diff --git a/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/Chart.yaml b/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/Chart.yaml new file mode 100644 index 0000000..670da98 --- /dev/null +++ b/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/Chart.yaml @@ -0,0 +1,70 @@ +--- +apiVersion: v2 +name: provider-aws.zzzz +description: A Umbrealla Helm chart which contains crossplane manifests to demonstrate orchestration of AWS resources +# A chart can be either an 'application' or a 'library' chart. +# +# Application charts are a collection of templates that can be packaged into +# versioned archives to be deployed. +# +# Library charts provide useful utilities or functions for the chart developer. +# They're included as a dependency of application charts to inject those +# utilities and functions into the rendering pipeline. Library charts +# do not define any templates and therefore cannot be deployed. +type: application +# A URL to an SVG or PNG image to be used as an icon +icon: "https://avatars.githubusercontent.com/u/2531208?s=200&v=4" +# This is the chart version. This version number should be incremented each time +# you make changes to the chart and its templates, including the app version. +# Versions are expected to follow Semantic Versioning (https://semver.org/) + +version: 0.0.35 + +# This is the version number of the application being deployed. This version +# number should be incremented each time you make changes to the application. +# Versions are not expected to follow Semantic Versioning. They should reflect +# the version the application is using. It is recommended to use it with quotes. +appVersion: "0.0.1" +dependencies: + - name: crossplane-provider-configs + alias: crossplane-provider-configs + version: 0.0.18 + repository: "oci://ghcr.io/openmcp-project" + tags: + - crossplane-provider-configs + - name: external-secrets-config + alias: external-secrets-config + version: 0.1.10 + repository: "oci://ghcr.io/openmcp-project" + tags: + - external-secrets-config + - name: crossplane-provider-aws-ec2 + alias: crossplane-provider-aws-ec2 + version: 0.0.12 + repository: "oci://ghcr.io/openmcp-project" + tags: + - crossplane-provider-aws-ec2 + - name: crossplane-provider-aws-eks + alias: crossplane-provider-aws-eks + version: 0.0.12 + repository: "oci://ghcr.io/openmcp-project" + tags: + - crossplane-provider-aws-eks + - name: crossplane-provider-aws-iam + alias: crossplane-provider-aws-iam + version: 0.0.13 + repository: "oci://ghcr.io/openmcp-project" + tags: + - crossplane-provider-aws-rdr + - name: crossplane-provider-aws-rdr + alias: crossplane-provider-aws-rdr + version: 0.0.11 + repository: "oci://ghcr.io/openmcp-project" + tags: + - crossplane-provider-aws-rdr + - name: crossplane-provider-apiextensions-composition + alias: crossplane-provider-apiextensions-composition + version: 0.0.11 + repository: "oci://ghcr.io/openmcp-project" + tags: + - crossplane-provider-apiextensions-composition diff --git a/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/README.md b/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/README.md new file mode 100644 index 0000000..f86de87 --- /dev/null +++ b/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/README.md @@ -0,0 +1,1165 @@ + + +# provider-aws.zzzz + +![Version: 0.0.35](https://img.shields.io/badge/Version-0.0.35-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.1](https://img.shields.io/badge/AppVersion-0.0.1-informational?style=flat-square) + +A Umbrealla Helm chart which contains crossplane manifests to demonstrate orchestration of AWS resources + +## Requirements + +| Repository | Name | Version | +|------------|------|---------| +| oci://ghcr.io/openmcp-project | crossplane-provider-apiextensions-composition(crossplane-provider-apiextensions-composition) | 0.0.11 | +| oci://ghcr.io/openmcp-project | crossplane-provider-aws-ec2(crossplane-provider-aws-ec2) | 0.0.12 | +| oci://ghcr.io/openmcp-project | crossplane-provider-aws-eks(crossplane-provider-aws-eks) | 0.0.12 | +| oci://ghcr.io/openmcp-project | crossplane-provider-aws-iam(crossplane-provider-aws-iam) | 0.0.13 | +| oci://ghcr.io/openmcp-project | crossplane-provider-aws-rdr(crossplane-provider-aws-rdr) | 0.0.11 | +| oci://ghcr.io/openmcp-project | crossplane-provider-configs(crossplane-provider-configs) | 0.0.18 | +| oci://ghcr.io/openmcp-project | external-secrets-config(external-secrets-config) | 0.1.10 | +# TL;DR +This template umbrella Helm Chart demonstrates the orchestration of AWS native cloud resources such as [Elastic Compute Cloud (EC2)](https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/concepts.html), [Elastic Kubernetes Service (EKS)](https://docs.aws.amazon.com/de_de/eks/latest/userguide/what-is-eks.html) and some more. + +# provider-aws.zzzz + +![Version: 0.0.35](https://img.shields.io/badge/Version-0.0.35-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 0.0.1](https://img.shields.io/badge/AppVersion-0.0.1-informational?style=flat-square) + +A Umbrealla Helm chart which contains crossplane manifests to demonstrate orchestration of AWS resources + +## Requirements + +| Repository | Name | Version | +|------------|------|---------| +| oci://ghcr.io/openmcp-project | crossplane-provider-apiextensions-composition(crossplane-provider-apiextensions-composition) | 0.0.11 | +| oci://ghcr.io/openmcp-project | crossplane-provider-aws-ec2(crossplane-provider-aws-ec2) | 0.0.12 | +| oci://ghcr.io/openmcp-project | crossplane-provider-aws-eks(crossplane-provider-aws-eks) | 0.0.12 | +| oci://ghcr.io/openmcp-project | crossplane-provider-aws-iam(crossplane-provider-aws-iam) | 0.0.13 | +| oci://ghcr.io/openmcp-project | crossplane-provider-aws-rdr(crossplane-provider-aws-rdr) | 0.0.11 | +| oci://ghcr.io/openmcp-project | crossplane-provider-configs(crossplane-provider-configs) | 0.0.18 | +| oci://ghcr.io/openmcp-project | external-secrets-config(external-secrets-config) | 0.1.10 | + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| crossplane-provider-apiextensions-composition.compositions[0].name | string | `"nosqls.aws.api.example"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.compositeTypeRef.apiVersion | string | `"aws.api.example/v1alpha1"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.compositeTypeRef.kind | string | `"NoSQL"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].base.apiVersion | string | `"s3.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].base.kind | string | `"Bucket"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].base.metadata.name | string | `"basic-bucket"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].base.spec.forProvider.region | string | `"east-2"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].base.spec.providerConfigRef.name | string | `"default"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].name | string | `"s3Bucket"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].fromFieldPath | string | `"spec.location"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].toFieldPath | string | `"spec.forProvider.region"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].transforms[0].map.EU | string | `"eu-north-1"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].transforms[0].map.US | string | `"east-2"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].transforms[0].type | string | `"map"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.apiVersion | string | `"dynamodb.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.kind | string | `"Table"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.metadata.name | string | `"nosql-database"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.attribute[0].name | string | `"S3ID"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.attribute[0].type | string | `"S"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.hashKey | string | `"S3ID"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.readCapacity | int | `1` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.region | string | `"east-2"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.writeCapacity | int | `1` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].name | string | `"dynamoDB"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].fromFieldPath | string | `"spec.location"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].toFieldPath | string | `"spec.forProvider.region"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].transforms[0].map.EU | string | `"eu-north-1"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].transforms[0].map.US | string | `"east-2"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].transforms[0].type | string | `"map"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].name | string | `"eks-cluster"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.compositeTypeRef.apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.compositeTypeRef.kind | string | `"EKSCluster"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.mode | string | `"Pipeline"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].functionRef.name | string | `"patch-and-transform"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.apiVersion | string | `"pt.fn.crossplane.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.kind | string | `"Resources"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.patchSets[0].name | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.patchSets[0].patches[0].fromFieldPath | string | `"spec.parameters.region"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.patchSets[0].patches[0].toFieldPath | string | `"spec.forProvider.region"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.patchSets[0].patches[0].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].base.kind | string | `"VPC"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].base.spec.forProvider.enableDnsHostnames | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].base.spec.forProvider.enableDnsSupport | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].name | string | `"vpc"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].patches[1].fromFieldPath | string | `"spec.parameters.vpc-cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].patches[1].toFieldPath | string | `"spec.forProvider.cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].base.kind | string | `"RouteTable"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].base.spec.forProvider.region | string | `"PATCHED"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].name | string | `"routetable-public"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].base.kind | string | `"RouteTable"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].base.spec.forProvider.region | string | `"PATCHED"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].name | string | `"routetable-private-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].base.kind | string | `"RouteTable"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].base.spec.forProvider.region | string | `"PATCHED"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].name | string | `"routetable-private-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.apiVersion | string | `"eks.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.kind | string | `"Cluster"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.forProvider.vpcConfig[0].endpointPrivateAccess | bool | `false` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.forProvider.vpcConfig[0].endpointPublicAccess | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.forProvider.vpcConfig[0].subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.forProvider.vpcConfig[0].subnetIdSelector.matchLabels.visibility | string | `"private"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.writeConnectionSecretToRef.name | string | `"dev-connection-secret"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.writeConnectionSecretToRef.namespace | string | `"crossplane-system"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].connectionDetails[0].fromConnectionSecretKey | string | `"kubeconfig"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].connectionDetails[0].name | string | `"kubeconfig-value"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].connectionDetails[0].type | string | `"FromConnectionSecretKey"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].name | string | `"eks-cluster"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[1].fromFieldPath | string | `"spec.parameters.k8s-version"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[1].toFieldPath | string | `"spec.forProvider.version"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].fromFieldPath | string | `"metadata.uid"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].toFieldPath | string | `"spec.writeConnectionSecretToRef.name"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].transforms[0].string.fmt | string | `"%s-ekscluster-connection"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].transforms[0].string.type | string | `"Format"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].transforms[0].type | string | `"string"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[3].fromFieldPath | string | `"spec.parameters.cluster-role"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[3].toFieldPath | string | `"spec.forProvider.roleArn"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[14].base.apiVersion | string | `"iam.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[14].base.kind | string | `"Role"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[14].base.spec.forProvider.assumeRolePolicy | string | `"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[14].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[14].name | string | `"role"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].base.apiVersion | string | `"iam.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].base.kind | string | `"RolePolicyAttachment"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].base.spec.forProvider.policyArn | string | `"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].base.spec.forProvider.roleSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].name | string | `"rolePolicyAttachment"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.apiVersion | string | `"eks.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.kind | string | `"NodeGroup"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.clusterNameSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.instanceTypes[0] | string | `"t3.medium"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.scalingConfig[0].minSize | int | `1` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.subnetIdSelector.matchLabels.visibility | string | `"private"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].name | string | `"eks-nodegroup"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[1].fromFieldPath | string | `"spec.parameters.workers-size"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[1].toFieldPath | string | `"spec.forProvider.scalingConfig[0].desiredSize"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[2].fromFieldPath | string | `"spec.parameters.workers-size"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[2].toFieldPath | string | `"spec.forProvider.scalingConfig[0].maxSize"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].fromFieldPath | string | `"spec.parameters.workload-type"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].toFieldPath | string | `"spec.forProvider.amiType"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].transforms[0].map.gpu | string | `"x86_GPU"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].transforms[0].map.non-gpu | string | `"x86"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].transforms[0].type | string | `"map"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[4].fromFieldPath | string | `"spec.parameters.workernode-role"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[4].toFieldPath | string | `"spec.forProvider.nodeRoleArn"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[4].