++ b/cmd/provider/logic/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/logz/zz_main.go b/cmd/provider/logz/zz_main.go index 8eadb5b68..2fdadcf95 100644 --- a/cmd/provider/logz/zz_main.go +++ b/cmd/provider/logz/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/machinelearningservices/zz_main.go b/cmd/provider/machinelearningservices/zz_main.go index 1ec7d12ca..7778952be 100644 --- a/cmd/provider/machinelearningservices/zz_main.go +++ b/cmd/provider/machinelearningservices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/maintenance/zz_main.go b/cmd/provider/maintenance/zz_main.go index a8de54168..0ea16ed33 100644 --- a/cmd/provider/maintenance/zz_main.go +++ b/cmd/provider/maintenance/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/managedidentity/zz_main.go b/cmd/provider/managedidentity/zz_main.go index d454809f9..12873182c 100644 --- a/cmd/provider/managedidentity/zz_main.go +++ b/cmd/provider/managedidentity/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/management/zz_main.go b/cmd/provider/management/zz_main.go index e3bf10a3e..19bc595de 100644 --- a/cmd/provider/management/zz_main.go +++ b/cmd/provider/management/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/maps/zz_main.go b/cmd/provider/maps/zz_main.go index 37171c20e..23eed5b55 100644 --- a/cmd/provider/maps/zz_main.go +++ b/cmd/provider/maps/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/marketplaceordering/zz_main.go b/cmd/provider/marketplaceordering/zz_main.go index 87da3e3f5..f416a34c1 100644 --- a/cmd/provider/marketplaceordering/zz_main.go +++ b/cmd/provider/marketplaceordering/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/media/zz_main.go b/cmd/provider/media/zz_main.go index 351385635..75ab23d95 100644 --- a/cmd/provider/media/zz_main.go +++ b/cmd/provider/media/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/mixedreality/zz_main.go b/cmd/provider/mixedreality/zz_main.go index d6f30a93a..195311e68 100644 --- a/cmd/provider/mixedreality/zz_main.go +++ b/cmd/provider/mixedreality/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/monolith/zz_main.go b/cmd/provider/monolith/zz_main.go index 71b0bb550..a541ee6fe 100644 --- a/cmd/provider/monolith/zz_main.go +++ b/cmd/provider/monolith/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/netapp/zz_main.go b/cmd/provider/netapp/zz_main.go index 466f1079f..8452aa07e 100644 --- a/cmd/provider/netapp/zz_main.go +++ b/cmd/provider/netapp/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/network/zz_main.go b/cmd/provider/network/zz_main.go index ed364e346..467f5f78c 100644 --- a/cmd/provider/network/zz_main.go +++ b/cmd/provider/network/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/notificationhubs/zz_main.go b/cmd/provider/notificationhubs/zz_main.go index 324426149..451dcdd9e 100644 --- a/cmd/provider/notificationhubs/zz_main.go +++ b/cmd/provider/notificationhubs/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/operationalinsights/zz_main.go b/cmd/provider/operationalinsights/zz_main.go index d1db56b1d..dbc82b47b 100644 --- a/cmd/provider/operationalinsights/zz_main.go +++ b/cmd/provider/operationalinsights/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/operationsmanagement/zz_main.go b/cmd/provider/operationsmanagement/zz_main.go index 2346adb68..5ddbb85af 100644 --- a/cmd/provider/operationsmanagement/zz_main.go +++ b/cmd/provider/operationsmanagement/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/orbital/zz_main.go b/cmd/provider/orbital/zz_main.go index 29a1f4c7b..322bb3e5b 100644 --- a/cmd/provider/orbital/zz_main.go +++ b/cmd/provider/orbital/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/policyinsights/zz_main.go b/cmd/provider/policyinsights/zz_main.go index 6d6ba5952..835fcc3ac 100644 --- a/cmd/provider/policyinsights/zz_main.go +++ b/cmd/provider/policyinsights/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/portal/zz_main.go b/cmd/provider/portal/zz_main.go index e0dfeb005..fcf515435 100644 --- a/cmd/provider/portal/zz_main.go +++ b/cmd/provider/portal/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/powerbidedicated/zz_main.go b/cmd/provider/powerbidedicated/zz_main.go index c8b06f8b9..21822877e 100644 --- a/cmd/provider/powerbidedicated/zz_main.go +++ b/cmd/provider/powerbidedicated/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/purview/zz_main.go b/cmd/provider/purview/zz_main.go index 79b2038df..58eabca91 100644 --- a/cmd/provider/purview/zz_main.go +++ b/cmd/provider/purview/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/recoveryservices/zz_main.go b/cmd/provider/recoveryservices/zz_main.go index fe815a06a..9b87d73ff 100644 --- a/cmd/provider/recoveryservices/zz_main.go +++ b/cmd/provider/recoveryservices/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/relay/zz_main.go b/cmd/provider/relay/zz_main.go index 4cbb3ddfe..3cb19d3ff 100644 --- a/cmd/provider/relay/zz_main.go +++ b/cmd/provider/relay/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/resources/zz_main.go