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].base.kind | string | `"InternetGateway"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].base.metadata.labels.type | string | `"igw"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].name | string | `"internetgateway"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.kind | string | `"Subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.metadata.labels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.metadata.labels.visibility | string | `"public"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.spec.forProvider.mapPublicIpOnLaunch | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].name | string | `"subnet-public-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[1].fromFieldPath | string | `"spec.parameters.subnet1-public-cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[1].toFieldPath | string | `"spec.forProvider.cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[2].fromFieldPath | string | `"spec.parameters.subnet1-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[2].toFieldPath | string | `"spec.forProvider.availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[3].fromFieldPath | string | `"spec.parameters.subnet1-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[3].toFieldPath | string | `"metadata.labels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.kind | string | `"Subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.metadata.labels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.metadata.labels.visibility | string | `"public"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.spec.forProvider.mapPublicIpOnLaunch | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].name | string | `"subnet-public-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[1].fromFieldPath | string | `"spec.parameters.subnet2-public-cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[1].toFieldPath | string | `"spec.forProvider.cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[2].fromFieldPath | string | `"spec.parameters.subnet2-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[2].toFieldPath | string | `"spec.forProvider.availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[3].fromFieldPath | string | `"spec.parameters.subnet2-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[3].toFieldPath | string | `"metadata.labels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.kind | string | `"Subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.metadata.labels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.metadata.labels.visibility | string | `"private"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.spec.forProvider.mapPublicIpOnLaunch | bool | `false` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].name | string | `"subnet-private-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[1].fromFieldPath | string | `"spec.parameters.subnet1-private-cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[1].toFieldPath | string | `"spec.forProvider.cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[2].fromFieldPath | string | `"spec.parameters.subnet1-private-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[2].toFieldPath | string | `"spec.forProvider.availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[3].fromFieldPath | string | `"spec.parameters.subnet1-private-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[3].toFieldPath | string | `"metadata.labels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.kind | string | `"Subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.metadata.labels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.metadata.labels.visibility | string | `"private"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.spec.forProvider.mapPublicIpOnLaunch | bool | `false` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].name | string | `"subnet-private-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[1].fromFieldPath | string | `"spec.parameters.subnet2-private-cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[1].toFieldPath | string | `"spec.forProvider.cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[2].fromFieldPath | string | `"spec.parameters.subnet2-private-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[2].toFieldPath | string | `"spec.forProvider.availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[3].fromFieldPath | string | `"spec.parameters.subnet2-private-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[3].toFieldPath | string | `"metadata.labels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].base.kind | string | `"EIP"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].base.metadata.labels.type | string | `"eip-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].base.spec.forProvider.domain | string | `"vpc"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].name | string | `"elastic-ip-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].base.kind | string | `"EIP"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].base.metadata.labels.type | string | `"eip-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].base.spec.forProvider.domain | string | `"vpc"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].name | string | `"elastic-ip-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.kind | string | `"NATGateway"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.metadata.labels.type | string | `"natgw-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.spec.forProvider.allocationIdSelector.matchLabels.type | string | `"eip-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.spec.forProvider.subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.spec.forProvider.subnetIdSelector.matchLabels.visibility | string | `"public"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].name | string | `"natgateway-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].patches[1].fromFieldPath | string | `"spec.parameters.subnet1-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].patches[1].toFieldPath | string | `"spec.forProvider.subnetIdSelector.matchLabels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.kind | string | `"NATGateway"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.metadata.labels.type | string | `"natgw-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.spec.forProvider.allocationIdSelector.matchLabels.type | string | `"eip-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.spec.forProvider.subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.spec.forProvider.subnetIdSelector.matchLabels.visibility | string | `"public"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].name | string | `"natgateway-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].patches[1].fromFieldPath | string | `"spec.parameters.subnet2-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].patches[1].toFieldPath | string | `"spec.forProvider.subnetIdSelector.matchLabels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].step | string | `"patch-and-transform"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.writeConnectionSecretsToNamespace | string | `"crossplane-system"` | | +| crossplane-provider-apiextensions-composition.compositions[2].name | string | `"vpc"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.compositeTypeRef.apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.compositeTypeRef.kind | string | `"XVPC"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.mode | string | `"Pipeline"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].functionRef.name | string | `"go-templating"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].input.apiVersion | string | `"gotemplating.fn.crossplane.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].input.inline.template | string | `"{{ $claimNamespace := index $.observed.composite.resource.metadata.labels \"crossplane.io/claim-namespace\" }}\n{{ $tenantAwsProviderConfigRef := printf \"%s-aws\" $claimNamespace }}\n{{ $params := get .observed.composite.resource.spec \"parameters\" | default dict }}\n---\napiVersion: ec2.aws.crossplane.io/v1beta1\nkind: VPC\nmetadata:\n annotations:\n {{ setResourceNameAnnotation \"vpc\" }}\n crossplane.io/external-name: {{ get $params \"id\" | default ( print $claimNamespace \"-vpc\" ) }}\nspec:\n forProvider:\n region: {{ get $params \"region\" | default \"east-1\" }}\n vpcCidrBlock: {{ get $params \"vpcCIDRBlock\" | default \"192.168.0.0/16\" }}\n enableDnsSupport: true\n enableDnsHostNames: true\n instanceTenancy: default\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef }}\n"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].input.kind | string | `"GoTemplate"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].input.source | string | `"Inline"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].step | string | `"compose-resources"` | | +| crossplane-provider-apiextensions-composition.compositions[3].name | string | `"rdsinstance"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.compositeTypeRef.apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.compositeTypeRef.kind | string | `"XRDSInstance"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.mode | string | `"Pipeline"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].functionRef.name | string | `"go-templating"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].input.apiVersion | string | `"gotemplating.fn.crossplane.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].input.inline.template | string | `"{{ $claimNamespace := index $.observed.composite.resource.metadata.labels \"crossplane.io/claim-namespace\" }}\n{{ $claimNamespaceTrimmed := $claimNamespace | replace \"-\" \"\" }}\n{{ $tenantAwsProviderConfigRef := printf \"%s-aws\" $claimNamespace }}\n{{ $params := get .observed.composite.resource.spec \"parameters\" | default dict }}\n---\napiVersion: rds.aws.upbound.io/v1beta2\nkind: Instance\nmetadata:\n annotations:\n {{ setResourceNameAnnotation \"rdsInstance\" }}\n crossplane.io/external-name: {{ get $params \"id\" | default ( print $claimNamespace \"-rds-instance\" ) }}\nspec:\n forProvider:\n allocatedStorage: {{ get $params \"storage\" | default 20 }}\n autoGeneratePassword: true\n autoMinorVersionUpgrade: true\n backupRetentionPeriod: 14\n backupWindow: \"09:46-10:16\"\n dbName: {{ get $params \"name\" | default ( print $claimNamespaceTrimmed \"db\" ) }}\n engine: postgres\n engineVersion: \"16.1\" # 16.3? console shows RDS 16.1-R2 (PostgreSQL 13.1-R2)\n instanceClass: {{ printf \"db.t3.%s\" (get $params \"size\" | default \"micro\") }}\n maintenanceWindow: Mon:00:00-Mon:03:00\n passwordSecretRef:\n key: password\n name: {{ printf \"%s-rds-root\" $claimNamespace }}\n namespace: {{ $claimNamespace }}\n publiclyAccessible: false\n region: {{ printf \"%s-1\" (get $params \"region\" | default \"east\") }}\n skipFinalSnapshot: true\n storageEncrypted: true\n storageType: gp2\n username: adminuser\n writeConnectionSecretToRef:\n name: {{ printf \"%s-rds-connection-details\" $claimNamespace }}\n namespace: {{ $claimNamespace }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef }}\n"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].input.kind | string | `"GoTemplate"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].input.source | string | `"Inline"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].step | string | `"compose-resources"` | | +| crossplane-provider-apiextensions-composition.compositions[4].name | string | `"eksnetwork.api.example"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.compositeTypeRef.apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.compositeTypeRef.kind | string | `"XEKSNetwork"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.mode | string | `"Pipeline"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].functionRef.name | string | `"go-templating"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].input.apiVersion | string | `"gotemplating.fn.crossplane.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].input.inline.template | string | `"{{ $claimNamespace := index $.observed.composite.resource.metadata.labels \"crossplane.io/claim-namespace\" }}\n{{ $tenantAwsProviderConfigRef := printf \"%s-aws\" $claimNamespace }}\n{{ $params := get .observed.composite.resource.spec \"parameters\" | default dict }}\n---\n{{ $vpcResourceName := \"vpc\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: VPC\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $vpcResourceName }}\nspec:\n forProvider:\n cidrBlock: {{ $params.vpcCidrBlock | toYaml }}\n enableDnsHostnames: true\n enableDnsSupport: true\n tags:\n Name: {{ printf \"%s-%s\" $params.id $vpcResourceName | toYaml }}\n region: {{ $params.region | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n---\n{{ $igwResourceName := \"internet-gateway\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: InternetGateway\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $igwResourceName }}\nspec:\n forProvider:\n region: {{ $params.region | toYaml }}\n tags:\n Name: {{ printf \"%s-%s\" $params.id $igwResourceName | toYaml }}\n vpcIdSelector:\n matchControllerRef: true\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n{{ $region := $params.region | toYaml }}\n{{- range $i, $subnet := $params.subnets }}\n---\n{{ $subnetResourceName := printf \"subnet-%s-%s-%s\" $subnet.availabilityZone $subnet.type (toString $i) }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: Subnet\nmetadata:\n labels:\n zone: {{ $subnet.availabilityZone }}\n {{- if eq $subnet.type \"private\" }}\n access: private\n {{- else }}\n access: public\n {{- end }}\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $subnetResourceName }}\nspec:\n forProvider:\n cidrBlock: {{ $subnet.cidrBlock | toYaml }}\n {{ if eq $subnet.type \"public\" }}\n mapPublicIpOnLaunch: true\n {{ end }}\n tags:\n {{- if eq $subnet.type \"private\" }}\n kubernetes.io/role/internal-elb: \"1\"\n {{- else }}\n kubernetes.io/role/elb: \"1\"\n {{- end }}\n Name: {{ printf \"%s-%s\" $params.id $subnetResourceName | toYaml }}\n region: {{ $region }}\n vpcIdSelector:\n matchControllerRef: true\n availabilityZone: {{ $subnet.availabilityZone | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n{{- end }}\n---\n{{ $routeTableResourceName := \"route-table\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: RouteTable\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $routeTableResourceName }}\nspec:\n forProvider:\n vpcIdSelector:\n matchControllerRef: true\n region: {{ $params.region | toYaml }}\n tags:\n Name: {{ printf \"%s-%s\" $params.id $routeTableResourceName | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n---\n{{ $publicRouteResourceName := \"public-route\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: Route\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $publicRouteResourceName }}\nspec:\n forProvider:\n destinationCidrBlock: 0.0.0.0/0\n gatewayIdSelector:\n matchControllerRef: true\n routeTableIdSelector:\n matchControllerRef: true\n region: {{ $params.region | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n---\n{{ $mainRouteTableAssociationResourceName := \"main-route-table-association\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: MainRouteTableAssociation\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $mainRouteTableAssociationResourceName }}\nspec:\n forProvider:\n region: {{ $params.region | toYaml }}\n routeTableIdSelector:\n matchControllerRef: true\n vpcIdSelector:\n matchControllerRef: true\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n{{- range $i, $subnet := $params.subnets }}\n---\n{{ $routeTableAssociationResourceName := printf \"route-table-association-%s-%s-%s\" $subnet.availabilityZone $subnet.type (toString $i) }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: RouteTableAssociation\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $routeTableAssociationResourceName }}\nspec:\n forProvider:\n region: {{ $region }}\n routeTableIdSelector:\n matchControllerRef: true\n subnetIdSelector:\n matchControllerRef: true\n matchLabels:\n {{- if eq $subnet.type \"private\" }}\n access: private\n {{- else }}\n access: public\n {{- end }}\n zone: {{ $subnet.availabilityZone | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n{{- end }}\n---\n{{ $sgResourceName := \"security-group\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: SecurityGroup\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $sgResourceName }}\nspec:\n forProvider:\n description: Allow access to databases\n name: {{ printf \"%s-%s\" $params.id $sgResourceName | toYaml }}\n vpcIdSelector:\n matchControllerRef: true\n region: {{ $params.region | toYaml }}\n tags:\n Name: {{ printf \"%s-%s\" $params.id $sgResourceName | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n---\n{{ $sgrpRulePostGresResourceName := \"security-group-rule-postgres\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: SecurityGroupRule\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $sgrpRulePostGresResourceName }}\nspec:\n forProvider:\n cidrBlocks:\n - 192.168.0.0/16\n description: Everywhere\n fromPort: 5432\n protocol: tcp\n securityGroupIdSelector:\n matchControllerRef: true\n toPort: 5432\n type: ingress\n region: {{ $params.region | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n---\n{{ $sgrpRuleMySQLResourceName := \"security-group-rule-mysql\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: SecurityGroupRule\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $sgrpRuleMySQLResourceName }}\nspec:\n forProvider:\n cidrBlocks:\n - 192.168.0.0/16\n description: Everywhere\n fromPort: 3306\n protocol: tcp\n securityGroupIdSelector:\n matchControllerRef: true\n toPort: 3306\n type: ingress\n region: {{ $params.region | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].input.kind | string | `"GoTemplate"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].input.source | string | `"Inline"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].step | string | `"compose-resources"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].functionRef.name | string | `"go-templating"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].input.apiVersion | string | `"gotemplating.fn.crossplane.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].input.inline.template | string | `"{{ $observedResources := get .observed \"resources\" | default dict }}\n{{ $params := get .observed.composite.resource.spec \"parameters\" | default dict }}\n{{ $vpcStatus := dig \"vpc\" \"resource\" \"status\" dict $observedResources }}\n{{ $subnetsStatus := dict }}\n{{ range $i, $subnet := $params.subnets }}\n {{ $subnetResourceName := printf \"subnet-%s-%s-%s\" $subnet.availabilityZone $subnet.type (toString $i) }}\n {{ $subnetStatuses := dig $subnetResourceName \"resource\" \"status\" dict $observedResources }}\n {{ $subnetsStatus = merge $subnetsStatus (dict $subnetResourceName $subnetStatuses) }}\n{{ end }}\napiVersion: api.example/v1alpha1\nkind: XEKSNetwork\nstatus:\n vpc: {{ $vpcStatus | toYaml | nindent 4 }}\n subnets: {{ $subnetsStatus | toYaml | nindent 4 }}\n"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].input.kind | string | `"GoTemplate"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].input.source | string | `"Inline"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].step | string | `"set-xr-status"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[2].functionRef.name | string | `"auto-ready"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[2].step | string | `"automatically-detect-ready-composed-resources"` | | +| crossplane-provider-aws-ec2.eips[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-ec2.eips[0].spec.forProvider.domain | string | `"vpc"` | | +| crossplane-provider-aws-ec2.eips[0].spec.forProvider.region | string | `"west-2"` | | +| crossplane-provider-aws-ec2.eips[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.eips[1].name | string | `"dev-ekscluster-2"` | | +| crossplane-provider-aws-ec2.eips[1].spec.forProvider.domain | string | `"vpc"` | | +| crossplane-provider-aws-ec2.eips[1].spec.forProvider.region | string | `"west-2"` | | +| crossplane-provider-aws-ec2.eips[1].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.internetGateways | list | `[{"annotations":{},"labels":{},"name":"dev-ekscluster","ownerReferences":{},"spec":{"forProvider":{"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network","ownerReferences":{},"spec":{"forProvider":{"region":"east-1","tags":{"Name":"platform-ref-eks-network-internet-gateway"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}}]` | https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/InternetGateway/v1beta1 | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].labels | object | `{}` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].name | string | `"reference-eks-network"` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.natGateways | list | `[{"annotations":{},"labels":{},"name":"dev-ekscluster","ownerReferences":{},"spec":{"forProvider":{"allocationIdSelector":{"matchLabels":{"type":"eip-1"}},"region":"west-2","subnetIdSelector":{"matchLabels":{"type":"subnet","visibility":"public","zone":"west-2a"}}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"dev-ekscluster-2","ownerReferences":{},"spec":{"forProvider":{"allocationIdSelector":{"matchLabels":{"type":"eip-2"}},"region":"west-2","subnetIdSelector":{"matchLabels":{"type":"subnet","visibility":"public","zone":"west-2b"}}},"providerConfigRef":{"name":"dev-aws"}}}]` | https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/NATGateway/v1beta1 | +| crossplane-provider-aws-ec2.routeTableAssociations[0].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].labels | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].name | string | `"reference-eks-network-public"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.forProvider.subnetIdSelector.matchLabels.access | string | `"public"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.forProvider.subnetIdSelector.matchLabels.zone | string | `"east-1a"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].labels | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].name | string | `"reference-eks-network-private"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.forProvider.subnetIdSelector.matchLabels.access | string | `"private"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.forProvider.subnetIdSelector.matchLabels.zone | string | `"east-1a"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].labels | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].name | string | `"reference-eks-network-public-1b"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.forProvider.subnetIdSelector.matchLabels.access | string | `"public"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.forProvider.subnetIdSelector.matchLabels.zone | string | `"east-1b"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].labels | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].name | string | `"reference-eks-network-private-1b"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.forProvider.subnetIdSelector.matchLabels.access | string | `"private"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.forProvider.subnetIdSelector.matchLabels.zone | string | `"east-1b"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.routeTables | list | `[{"name":"dev-ekscluster","spec":{"forProvider":{"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"name":"reference-eks-network","spec":{"forProvider":{"region":"east-1","tags":{"Name":"platform-ref-eks-network-route-table"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}}]` | https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/RouteTable/v1beta1 | +| crossplane-provider-aws-ec2.routes[0].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.routes[0].labels | object | `{}` | | +| crossplane-provider-aws-ec2.routes[0].name | string | `"reference-eks-network"` | | +| crossplane-provider-aws-ec2.routes[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.routes[0].spec.forProvider.destinationCidrBlock | string | `"0.0.0.0/0"` | | +| crossplane-provider-aws-ec2.routes[0].spec.forProvider.gatewayIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routes[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.routes[0].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routes[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].labels | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].name | string | `"reference-eks-network"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.cidrBlocks[0] | string | `"192.168.0.0/16"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.description | string | `"Everywhere"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.fromPort | int | `3306` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.protocol | string | `"tcp"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.securityGroupIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.toPort | int | `3306` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.type | string | `"ingress"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].labels | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].name | string | `"reference-eks-network-5432"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.cidrBlocks[0] | string | `"192.168.0.0/16"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.description | string | `"Everywhere"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.fromPort | int | `5432` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.protocol | string | `"tcp"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.securityGroupIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.toPort | int | `5432` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.type | string | `"ingress"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.securityGroups[0].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroups[0].labels | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroups[0].name | string | `"reference-eks-network"` | | +| crossplane-provider-aws-ec2.securityGroups[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.forProvider.description | string | `"Allow access to databases"` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.forProvider.name | string | `"platform-ref-eks-network-security-group"` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.forProvider.tags.Name | string | `"platform-ref-eks-network-security-group"` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.subnets | list | `[{"annotations":{},"labels":{},"name":"dev-ekscluster","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"west-2a","cidrBlock":"192.168.50.0/24","mapPublicIpOnLaunch":false,"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"east-1a","cidrBlock":"192.168.128.0/18","region":"east-1","tags":{"Name":"platform-ref-eks-network-subnet-east-1a-private-2","kubernetes.io/role/internal-elb":"1"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network-public-0","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"east-1a","cidrBlock":"192.168.0.0/18","mapPublicIpOnLaunch":true,"region":"east-1","tags":{"Name":"platform-ref-eks-network-subnet-east-1a-public-0","kubernetes.io/role/elb":"1"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network-east-1b-private-3","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"east-1b","cidrBlock":"192.168.192.0/18","region":"east-1","tags":{"Name":"platform-ref-eks-network-subnet-east-1b-private-3","kubernetes.io/role/internal-elb":"1"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network-east-1b-public-1","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"east-1b","cidrBlock":"192.168.64.0/18","mapPublicIpOnLaunch":true,"region":"east-1","tags":{"Name":"platform-ref-eks-network-subnet-east-1b-public-1","kubernetes.io/role/elb":"1"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"dev-ekscluster-2","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"west-2b","cidrBlock":"192.168.51.0/24","mapPublicIpOnLaunch":false,"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"dev-ekscluster-3","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"west-2b","cidrBlock":"192.168.49.0/24","mapPublicIpOnLaunch":true,"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"dev-ekscluster-4","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"west-2b","cidrBlock":"192.168.49.0/24","mapPublicIpOnLaunch":true,"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}}]` | https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/Subnet/v1beta1 | +| crossplane-provider-aws-ec2.vpcs | list | `[{"annotations":{},"labels":{},"name":"dev-ekscluster","ownerReferences":{},"spec":{"forProvider":{"cidrBlock":"192.168.48.0/20","enableDnsHostnames":true,"enableDnsSupport":true,"region":"west-2"},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network","ownerReferences":{},"spec":{"forProvider":{"cidrBlock":"192.168.0.0/16","enableDnsHostnames":true,"enableDnsSupport":true,"region":"east-1","tags":{"Name":"platform-ref-eks-network-vpc"}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"vpc-west-2","ownerReferences":{},"spec":{"forProvider":{"enableDnsHostNames":true,"enableDnsSupport":true,"instanceTenancy":"default","region":"west-2","vpcCidrBlock":"10.0.0.0/16"},"providerConfigRef":{"name":"dev-aws"}}}]` | https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/VPC/v1beta1 | +| crossplane-provider-aws-eks.clusters[0].annotations."crossplane.io/composition-resource-name" | string | `"eks-cluster"` | | +| crossplane-provider-aws-eks.clusters[0].labels."crossplane.io/claim-namespace" | string | `"dev-us"` | | +| crossplane-provider-aws-eks.clusters[0].labels."crossplane.io/composite" | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.clusters[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].blockOwnerDeletion | bool | `true` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].controller | bool | `true` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].kind | string | `"EKSCluster"` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].uid | string | `""` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.region | string | `"west-2"` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.roleArn | string | `"arn:aws:iam::XXXX:role/EKS-Cluster-Role"` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.version | string | `"1.29"` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.vpcConfig[0].endpointPrivateAccess | bool | `false` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.vpcConfig[0].endpointPublicAccess | bool | `true` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.vpcConfig[0].subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.vpcConfig[0].subnetIdSelector.matchLabels.visibility | string | `"private"` | | +| crossplane-provider-aws-eks.clusters[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-eks.clusters[0].spec.publishConnectionDetailsTo | object | `{}` | | +| crossplane-provider-aws-eks.clusters[0].spec.writeConnectionSecretToRef.name | string | `"dev-connection-secret"` | | +| crossplane-provider-aws-eks.clusters[0].spec.writeConnectionSecretToRef.namespace | string | `"crossplane-system"` | | +| crossplane-provider-aws-eks.nodeGroups[0].annotations."crossplane.io/composition-resource-name" | string | `"eks-nodegroup"` | | +| crossplane-provider-aws-eks.nodeGroups[0].labels."crossplane.io/claim-namespace" | string | `"dev-us"` | | +| crossplane-provider-aws-eks.nodeGroups[0].labels."crossplane.io/composite" | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.nodeGroups[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].blockOwnerDeletion | bool | `true` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].controller | bool | `true` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].kind | string | `"EKSCluster"` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].uid | string | `""` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.amiType | string | `"x86"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.clusterNameSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.instanceTypes[0] | string | `"t3.medium"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.nodeRoleArn | string | `"arn:aws:iam::XXXX:role/EKS-WorkerNode-Role"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.region | string | `"west-2"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.scalingConfig[0].desiredSize | int | `2` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.scalingConfig[0].maxSize | int | `2` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.scalingConfig[0].minSize | int | `1` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.subnetIdSelector.matchLabels.visibility | string | `"private"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.publishConnectionDetailsTo | object | `{}` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.writeConnectionSecretToRef | object | `{}` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].annotations."crossplane.io/composition-resource-name" | string | `"rolePolicyAttachment"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].labels."crossplane.io/claim-namespace" | string | `"dev-us"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].labels."crossplane.io/composite" | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].blockOwnerDeletion | bool | `true` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].controller | bool | `true` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].kind | string | `"EKSCluster"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].uid | string | `""` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].spec.forProvider.policyArn | string | `"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].spec.forProvider.roleSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].spec.publishConnectionDetailsTo | object | `{}` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].spec.writeConnectionSecretToRef | object | `{}` | | +| crossplane-provider-aws-iam.roles[0].annotations."crossplane.io/composition-resource-name" | string | `"role"` | | +| crossplane-provider-aws-iam.roles[0].labels."crossplane.io/claim-namespace" | string | `"dev-us"` | | +| crossplane-provider-aws-iam.roles[0].labels."crossplane.io/composite" | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.roles[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].blockOwnerDeletion | bool | `true` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].controller | bool | `true` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].kind | string | `"EKSCluster"` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].uid | string | `""` | | +| crossplane-provider-aws-iam.roles[0].spec.forProvider.assumeRolePolicy | string | `"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"` | | +| crossplane-provider-aws-iam.roles[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-iam.roles[0].spec.publishConnectionDetailsTo | object | `{}` | | +| crossplane-provider-aws-iam.roles[0].spec.writeConnectionSecretToRef | object | `{}` | | +| crossplane-provider-aws-rdr.instances[0].annotations | object | `{}` | | +| crossplane-provider-aws-rdr.instances[0].labels | object | `{}` | | +| crossplane-provider-aws-rdr.instances[0].name | string | `"rds-instance"` | | +| crossplane-provider-aws-rdr.instances[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.allocatedStorage | int | `20` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.autoGeneratePassword | bool | `true` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.autoMinorVersionUpgrade | bool | `true` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.backupRetentionPeriod | int | `14` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.backupWindow | string | `"09:46-10:16"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.dbName | string | `"clopsdevusdb"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.engine | string | `"postgres"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.engineVersion | string | `"16.1"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.instanceClass | string | `"db.t3.micro"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.maintenanceWindow | string | `"Mon:00:00-Mon:03:00"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.passwordSecretRef.key | string | `"password"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.passwordSecretRef.name | string | `"dev-rds-root"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.passwordSecretRef.namespace | string | `"dev-us"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.publiclyAccessible | bool | `false` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.skipFinalSnapshot | bool | `true` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.storageEncrypted | bool | `true` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.storageType | string | `"gp2"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.username | string | `"adminuser"` | | +| crossplane-provider-aws-rdr.instances[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-rdr.instances[0].spec.writeConnectionSecretToRef.name | string | `"dev-rds-connection-details"` | | +| crossplane-provider-aws-rdr.instances[0].spec.writeConnectionSecretToRef.namespace | string | `"dev-us"` | | +| crossplane-provider-configs.providerConfigs.btpSapCrossplane | list | `[]` | | +| crossplane-provider-configs.providerConfigs.gardenerOrchestrateCloud | list | `[]` | | +| crossplane-provider-configs.providerConfigs.helmCrossplane | list | `[]` | | +| crossplane-provider-configs.providerConfigs.kubernetesCrossplane | list | `[]` | | +| external-secrets-config.credentials | list | `[]` | | +| external-secrets-config.externalSecret[0].data[0].remoteRef.key | string | `""` | | +| external-secrets-config.externalSecret[0].data[0].remoteRef.property | string | `"kubeconfig"` | | +| external-secrets-config.externalSecret[0].data[0].secretKey | string | `"kubeconfig"` | | +| external-secrets-config.externalSecret[0].name | string | `""` | | +| external-secrets-config.externalSecret[0].namespace | string | `"default"` | | +| external-secrets-config.externalSecret[0].refreshInterval | string | `"15m"` | | +| external-secrets-config.externalSecret[0].secretStore.name | string | `"hashicorp-vault"` | | +| external-secrets-config.externalSecret[0].targetSecretName | string | `""` | | +| external-secrets-config.externalSecret[1].data[0].remoteRef.key | string | `""` | | +| external-secrets-config.externalSecret[1].data[0].remoteRef.property | string | `"btp-cis-provider-credentials"` | | +| external-secrets-config.externalSecret[1].data[0].secretKey | string | `"btp-cis-provider-credentials"` | | +| external-secrets-config.externalSecret[1].data[1].remoteRef.key | string | `""` | | +| external-secrets-config.externalSecret[1].data[1].remoteRef.property | string | `"btp-service-account-provider-credentials"` | | +| external-secrets-config.externalSecret[1].data[1].secretKey | string | `"btp-service-account-provider-credentials"` | | +| external-secrets-config.externalSecret[1].name | string | `"btp-account-test"` | | +| external-secrets-config.externalSecret[1].namespace | string | `"default"` | | +| external-secrets-config.externalSecret[1].refreshInterval | string | `"15m"` | | +| external-secrets-config.externalSecret[1].secretStore.name | string | `"hashicorp-vault"` | | +| external-secrets-config.externalSecret[1].targetSecretName | string | `"btp-account-test"` | | +| external-secrets-config.secretStores[0].name | string | `"hashicorp-vault"` | | +| external-secrets-config.secretStores[0].namespace | string | `"default"` | | +| external-secrets-config.secretStores[0].provider.vault.auth.appRole.path | string | `"approle"` | | +| external-secrets-config.secretStores[0].provider.vault.auth.appRole.roleId | string | `""` | | +| external-secrets-config.secretStores[0].provider.vault.auth.appRole.secretRef.key | string | `"token"` | | +| external-secrets-config.secretStores[0].provider.vault.auth.appRole.secretRef.name | string | `"hashicorp-vault-token"` | | +| external-secrets-config.secretStores[0].provider.vault.namespace | string | `"ns1"` | | +| external-secrets-config.secretStores[0].provider.vault.path | string | `"k8s-clusters"` | | +| external-secrets-config.secretStores[0].provider.vault.server | string | `"https://vault.example/"` | | +| external-secrets-config.secretStores[0].provider.vault.version | string | `"v2"` | | +| tags.crossplane-provider-apiextensions-composition | bool | `true` | | +| tags.crossplane-provider-aws-ec2 | bool | `true` | | +| tags.crossplane-provider-aws-eks | bool | `true` | | +| tags.crossplane-provider-aws-iam | bool | `true` | | +| tags.crossplane-provider-aws-rdr | bool | `true` | | +| tags.crossplane-provider-configs | bool | `true` | | +| tags.external-secrets-config | bool | `true` | | + +---------------------------------------------- +Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2) + +## Values + +| Key | Type | Default | Description | +|-----|------|---------|-------------| +| crossplane-provider-apiextensions-composition.compositions[0].name | string | `"nosqls.aws.api.example"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.compositeTypeRef.apiVersion | string | `"aws.api.example/v1alpha1"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.compositeTypeRef.kind | string | `"NoSQL"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].base.apiVersion | string | `"s3.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].base.kind | string | `"Bucket"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].base.metadata.name | string | `"basic-bucket"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].base.spec.forProvider.region | string | `"east-2"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].base.spec.providerConfigRef.name | string | `"default"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].name | string | `"s3Bucket"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].fromFieldPath | string | `"spec.location"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].toFieldPath | string | `"spec.forProvider.region"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].transforms[0].map.EU | string | `"eu-north-1"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].transforms[0].map.US | string | `"east-2"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].transforms[0].type | string | `"map"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[0].patches[0].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.apiVersion | string | `"dynamodb.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.kind | string | `"Table"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.metadata.name | string | `"nosql-database"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.attribute[0].name | string | `"S3ID"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.attribute[0].type | string | `"S"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.hashKey | string | `"S3ID"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.readCapacity | int | `1` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.region | string | `"east-2"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].base.spec.forProvider.writeCapacity | int | `1` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].name | string | `"dynamoDB"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].fromFieldPath | string | `"spec.location"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].toFieldPath | string | `"spec.forProvider.region"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].transforms[0].map.EU | string | `"eu-north-1"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].transforms[0].map.US | string | `"east-2"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].transforms[0].type | string | `"map"` | | +| crossplane-provider-apiextensions-composition.compositions[0].spec.resources[1].patches[0].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].name | string | `"eks-cluster"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.compositeTypeRef.apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.compositeTypeRef.kind | string | `"EKSCluster"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.mode | string | `"Pipeline"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].functionRef.name | string | `"patch-and-transform"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.apiVersion | string | `"pt.fn.crossplane.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.kind | string | `"Resources"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.patchSets[0].name | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.patchSets[0].patches[0].fromFieldPath | string | `"spec.parameters.region"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.patchSets[0].patches[0].toFieldPath | string | `"spec.forProvider.region"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.patchSets[0].patches[0].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].base.kind | string | `"VPC"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].base.spec.forProvider.enableDnsHostnames | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].base.spec.forProvider.enableDnsSupport | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].name | string | `"vpc"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].patches[1].fromFieldPath | string | `"spec.parameters.vpc-cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].patches[1].toFieldPath | string | `"spec.forProvider.cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[0].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].base.kind | string | `"RouteTable"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].base.spec.forProvider.region | string | `"PATCHED"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].name | string | `"routetable-public"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[10].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].base.kind | string | `"RouteTable"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].base.spec.forProvider.region | string | `"PATCHED"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].name | string | `"routetable-private-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[11].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].base.kind | string | `"RouteTable"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].base.spec.forProvider.region | string | `"PATCHED"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].name | string | `"routetable-private-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[12].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.apiVersion | string | `"eks.