b/cmd/provider/resources/zz_main.go index ef95f77d7..5a8b60135 100644 --- a/cmd/provider/resources/zz_main.go +++ b/cmd/provider/resources/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/search/zz_main.go b/cmd/provider/search/zz_main.go index e416243b1..537a3a453 100644 --- a/cmd/provider/search/zz_main.go +++ b/cmd/provider/search/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/security/zz_main.go b/cmd/provider/security/zz_main.go index 5fbae46d9..ef97613a1 100644 --- a/cmd/provider/security/zz_main.go +++ b/cmd/provider/security/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/securityinsights/zz_main.go b/cmd/provider/securityinsights/zz_main.go index 22baf25d7..10310f07c 100644 --- a/cmd/provider/securityinsights/zz_main.go +++ b/cmd/provider/securityinsights/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/servicebus/zz_main.go b/cmd/provider/servicebus/zz_main.go index bf9d30576..0393a7ed2 100644 --- a/cmd/provider/servicebus/zz_main.go +++ b/cmd/provider/servicebus/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/servicefabric/zz_main.go b/cmd/provider/servicefabric/zz_main.go index e395c63bd..89693d67c 100644 --- a/cmd/provider/servicefabric/zz_main.go +++ b/cmd/provider/servicefabric/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/servicelinker/zz_main.go b/cmd/provider/servicelinker/zz_main.go index 5eef8744d..cf1d30b25 100644 --- a/cmd/provider/servicelinker/zz_main.go +++ b/cmd/provider/servicelinker/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/signalrservice/zz_main.go b/cmd/provider/signalrservice/zz_main.go index 463eced10..0830d47df 100644 --- a/cmd/provider/signalrservice/zz_main.go +++ b/cmd/provider/signalrservice/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/solutions/zz_main.go b/cmd/provider/solutions/zz_main.go index 272d9e3a5..edec82f94 100644 --- a/cmd/provider/solutions/zz_main.go +++ b/cmd/provider/solutions/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/spring/zz_main.go b/cmd/provider/spring/zz_main.go index 05f6b6528..7f8c8225b 100644 --- a/cmd/provider/spring/zz_main.go +++ b/cmd/provider/spring/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/sql/zz_main.go b/cmd/provider/sql/zz_main.go index bb9682b5b..5bbb32c59 100644 --- a/cmd/provider/sql/zz_main.go +++ b/cmd/provider/sql/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storage/zz_main.go b/cmd/provider/storage/zz_main.go index 124a891e2..fb74d196e 100644 --- a/cmd/provider/storage/zz_main.go +++ b/cmd/provider/storage/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storagecache/zz_main.go b/cmd/provider/storagecache/zz_main.go index 3e6a6b039..e01f7f9de 100644 --- a/cmd/provider/storagecache/zz_main.go +++ b/cmd/provider/storagecache/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storagepool/zz_main.go b/cmd/provider/storagepool/zz_main.go index 4f71eb52a..88805ce77 100644 --- a/cmd/provider/storagepool/zz_main.go +++ b/cmd/provider/storagepool/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/storagesync/zz_main.go b/cmd/provider/storagesync/zz_main.go index ac98c6a8a..bdfb66bf6 100644 --- a/cmd/provider/storagesync/zz_main.go +++ b/cmd/provider/storagesync/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/streamanalytics/zz_main.go b/cmd/provider/streamanalytics/zz_main.go index 85d11a355..62faa5367 100644 --- a/cmd/provider/streamanalytics/zz_main.go +++ b/cmd/provider/streamanalytics/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/synapse/zz_main.go b/cmd/provider/synapse/zz_main.go index 79ed3497d..3b5af9d0c 100644 --- a/cmd/provider/synapse/zz_main.go +++ b/cmd/provider/synapse/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/timeseriesinsights/zz_main.go b/cmd/provider/timeseriesinsights/zz_main.go index 04bb3d9d0..97c77e108 100644 --- a/cmd/provider/timeseriesinsights/zz_main.go +++ b/cmd/provider/timeseriesinsights/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/cmd/provider/web/zz_main.go b/cmd/provider/web/zz_main.go index efb83ea14..6ee8299d7 100644 --- a/cmd/provider/web/zz_main.go +++ b/cmd/provider/web/zz_main.go @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock" diff --git a/hack/main.go.tmpl b/hack/main.go.tmpl index 77f6537fd..108d2c031 100644 --- a/hack/main.go.tmpl +++ b/hack/main.go.tmpl @@ -13,6 +13,7 @@ import ( "path/filepath" "time" + "github.com/alecthomas/kingpin/v2" xpv1 "github.com/crossplane/crossplane-runtime/apis/common/v1" "github.com/crossplane/crossplane-runtime/pkg/certificates" xpcontroller "github.com/crossplane/crossplane-runtime/pkg/controller" @@ -24,7 +25,6 @@ import ( "github.com/crossplane/crossplane-runtime/pkg/statemetrics" tjcontroller "github.com/crossplane/upjet/pkg/controller" "github.com/crossplane/upjet/pkg/controller/conversion" - "github.com/alecthomas/kingpin/v2" kerrors "k8s.io/apimachinery/pkg/api/errors" metav1 "k8s.io/apimachinery/pkg/apis/meta/v1" "k8s.io/client-go/tools/leaderelection/resourcelock"