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.kind | string | `"Cluster"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.forProvider.vpcConfig[0].endpointPrivateAccess | bool | `false` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.forProvider.vpcConfig[0].endpointPublicAccess | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.forProvider.vpcConfig[0].subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.forProvider.vpcConfig[0].subnetIdSelector.matchLabels.visibility | string | `"private"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.writeConnectionSecretToRef.name | string | `"dev-connection-secret"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].base.spec.writeConnectionSecretToRef.namespace | string | `"crossplane-system"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].connectionDetails[0].fromConnectionSecretKey | string | `"kubeconfig"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].connectionDetails[0].name | string | `"kubeconfig-value"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].connectionDetails[0].type | string | `"FromConnectionSecretKey"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].name | string | `"eks-cluster"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[1].fromFieldPath | string | `"spec.parameters.k8s-version"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[1].toFieldPath | string | `"spec.forProvider.version"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].fromFieldPath | string | `"metadata.uid"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].toFieldPath | string | `"spec.writeConnectionSecretToRef.name"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].transforms[0].string.fmt | string | `"%s-ekscluster-connection"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].transforms[0].string.type | string | `"Format"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].transforms[0].type | string | `"string"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[3].fromFieldPath | string | `"spec.parameters.cluster-role"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[3].toFieldPath | string | `"spec.forProvider.roleArn"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[13].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[14].base.apiVersion | string | `"iam.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[14].base.kind | string | `"Role"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[14].base.spec.forProvider.assumeRolePolicy | string | `"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[14].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[14].name | string | `"role"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].base.apiVersion | string | `"iam.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].base.kind | string | `"RolePolicyAttachment"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].base.spec.forProvider.policyArn | string | `"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].base.spec.forProvider.roleSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[15].name | string | `"rolePolicyAttachment"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.apiVersion | string | `"eks.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.kind | string | `"NodeGroup"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.clusterNameSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.instanceTypes[0] | string | `"t3.medium"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.scalingConfig[0].minSize | int | `1` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.forProvider.subnetIdSelector.matchLabels.visibility | string | `"private"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].name | string | `"eks-nodegroup"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[1].fromFieldPath | string | `"spec.parameters.workers-size"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[1].toFieldPath | string | `"spec.forProvider.scalingConfig[0].desiredSize"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[2].fromFieldPath | string | `"spec.parameters.workers-size"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[2].toFieldPath | string | `"spec.forProvider.scalingConfig[0].maxSize"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].fromFieldPath | string | `"spec.parameters.workload-type"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].toFieldPath | string | `"spec.forProvider.amiType"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].transforms[0].map.gpu | string | `"x86_GPU"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].transforms[0].map.non-gpu | string | `"x86"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].transforms[0].type | string | `"map"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[4].fromFieldPath | string | `"spec.parameters.workernode-role"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[4].toFieldPath | string | `"spec.forProvider.nodeRoleArn"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[16].patches[4].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].base.kind | string | `"InternetGateway"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].base.metadata.labels.type | string | `"igw"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].name | string | `"internetgateway"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[1].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.kind | string | `"Subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.metadata.labels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.metadata.labels.visibility | string | `"public"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.spec.forProvider.mapPublicIpOnLaunch | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].name | string | `"subnet-public-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[1].fromFieldPath | string | `"spec.parameters.subnet1-public-cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[1].toFieldPath | string | `"spec.forProvider.cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[2].fromFieldPath | string | `"spec.parameters.subnet1-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[2].toFieldPath | string | `"spec.forProvider.availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[3].fromFieldPath | string | `"spec.parameters.subnet1-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[3].toFieldPath | string | `"metadata.labels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[2].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.kind | string | `"Subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.metadata.labels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.metadata.labels.visibility | string | `"public"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.spec.forProvider.mapPublicIpOnLaunch | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].name | string | `"subnet-public-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[1].fromFieldPath | string | `"spec.parameters.subnet2-public-cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[1].toFieldPath | string | `"spec.forProvider.cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[2].fromFieldPath | string | `"spec.parameters.subnet2-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[2].toFieldPath | string | `"spec.forProvider.availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[3].fromFieldPath | string | `"spec.parameters.subnet2-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[3].toFieldPath | string | `"metadata.labels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[3].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.kind | string | `"Subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.metadata.labels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.metadata.labels.visibility | string | `"private"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.spec.forProvider.mapPublicIpOnLaunch | bool | `false` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].name | string | `"subnet-private-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[1].fromFieldPath | string | `"spec.parameters.subnet1-private-cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[1].toFieldPath | string | `"spec.forProvider.cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[2].fromFieldPath | string | `"spec.parameters.subnet1-private-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[2].toFieldPath | string | `"spec.forProvider.availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[3].fromFieldPath | string | `"spec.parameters.subnet1-private-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[3].toFieldPath | string | `"metadata.labels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[4].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.kind | string | `"Subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.metadata.labels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.metadata.labels.visibility | string | `"private"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.spec.forProvider.mapPublicIpOnLaunch | bool | `false` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].name | string | `"subnet-private-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[1].fromFieldPath | string | `"spec.parameters.subnet2-private-cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[1].toFieldPath | string | `"spec.forProvider.cidrBlock"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[2].fromFieldPath | string | `"spec.parameters.subnet2-private-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[2].toFieldPath | string | `"spec.forProvider.availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[2].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[3].fromFieldPath | string | `"spec.parameters.subnet2-private-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[3].toFieldPath | string | `"metadata.labels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[5].patches[3].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].base.kind | string | `"EIP"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].base.metadata.labels.type | string | `"eip-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].base.spec.forProvider.domain | string | `"vpc"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].name | string | `"elastic-ip-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[6].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].base.kind | string | `"EIP"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].base.metadata.labels.type | string | `"eip-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].base.spec.forProvider.domain | string | `"vpc"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].name | string | `"elastic-ip-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[7].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.kind | string | `"NATGateway"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.metadata.labels.type | string | `"natgw-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.spec.forProvider.allocationIdSelector.matchLabels.type | string | `"eip-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.spec.forProvider.subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.spec.forProvider.subnetIdSelector.matchLabels.visibility | string | `"public"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].name | string | `"natgateway-1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].patches[1].fromFieldPath | string | `"spec.parameters.subnet1-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].patches[1].toFieldPath | string | `"spec.forProvider.subnetIdSelector.matchLabels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[8].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.apiVersion | string | `"ec2.aws.upbound.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.kind | string | `"NATGateway"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.metadata.labels.type | string | `"natgw-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.spec.forProvider.allocationIdSelector.matchLabels.type | string | `"eip-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.spec.forProvider.subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.spec.forProvider.subnetIdSelector.matchLabels.visibility | string | `"public"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].base.spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].name | string | `"natgateway-2"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].patches[0].patchSetName | string | `"common-parameters"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].patches[0].type | string | `"PatchSet"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].patches[1].fromFieldPath | string | `"spec.parameters.subnet2-public-availabilityZone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].patches[1].toFieldPath | string | `"spec.forProvider.subnetIdSelector.matchLabels.zone"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].input.resources[9].patches[1].type | string | `"FromCompositeFieldPath"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.pipeline[0].step | string | `"patch-and-transform"` | | +| crossplane-provider-apiextensions-composition.compositions[1].spec.writeConnectionSecretsToNamespace | string | `"crossplane-system"` | | +| crossplane-provider-apiextensions-composition.compositions[2].name | string | `"vpc"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.compositeTypeRef.apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.compositeTypeRef.kind | string | `"XVPC"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.mode | string | `"Pipeline"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].functionRef.name | string | `"go-templating"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].input.apiVersion | string | `"gotemplating.fn.crossplane.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].input.inline.template | string | `"{{ $claimNamespace := index $.observed.composite.resource.metadata.labels \"crossplane.io/claim-namespace\" }}\n{{ $tenantAwsProviderConfigRef := printf \"%s-aws\" $claimNamespace }}\n{{ $params := get .observed.composite.resource.spec \"parameters\" | default dict }}\n---\napiVersion: ec2.aws.crossplane.io/v1beta1\nkind: VPC\nmetadata:\n annotations:\n {{ setResourceNameAnnotation \"vpc\" }}\n crossplane.io/external-name: {{ get $params \"id\" | default ( print $claimNamespace \"-vpc\" ) }}\nspec:\n forProvider:\n region: {{ get $params \"region\" | default \"east-1\" }}\n vpcCidrBlock: {{ get $params \"vpcCIDRBlock\" | default \"192.168.0.0/16\" }}\n enableDnsSupport: true\n enableDnsHostNames: true\n instanceTenancy: default\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef }}\n"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].input.kind | string | `"GoTemplate"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].input.source | string | `"Inline"` | | +| crossplane-provider-apiextensions-composition.compositions[2].spec.pipeline[0].step | string | `"compose-resources"` | | +| crossplane-provider-apiextensions-composition.compositions[3].name | string | `"rdsinstance"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.compositeTypeRef.apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.compositeTypeRef.kind | string | `"XRDSInstance"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.mode | string | `"Pipeline"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].functionRef.name | string | `"go-templating"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].input.apiVersion | string | `"gotemplating.fn.crossplane.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].input.inline.template | string | `"{{ $claimNamespace := index $.observed.composite.resource.metadata.labels \"crossplane.io/claim-namespace\" }}\n{{ $claimNamespaceTrimmed := $claimNamespace | replace \"-\" \"\" }}\n{{ $tenantAwsProviderConfigRef := printf \"%s-aws\" $claimNamespace }}\n{{ $params := get .observed.composite.resource.spec \"parameters\" | default dict }}\n---\napiVersion: rds.aws.upbound.io/v1beta2\nkind: Instance\nmetadata:\n annotations:\n {{ setResourceNameAnnotation \"rdsInstance\" }}\n crossplane.io/external-name: {{ get $params \"id\" | default ( print $claimNamespace \"-rds-instance\" ) }}\nspec:\n forProvider:\n allocatedStorage: {{ get $params \"storage\" | default 20 }}\n autoGeneratePassword: true\n autoMinorVersionUpgrade: true\n backupRetentionPeriod: 14\n backupWindow: \"09:46-10:16\"\n dbName: {{ get $params \"name\" | default ( print $claimNamespaceTrimmed \"db\" ) }}\n engine: postgres\n engineVersion: \"16.1\" # 16.3? console shows RDS 16.1-R2 (PostgreSQL 13.1-R2)\n instanceClass: {{ printf \"db.t3.%s\" (get $params \"size\" | default \"micro\") }}\n maintenanceWindow: Mon:00:00-Mon:03:00\n passwordSecretRef:\n key: password\n name: {{ printf \"%s-rds-root\" $claimNamespace }}\n namespace: {{ $claimNamespace }}\n publiclyAccessible: false\n region: {{ printf \"%s-1\" (get $params \"region\" | default \"east\") }}\n skipFinalSnapshot: true\n storageEncrypted: true\n storageType: gp2\n username: adminuser\n writeConnectionSecretToRef:\n name: {{ printf \"%s-rds-connection-details\" $claimNamespace }}\n namespace: {{ $claimNamespace }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef }}\n"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].input.kind | string | `"GoTemplate"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].input.source | string | `"Inline"` | | +| crossplane-provider-apiextensions-composition.compositions[3].spec.pipeline[0].step | string | `"compose-resources"` | | +| crossplane-provider-apiextensions-composition.compositions[4].name | string | `"eksnetwork.api.example"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.compositeTypeRef.apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.compositeTypeRef.kind | string | `"XEKSNetwork"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.mode | string | `"Pipeline"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].functionRef.name | string | `"go-templating"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].input.apiVersion | string | `"gotemplating.fn.crossplane.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].input.inline.template | string | `"{{ $claimNamespace := index $.observed.composite.resource.metadata.labels \"crossplane.io/claim-namespace\" }}\n{{ $tenantAwsProviderConfigRef := printf \"%s-aws\" $claimNamespace }}\n{{ $params := get .observed.composite.resource.spec \"parameters\" | default dict }}\n---\n{{ $vpcResourceName := \"vpc\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: VPC\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $vpcResourceName }}\nspec:\n forProvider:\n cidrBlock: {{ $params.vpcCidrBlock | toYaml }}\n enableDnsHostnames: true\n enableDnsSupport: true\n tags:\n Name: {{ printf \"%s-%s\" $params.id $vpcResourceName | toYaml }}\n region: {{ $params.region | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n---\n{{ $igwResourceName := \"internet-gateway\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: InternetGateway\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $igwResourceName }}\nspec:\n forProvider:\n region: {{ $params.region | toYaml }}\n tags:\n Name: {{ printf \"%s-%s\" $params.id $igwResourceName | toYaml }}\n vpcIdSelector:\n matchControllerRef: true\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n{{ $region := $params.region | toYaml }}\n{{- range $i, $subnet := $params.subnets }}\n---\n{{ $subnetResourceName := printf \"subnet-%s-%s-%s\" $subnet.availabilityZone $subnet.type (toString $i) }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: Subnet\nmetadata:\n labels:\n zone: {{ $subnet.availabilityZone }}\n {{- if eq $subnet.type \"private\" }}\n access: private\n {{- else }}\n access: public\n {{- end }}\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $subnetResourceName }}\nspec:\n forProvider:\n cidrBlock: {{ $subnet.cidrBlock | toYaml }}\n {{ if eq $subnet.type \"public\" }}\n mapPublicIpOnLaunch: true\n {{ end }}\n tags:\n {{- if eq $subnet.type \"private\" }}\n kubernetes.io/role/internal-elb: \"1\"\n {{- else }}\n kubernetes.io/role/elb: \"1\"\n {{- end }}\n Name: {{ printf \"%s-%s\" $params.id $subnetResourceName | toYaml }}\n region: {{ $region }}\n vpcIdSelector:\n matchControllerRef: true\n availabilityZone: {{ $subnet.availabilityZone | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n{{- end }}\n---\n{{ $routeTableResourceName := \"route-table\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: RouteTable\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $routeTableResourceName }}\nspec:\n forProvider:\n vpcIdSelector:\n matchControllerRef: true\n region: {{ $params.region | toYaml }}\n tags:\n Name: {{ printf \"%s-%s\" $params.id $routeTableResourceName | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n---\n{{ $publicRouteResourceName := \"public-route\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: Route\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $publicRouteResourceName }}\nspec:\n forProvider:\n destinationCidrBlock: 0.0.0.0/0\n gatewayIdSelector:\n matchControllerRef: true\n routeTableIdSelector:\n matchControllerRef: true\n region: {{ $params.region | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n---\n{{ $mainRouteTableAssociationResourceName := \"main-route-table-association\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: MainRouteTableAssociation\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $mainRouteTableAssociationResourceName }}\nspec:\n forProvider:\n region: {{ $params.region | toYaml }}\n routeTableIdSelector:\n matchControllerRef: true\n vpcIdSelector:\n matchControllerRef: true\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n{{- range $i, $subnet := $params.subnets }}\n---\n{{ $routeTableAssociationResourceName := printf \"route-table-association-%s-%s-%s\" $subnet.availabilityZone $subnet.type (toString $i) }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: RouteTableAssociation\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $routeTableAssociationResourceName }}\nspec:\n forProvider:\n region: {{ $region }}\n routeTableIdSelector:\n matchControllerRef: true\n subnetIdSelector:\n matchControllerRef: true\n matchLabels:\n {{- if eq $subnet.type \"private\" }}\n access: private\n {{- else }}\n access: public\n {{- end }}\n zone: {{ $subnet.availabilityZone | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n{{- end }}\n---\n{{ $sgResourceName := \"security-group\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: SecurityGroup\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $sgResourceName }}\nspec:\n forProvider:\n description: Allow access to databases\n name: {{ printf \"%s-%s\" $params.id $sgResourceName | toYaml }}\n vpcIdSelector:\n matchControllerRef: true\n region: {{ $params.region | toYaml }}\n tags:\n Name: {{ printf \"%s-%s\" $params.id $sgResourceName | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n---\n{{ $sgrpRulePostGresResourceName := \"security-group-rule-postgres\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: SecurityGroupRule\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $sgrpRulePostGresResourceName }}\nspec:\n forProvider:\n cidrBlocks:\n - 192.168.0.0/16\n description: Everywhere\n fromPort: 5432\n protocol: tcp\n securityGroupIdSelector:\n matchControllerRef: true\n toPort: 5432\n type: ingress\n region: {{ $params.region | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n---\n{{ $sgrpRuleMySQLResourceName := \"security-group-rule-mysql\" }}\napiVersion: ec2.aws.upbound.io/v1beta1\nkind: SecurityGroupRule\nmetadata:\n labels:\n eksnetworks.api.example/network-id: {{ $params.id | toYaml }}\n annotations:\n {{ setResourceNameAnnotation $sgrpRuleMySQLResourceName }}\nspec:\n forProvider:\n cidrBlocks:\n - 192.168.0.0/16\n description: Everywhere\n fromPort: 3306\n protocol: tcp\n securityGroupIdSelector:\n matchControllerRef: true\n toPort: 3306\n type: ingress\n region: {{ $params.region | toYaml }}\n providerConfigRef:\n name: {{ $tenantAwsProviderConfigRef | toYaml }}\n"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].input.kind | string | `"GoTemplate"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].input.source | string | `"Inline"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[0].step | string | `"compose-resources"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].functionRef.name | string | `"go-templating"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].input.apiVersion | string | `"gotemplating.fn.crossplane.io/v1beta1"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].input.inline.template | string | `"{{ $observedResources := get .observed \"resources\" | default dict }}\n{{ $params := get .observed.composite.resource.spec \"parameters\" | default dict }}\n{{ $vpcStatus := dig \"vpc\" \"resource\" \"status\" dict $observedResources }}\n{{ $subnetsStatus := dict }}\n{{ range $i, $subnet := $params.subnets }}\n {{ $subnetResourceName := printf \"subnet-%s-%s-%s\" $subnet.availabilityZone $subnet.type (toString $i) }}\n {{ $subnetStatuses := dig $subnetResourceName \"resource\" \"status\" dict $observedResources }}\n {{ $subnetsStatus = merge $subnetsStatus (dict $subnetResourceName $subnetStatuses) }}\n{{ end }}\napiVersion: api.example/v1alpha1\nkind: XEKSNetwork\nstatus:\n vpc: {{ $vpcStatus | toYaml | nindent 4 }}\n subnets: {{ $subnetsStatus | toYaml | nindent 4 }}\n"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].input.kind | string | `"GoTemplate"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].input.source | string | `"Inline"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[1].step | string | `"set-xr-status"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[2].functionRef.name | string | `"auto-ready"` | | +| crossplane-provider-apiextensions-composition.compositions[4].spec.pipeline[2].step | string | `"automatically-detect-ready-composed-resources"` | | +| crossplane-provider-aws-ec2.eips[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-ec2.eips[0].spec.forProvider.domain | string | `"vpc"` | | +| crossplane-provider-aws-ec2.eips[0].spec.forProvider.region | string | `"west-2"` | | +| crossplane-provider-aws-ec2.eips[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.eips[1].name | string | `"dev-ekscluster-2"` | | +| crossplane-provider-aws-ec2.eips[1].spec.forProvider.domain | string | `"vpc"` | | +| crossplane-provider-aws-ec2.eips[1].spec.forProvider.region | string | `"west-2"` | | +| crossplane-provider-aws-ec2.eips[1].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.internetGateways | list | `[{"annotations":{},"labels":{},"name":"dev-ekscluster","ownerReferences":{},"spec":{"forProvider":{"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network","ownerReferences":{},"spec":{"forProvider":{"region":"east-1","tags":{"Name":"platform-ref-eks-network-internet-gateway"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}}]` | https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/InternetGateway/v1beta1 | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].labels | object | `{}` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].name | string | `"reference-eks-network"` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.mainRouteTableAssociations[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.natGateways | list | `[{"annotations":{},"labels":{},"name":"dev-ekscluster","ownerReferences":{},"spec":{"forProvider":{"allocationIdSelector":{"matchLabels":{"type":"eip-1"}},"region":"west-2","subnetIdSelector":{"matchLabels":{"type":"subnet","visibility":"public","zone":"west-2a"}}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"dev-ekscluster-2","ownerReferences":{},"spec":{"forProvider":{"allocationIdSelector":{"matchLabels":{"type":"eip-2"}},"region":"west-2","subnetIdSelector":{"matchLabels":{"type":"subnet","visibility":"public","zone":"west-2b"}}},"providerConfigRef":{"name":"dev-aws"}}}]` | https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/NATGateway/v1beta1 | +| crossplane-provider-aws-ec2.routeTableAssociations[0].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].labels | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].name | string | `"reference-eks-network-public"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.forProvider.subnetIdSelector.matchLabels.access | string | `"public"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.forProvider.subnetIdSelector.matchLabels.zone | string | `"east-1a"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].labels | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].name | string | `"reference-eks-network-private"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.forProvider.subnetIdSelector.matchLabels.access | string | `"private"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.forProvider.subnetIdSelector.matchLabels.zone | string | `"east-1a"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[1].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].labels | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].name | string | `"reference-eks-network-public-1b"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.forProvider.subnetIdSelector.matchLabels.access | string | `"public"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.forProvider.subnetIdSelector.matchLabels.zone | string | `"east-1b"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[2].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].labels | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].name | string | `"reference-eks-network-private-1b"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.forProvider.subnetIdSelector.matchLabels.access | string | `"private"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.forProvider.subnetIdSelector.matchLabels.zone | string | `"east-1b"` | | +| crossplane-provider-aws-ec2.routeTableAssociations[3].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.routeTables | list | `[{"name":"dev-ekscluster","spec":{"forProvider":{"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"name":"reference-eks-network","spec":{"forProvider":{"region":"east-1","tags":{"Name":"platform-ref-eks-network-route-table"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}}]` | https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/RouteTable/v1beta1 | +| crossplane-provider-aws-ec2.routes[0].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.routes[0].labels | object | `{}` | | +| crossplane-provider-aws-ec2.routes[0].name | string | `"reference-eks-network"` | | +| crossplane-provider-aws-ec2.routes[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.routes[0].spec.forProvider.destinationCidrBlock | string | `"0.0.0.0/0"` | | +| crossplane-provider-aws-ec2.routes[0].spec.forProvider.gatewayIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routes[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.routes[0].spec.forProvider.routeTableIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.routes[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].labels | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].name | string | `"reference-eks-network"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.cidrBlocks[0] | string | `"192.168.0.0/16"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.description | string | `"Everywhere"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.fromPort | int | `3306` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.protocol | string | `"tcp"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.securityGroupIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.toPort | int | `3306` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.forProvider.type | string | `"ingress"` | | +| crossplane-provider-aws-ec2.securityGroupRules[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].labels | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].name | string | `"reference-eks-network-5432"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.cidrBlocks[0] | string | `"192.168.0.0/16"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.description | string | `"Everywhere"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.fromPort | int | `5432` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.protocol | string | `"tcp"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.securityGroupIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.toPort | int | `5432` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.forProvider.type | string | `"ingress"` | | +| crossplane-provider-aws-ec2.securityGroupRules[1].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.securityGroups[0].annotations | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroups[0].labels | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroups[0].name | string | `"reference-eks-network"` | | +| crossplane-provider-aws-ec2.securityGroups[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.forProvider.description | string | `"Allow access to databases"` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.forProvider.name | string | `"platform-ref-eks-network-security-group"` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.forProvider.tags.Name | string | `"platform-ref-eks-network-security-group"` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.forProvider.vpcIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-ec2.securityGroups[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-ec2.subnets | list | `[{"annotations":{},"labels":{},"name":"dev-ekscluster","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"west-2a","cidrBlock":"192.168.50.0/24","mapPublicIpOnLaunch":false,"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"east-1a","cidrBlock":"192.168.128.0/18","region":"east-1","tags":{"Name":"platform-ref-eks-network-subnet-east-1a-private-2","kubernetes.io/role/internal-elb":"1"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network-public-0","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"east-1a","cidrBlock":"192.168.0.0/18","mapPublicIpOnLaunch":true,"region":"east-1","tags":{"Name":"platform-ref-eks-network-subnet-east-1a-public-0","kubernetes.io/role/elb":"1"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network-east-1b-private-3","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"east-1b","cidrBlock":"192.168.192.0/18","region":"east-1","tags":{"Name":"platform-ref-eks-network-subnet-east-1b-private-3","kubernetes.io/role/internal-elb":"1"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network-east-1b-public-1","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"east-1b","cidrBlock":"192.168.64.0/18","mapPublicIpOnLaunch":true,"region":"east-1","tags":{"Name":"platform-ref-eks-network-subnet-east-1b-public-1","kubernetes.io/role/elb":"1"},"vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"dev-ekscluster-2","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"west-2b","cidrBlock":"192.168.51.0/24","mapPublicIpOnLaunch":false,"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"dev-ekscluster-3","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"west-2b","cidrBlock":"192.168.49.0/24","mapPublicIpOnLaunch":true,"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"dev-ekscluster-4","ownerReferences":{},"spec":{"forProvider":{"availabilityZone":"west-2b","cidrBlock":"192.168.49.0/24","mapPublicIpOnLaunch":true,"region":"west-2","vpcIdSelector":{"matchControllerRef":true}},"providerConfigRef":{"name":"dev-aws"}}}]` | https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/Subnet/v1beta1 | +| crossplane-provider-aws-ec2.vpcs | list | `[{"annotations":{},"labels":{},"name":"dev-ekscluster","ownerReferences":{},"spec":{"forProvider":{"cidrBlock":"192.168.48.0/20","enableDnsHostnames":true,"enableDnsSupport":true,"region":"west-2"},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"reference-eks-network","ownerReferences":{},"spec":{"forProvider":{"cidrBlock":"192.168.0.0/16","enableDnsHostnames":true,"enableDnsSupport":true,"region":"east-1","tags":{"Name":"platform-ref-eks-network-vpc"}},"providerConfigRef":{"name":"dev-aws"}}},{"annotations":{},"labels":{},"name":"vpc-west-2","ownerReferences":{},"spec":{"forProvider":{"enableDnsHostNames":true,"enableDnsSupport":true,"instanceTenancy":"default","region":"west-2","vpcCidrBlock":"10.0.0.0/16"},"providerConfigRef":{"name":"dev-aws"}}}]` | https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/VPC/v1beta1 | +| crossplane-provider-aws-eks.clusters[0].annotations."crossplane.io/composition-resource-name" | string | `"eks-cluster"` | | +| crossplane-provider-aws-eks.clusters[0].labels."crossplane.io/claim-namespace" | string | `"dev-us"` | | +| crossplane-provider-aws-eks.clusters[0].labels."crossplane.io/composite" | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.clusters[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].blockOwnerDeletion | bool | `true` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].controller | bool | `true` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].kind | string | `"EKSCluster"` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.clusters[0].ownerReferences[0].uid | string | `""` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.region | string | `"west-2"` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.roleArn | string | `"arn:aws:iam::XXXX:role/EKS-Cluster-Role"` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.version | string | `"1.29"` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.vpcConfig[0].endpointPrivateAccess | bool | `false` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.vpcConfig[0].endpointPublicAccess | bool | `true` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.vpcConfig[0].subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-aws-eks.clusters[0].spec.forProvider.vpcConfig[0].subnetIdSelector.matchLabels.visibility | string | `"private"` | | +| crossplane-provider-aws-eks.clusters[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-eks.clusters[0].spec.publishConnectionDetailsTo | object | `{}` | | +| crossplane-provider-aws-eks.clusters[0].spec.writeConnectionSecretToRef.name | string | `"dev-connection-secret"` | | +| crossplane-provider-aws-eks.clusters[0].spec.writeConnectionSecretToRef.namespace | string | `"crossplane-system"` | | +| crossplane-provider-aws-eks.nodeGroups[0].annotations."crossplane.io/composition-resource-name" | string | `"eks-nodegroup"` | | +| crossplane-provider-aws-eks.nodeGroups[0].labels."crossplane.io/claim-namespace" | string | `"dev-us"` | | +| crossplane-provider-aws-eks.nodeGroups[0].labels."crossplane.io/composite" | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.nodeGroups[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].blockOwnerDeletion | bool | `true` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].controller | bool | `true` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].kind | string | `"EKSCluster"` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-eks.nodeGroups[0].ownerReferences[0].uid | string | `""` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.amiType | string | `"x86"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.clusterNameSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.instanceTypes[0] | string | `"t3.medium"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.nodeRoleArn | string | `"arn:aws:iam::XXXX:role/EKS-WorkerNode-Role"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.region | string | `"west-2"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.scalingConfig[0].desiredSize | int | `2` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.scalingConfig[0].maxSize | int | `2` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.scalingConfig[0].minSize | int | `1` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.subnetIdSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.subnetIdSelector.matchLabels.type | string | `"subnet"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.forProvider.subnetIdSelector.matchLabels.visibility | string | `"private"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.publishConnectionDetailsTo | object | `{}` | | +| crossplane-provider-aws-eks.nodeGroups[0].spec.writeConnectionSecretToRef | object | `{}` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].annotations."crossplane.io/composition-resource-name" | string | `"rolePolicyAttachment"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].labels."crossplane.io/claim-namespace" | string | `"dev-us"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].labels."crossplane.io/composite" | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].blockOwnerDeletion | bool | `true` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].controller | bool | `true` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].kind | string | `"EKSCluster"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].ownerReferences[0].uid | string | `""` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].spec.forProvider.policyArn | string | `"arn:aws:iam::aws:policy/AmazonEKSClusterPolicy"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].spec.forProvider.roleSelector.matchControllerRef | bool | `true` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].spec.publishConnectionDetailsTo | object | `{}` | | +| crossplane-provider-aws-iam.rolePolicyAttachments[0].spec.writeConnectionSecretToRef | object | `{}` | | +| crossplane-provider-aws-iam.roles[0].annotations."crossplane.io/composition-resource-name" | string | `"role"` | | +| crossplane-provider-aws-iam.roles[0].labels."crossplane.io/claim-namespace" | string | `"dev-us"` | | +| crossplane-provider-aws-iam.roles[0].labels."crossplane.io/composite" | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.roles[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].apiVersion | string | `"api.example/v1alpha1"` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].blockOwnerDeletion | bool | `true` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].controller | bool | `true` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].kind | string | `"EKSCluster"` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].name | string | `"dev-ekscluster"` | | +| crossplane-provider-aws-iam.roles[0].ownerReferences[0].uid | string | `""` | | +| crossplane-provider-aws-iam.roles[0].spec.forProvider.assumeRolePolicy | string | `"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"eks.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n"` | | +| crossplane-provider-aws-iam.roles[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-iam.roles[0].spec.publishConnectionDetailsTo | object | `{}` | | +| crossplane-provider-aws-iam.roles[0].spec.writeConnectionSecretToRef | object | `{}` | | +| crossplane-provider-aws-rdr.instances[0].annotations | object | `{}` | | +| crossplane-provider-aws-rdr.instances[0].labels | object | `{}` | | +| crossplane-provider-aws-rdr.instances[0].name | string | `"rds-instance"` | | +| crossplane-provider-aws-rdr.instances[0].ownerReferences | object | `{}` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.allocatedStorage | int | `20` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.autoGeneratePassword | bool | `true` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.autoMinorVersionUpgrade | bool | `true` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.backupRetentionPeriod | int | `14` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.backupWindow | string | `"09:46-10:16"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.dbName | string | `"clopsdevusdb"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.engine | string | `"postgres"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.engineVersion | string | `"16.1"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.instanceClass | string | `"db.t3.micro"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.maintenanceWindow | string | `"Mon:00:00-Mon:03:00"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.passwordSecretRef.key | string | `"password"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.passwordSecretRef.name | string | `"dev-rds-root"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.passwordSecretRef.namespace | string | `"dev-us"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.publiclyAccessible | bool | `false` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.region | string | `"east-1"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.skipFinalSnapshot | bool | `true` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.storageEncrypted | bool | `true` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.storageType | string | `"gp2"` | | +| crossplane-provider-aws-rdr.instances[0].spec.forProvider.username | string | `"adminuser"` | | +| crossplane-provider-aws-rdr.instances[0].spec.providerConfigRef.name | string | `"dev-aws"` | | +| crossplane-provider-aws-rdr.instances[0].spec.writeConnectionSecretToRef.name | string | `"dev-rds-connection-details"` | | +| crossplane-provider-aws-rdr.instances[0].spec.writeConnectionSecretToRef.namespace | string | `"dev-us"` | | +| crossplane-provider-configs.providerConfigs.btpSapCrossplane | list | `[]` | | +| crossplane-provider-configs.providerConfigs.gardenerOrchestrateCloud | list | `[]` | | +| crossplane-provider-configs.providerConfigs.helmCrossplane | list | `[]` | | +| crossplane-provider-configs.providerConfigs.kubernetesCrossplane | list | `[]` | | +| external-secrets-config.credentials | list | `[]` | | +| external-secrets-config.externalSecret[0].data[0].remoteRef.key | string | `""` | | +| external-secrets-config.externalSecret[0].data[0].remoteRef.property | string | `"kubeconfig"` | | +| external-secrets-config.externalSecret[0].data[0].secretKey | string | `"kubeconfig"` | | +| external-secrets-config.externalSecret[0].name | string | `""` | | +| external-secrets-config.externalSecret[0].namespace | string | `"default"` | | +| external-secrets-config.externalSecret[0].refreshInterval | string | `"15m"` | | +| external-secrets-config.externalSecret[0].secretStore.name | string | `"hashicorp-vault"` | | +| external-secrets-config.externalSecret[0].targetSecretName | string | `""` | | +| external-secrets-config.externalSecret[1].data[0].remoteRef.key | string | `""` | | +| external-secrets-config.externalSecret[1].data[0].remoteRef.property | string | `"btp-cis-provider-credentials"` | | +| external-secrets-config.externalSecret[1].data[0].secretKey | string | `"btp-cis-provider-credentials"` | | +| external-secrets-config.externalSecret[1].data[1].remoteRef.key | string | `""` | | +| external-secrets-config.externalSecret[1].data[1].remoteRef.property | string | `"btp-service-account-provider-credentials"` | | +| external-secrets-config.externalSecret[1].data[1].secretKey | string | `"btp-service-account-provider-credentials"` | | +| external-secrets-config.externalSecret[1].name | string | `"btp-account-test"` | | +| external-secrets-config.externalSecret[1].namespace | string | `"default"` | | +| external-secrets-config.externalSecret[1].refreshInterval | string | `"15m"` | | +| external-secrets-config.externalSecret[1].secretStore.name | string | `"hashicorp-vault"` | | +| external-secrets-config.externalSecret[1].targetSecretName | string | `"btp-account-test"` | | +| external-secrets-config.secretStores[0].name | string | `"hashicorp-vault"` | | +| external-secrets-config.secretStores[0].namespace | string | `"default"` | | +| external-secrets-config.secretStores[0].provider.vault.auth.appRole.path | string | `"approle"` | | +| external-secrets-config.secretStores[0].provider.vault.auth.appRole.roleId | string | `""` | | +| external-secrets-config.secretStores[0].provider.vault.auth.appRole.secretRef.key | string | `"token"` | | +| external-secrets-config.secretStores[0].provider.vault.auth.appRole.secretRef.name | string | `"hashicorp-vault-token"` | | +| external-secrets-config.secretStores[0].provider.vault.namespace | string | `"ns1"` | | +| external-secrets-config.secretStores[0].provider.vault.path | string | `"k8s-clusters"` | | +| external-secrets-config.secretStores[0].provider.vault.server | string | `"https://vault.example/"` | | +| external-secrets-config.secretStores[0].provider.vault.version | string | `"v2"` | | +| tags.crossplane-provider-apiextensions-composition | bool | `true` | | +| tags.crossplane-provider-aws-ec2 | bool | `true` | | +| tags.crossplane-provider-aws-eks | bool | `true` | | +| tags.crossplane-provider-aws-iam | bool | `true` | | +| tags.crossplane-provider-aws-rdr | bool | `true` | | +| tags.crossplane-provider-configs | bool | `true` | | +| tags.external-secrets-config | bool | `true` | | + +---------------------------------------------- +Autogenerated from chart metadata using [helm-docs v1.14.2](https://github.com/norwoodj/helm-docs/releases/v1.14.2) \ No newline at end of file diff --git a/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/README.md.gotmpl b/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/README.md.gotmpl new file mode 100644 index 0000000..354a702 --- /dev/null +++ b/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/README.md.gotmpl @@ -0,0 +1,21 @@ +# TL;DR +This template umbrella Helm Chart demonstrates the orchestration of AWS native cloud resources such as [Elastic Compute Cloud (EC2)](https://docs.aws.amazon.com/de_de/AWSEC2/latest/UserGuide/concepts.html), [Elastic Kubernetes Service (EKS)](https://docs.aws.amazon.com/de_de/eks/latest/userguide/what-is-eks.html) and some more. + +{{ template "chart.header" . }} +{{ template "chart.deprecationWarning" . }} + +{{ template "chart.badgesSection" . }} + +{{ template "chart.description" . }} + +{{ template "chart.homepageLine" . }} + +{{ template "chart.maintainersSection" . }} + +{{ template "chart.sourcesSection" . }} + +{{ template "chart.requirementsSection" . }} + +{{ template "chart.valuesSection" . }} + +{{ template "helm-docs.versionFooter" . }} \ No newline at end of file diff --git a/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/templates/.gitkeep b/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/templates/.gitkeep new file mode 100644 index 0000000..e69de29 diff --git a/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/values.yaml b/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/values.yaml new file mode 100644 index 0000000..3019025 --- /dev/null +++ b/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/values.yaml @@ -0,0 +1,1461 @@ +--- +###################################################################################################################################### +tags: # see ./Chart.yaml @url: https://helm.sh/docs/topics/charts/#tags-and-condition-fields-in-dependencies + external-secrets-config: true + crossplane-provider-configs: true + crossplane-provider-aws-ec2: true + crossplane-provider-aws-eks: true + crossplane-provider-aws-iam: true + crossplane-provider-aws-rdr: true + crossplane-provider-apiextensions-composition: true +###################################################################################################################################### +external-secrets-config: + secretStores: + - name: "hashicorp-vault" + namespace: "default" + # provider -- https://external-secrets.io/latest/api/spec/ + provider: + vault: + server: "https://vault.example/" + namespace: "ns1" + path: "k8s-clusters" + version: "v2" + auth: + # VaultAppRole authenticates with Vault using the + # App Role auth mechanism + # https://www.vaultproject.io/docs/auth/approle + appRole: + # Path where the App Role authentication backend is mounted + path: "approle" + # RoleID configured in the App Role authentication backend + roleId: "" + # Reference to a key in a K8 Secret that contains the App Role SecretId + secretRef: + name: "hashicorp-vault-token" + key: "token" + externalSecret: + - name: "" + namespace: "default" + refreshInterval: "15m" + targetSecretName: "" + secretStore: + name: "hashicorp-vault" + data: + - secretKey: kubeconfig + remoteRef: + key: "" + property: kubeconfig + - name: "btp-account-test" + namespace: "default" + refreshInterval: "15m" + targetSecretName: btp-account-test + secretStore: + name: "hashicorp-vault" + data: + - secretKey: btp-cis-provider-credentials + remoteRef: + key: "" + property: btp-cis-provider-credentials + - secretKey: btp-service-account-provider-credentials + remoteRef: + key: "" + property: btp-service-account-provider-credentials + #++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++# + credentials: [] + # - name: "hashicorp-vault-token" + # namespace: "default" + # stringData: + # token: "..." + # data: {} +###################################################################################################################################### +crossplane-provider-configs: + providerConfigs: + kubernetesCrossplane: [] + helmCrossplane: [] + gardenerOrchestrateCloud: [] + btpSapCrossplane: [] +######################################################################################################### +crossplane-provider-aws-ec2: + eips: + - name: "dev-ekscluster" + spec: + forProvider: + domain: vpc + region: west-2 + providerConfigRef: + name: dev-aws + - name: "dev-ekscluster-2" + spec: + forProvider: + domain: vpc + region: west-2 + providerConfigRef: + name: dev-aws + # -- https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/InternetGateway/v1beta1 + internetGateways: + - name: "dev-ekscluster" + labels: {} + annotations: {} + ownerReferences: {} + spec: + + forProvider: + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + - name: "reference-eks-network" + labels: {} + annotations: {} + ownerReferences: {} + spec: + + forProvider: + region: east-1 + tags: + Name: platform-ref-eks-network-internet-gateway + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + # -- https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/NATGateway/v1beta1 + natGateways: + - name: "dev-ekscluster" + labels: {} + annotations: {} + ownerReferences: {} + spec: + + forProvider: + allocationIdSelector: + matchLabels: + type: eip-1 + region: west-2 + subnetIdSelector: + matchLabels: + type: subnet + visibility: public + zone: west-2a + providerConfigRef: + name: dev-aws + - name: "dev-ekscluster-2" + labels: {} + annotations: {} + ownerReferences: {} + spec: + + forProvider: + allocationIdSelector: + matchLabels: + type: eip-2 + region: west-2 + subnetIdSelector: + matchLabels: + type: subnet + visibility: public + zone: west-2b + providerConfigRef: + name: dev-aws + securityGroups: + - name: "reference-eks-network" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + description: Allow access to databases + name: platform-ref-eks-network-security-group + region: east-1 + tags: + Name: platform-ref-eks-network-security-group + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + securityGroupRules: + - name: "reference-eks-network" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + cidrBlocks: + - 192.168.0.0/16 + description: Everywhere + fromPort: 3306 + protocol: tcp + region: east-1 + securityGroupIdSelector: + matchControllerRef: true + toPort: 3306 + type: ingress + providerConfigRef: + name: dev-aws + - name: "reference-eks-network-5432" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + cidrBlocks: + - 192.168.0.0/16 + description: Everywhere + fromPort: 5432 + protocol: tcp + region: east-1 + securityGroupIdSelector: + matchControllerRef: true + toPort: 5432 + type: ingress + providerConfigRef: + name: dev-aws + # -- https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/RouteTable/v1beta1 + routeTables: + - name: "dev-ekscluster" + spec: + forProvider: + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + - name: "reference-eks-network" + spec: + forProvider: + region: east-1 + tags: + Name: platform-ref-eks-network-route-table + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + + routeTableAssociations: + - name: "reference-eks-network-public" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + region: east-1 + routeTableIdSelector: + matchControllerRef: true + subnetIdSelector: + matchControllerRef: true + matchLabels: + access: public + zone: east-1a + providerConfigRef: + name: dev-aws + - name: "reference-eks-network-private" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + region: east-1 + routeTableIdSelector: + matchControllerRef: true + subnetIdSelector: + matchControllerRef: true + matchLabels: + access: private + zone: east-1a + providerConfigRef: + name: dev-aws + - name: "reference-eks-network-public-1b" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + region: east-1 + routeTableIdSelector: + matchControllerRef: true + subnetIdSelector: + matchControllerRef: true + matchLabels: + access: public + zone: east-1b + providerConfigRef: + name: dev-aws + - name: "reference-eks-network-private-1b" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + region: east-1 + routeTableIdSelector: + matchControllerRef: true + subnetIdSelector: + matchControllerRef: true + matchLabels: + access: private + zone: east-1b + providerConfigRef: + name: dev-aws + mainRouteTableAssociations: + - name: "reference-eks-network" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + region: east-1 + routeTableIdSelector: + matchControllerRef: true + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + routes: + - name: "reference-eks-network" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + destinationCidrBlock: 0.0.0.0/0 + gatewayIdSelector: + matchControllerRef: true + region: east-1 + routeTableIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + # -- https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/Subnet/v1beta1 + subnets: + - name: "dev-ekscluster" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + availabilityZone: west-2a + cidrBlock: 192.168.50.0/24 + mapPublicIpOnLaunch: false + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + - name: "reference-eks-network" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + availabilityZone: east-1a + cidrBlock: 192.168.128.0/18 + region: east-1 + tags: + Name: platform-ref-eks-network-subnet-east-1a-private-2 + kubernetes.io/role/internal-elb: "1" + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + - name: "reference-eks-network-public-0" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + availabilityZone: east-1a + cidrBlock: 192.168.0.0/18 + mapPublicIpOnLaunch: true + region: east-1 + tags: + Name: platform-ref-eks-network-subnet-east-1a-public-0 + kubernetes.io/role/elb: "1" + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + - name: "reference-eks-network-east-1b-private-3" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + availabilityZone: east-1b + cidrBlock: 192.168.192.0/18 + region: east-1 + tags: + Name: platform-ref-eks-network-subnet-east-1b-private-3 + kubernetes.io/role/internal-elb: "1" + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + - name: "reference-eks-network-east-1b-public-1" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + availabilityZone: east-1b + cidrBlock: 192.168.64.0/18 + mapPublicIpOnLaunch: true + region: east-1 + tags: + Name: platform-ref-eks-network-subnet-east-1b-public-1 + kubernetes.io/role/elb: "1" + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + - name: "dev-ekscluster-2" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + availabilityZone: west-2b + cidrBlock: 192.168.51.0/24 + mapPublicIpOnLaunch: false + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + - name: "dev-ekscluster-3" + labels: {} + annotations: {} + ownerReferences: {} + spec: + + forProvider: + availabilityZone: west-2b + cidrBlock: 192.168.49.0/24 + mapPublicIpOnLaunch: true + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + - name: "dev-ekscluster-4" + labels: {} + annotations: {} + ownerReferences: {} + spec: + + forProvider: + availabilityZone: west-2b + cidrBlock: 192.168.49.0/24 + mapPublicIpOnLaunch: true + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + # -- https://marketplace.upbound.io/providers/upbound/provider-aws-ec2/v1.11.0/resources/ec2.aws.upbound.io/VPC/v1beta1 + vpcs: + - name: "dev-ekscluster" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + cidrBlock: 192.168.48.0/20 + enableDnsHostnames: true + enableDnsSupport: true + region: west-2 + providerConfigRef: + name: dev-aws + - name: "reference-eks-network" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + cidrBlock: 192.168.0.0/16 + enableDnsHostnames: true + enableDnsSupport: true + region: east-1 + tags: + Name: platform-ref-eks-network-vpc + providerConfigRef: + name: dev-aws + - name: "vpc-west-2" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + enableDnsHostNames: true + enableDnsSupport: true + instanceTenancy: default + region: west-2 + vpcCidrBlock: 10.0.0.0/16 + providerConfigRef: + name: dev-aws +######################################################################################################### +crossplane-provider-aws-eks: + clusters: + - name: "dev-ekscluster" + labels: + crossplane.io/composite: dev-ekscluster + crossplane.io/claim-namespace: dev-us + annotations: + crossplane.io/composition-resource-name: eks-cluster + ownerReferences: + - apiVersion: api.example/v1alpha1 + blockOwnerDeletion: true + controller: true + kind: EKSCluster + name: dev-ekscluster + uid: "" + spec: + + forProvider: + region: west-2 + roleArn: arn:aws:iam::XXXX:role/EKS-Cluster-Role + version: "1.29" + vpcConfig: + - endpointPrivateAccess: false + endpointPublicAccess: true + subnetIdSelector: + matchLabels: + type: subnet + visibility: private + providerConfigRef: + name: dev-aws + writeConnectionSecretToRef: + name: dev-connection-secret + namespace: crossplane-system + publishConnectionDetailsTo: {} + nodeGroups: + - name: "dev-ekscluster" + labels: + crossplane.io/composite: dev-ekscluster + crossplane.io/claim-namespace: dev-us + annotations: + crossplane.io/composition-resource-name: eks-nodegroup + ownerReferences: + - apiVersion: api.example/v1alpha1 + blockOwnerDeletion: true + controller: true + kind: EKSCluster + name: dev-ekscluster + uid: "" + spec: + forProvider: + amiType: x86 + clusterNameSelector: + matchControllerRef: true + instanceTypes: + - t3.medium + nodeRoleArn: arn:aws:iam::XXXX:role/EKS-WorkerNode-Role + region: west-2 + scalingConfig: + - desiredSize: 2 + maxSize: 2 + minSize: 1 + subnetIdSelector: + matchControllerRef: true + matchLabels: + type: subnet + visibility: private + providerConfigRef: + name: dev-aws + publishConnectionDetailsTo: {} + writeConnectionSecretToRef: {} +######################################################################################################### +crossplane-provider-aws-iam: + roles: + - name: "dev-ekscluster" + labels: + crossplane.io/composite: dev-ekscluster + crossplane.io/claim-namespace: dev-us + annotations: + crossplane.io/composition-resource-name: role + ownerReferences: + - apiVersion: api.example/v1alpha1 + blockOwnerDeletion: true + controller: true + kind: EKSCluster + name: dev-ekscluster + uid: "" + spec: + + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "eks.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + providerConfigRef: + name: dev-aws + publishConnectionDetailsTo: {} + writeConnectionSecretToRef: {} + rolePolicyAttachments: + - name: "dev-ekscluster" + labels: + crossplane.io/composite: dev-ekscluster + crossplane.io/claim-namespace: dev-us + annotations: + crossplane.io/composition-resource-name: rolePolicyAttachment + ownerReferences: + - apiVersion: api.example/v1alpha1 + blockOwnerDeletion: true + controller: true + kind: EKSCluster + name: dev-ekscluster + uid: "" + spec: + + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonEKSClusterPolicy + roleSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + publishConnectionDetailsTo: {} + writeConnectionSecretToRef: {} +######################################################################################################### +crossplane-provider-aws-rdr: + instances: + - name: "rds-instance" + labels: {} + annotations: {} + ownerReferences: {} + spec: + forProvider: + allocatedStorage: 20 + autoGeneratePassword: true + autoMinorVersionUpgrade: true + backupRetentionPeriod: 14 + backupWindow: 09:46-10:16 + dbName: clopsdevusdb + engine: postgres + engineVersion: "16.1" + instanceClass: db.t3.micro + maintenanceWindow: Mon:00:00-Mon:03:00 + passwordSecretRef: + key: password + name: dev-rds-root + namespace: dev-us + publiclyAccessible: false + region: east-1 + skipFinalSnapshot: true + storageEncrypted: true + storageType: gp2 + username: adminuser + providerConfigRef: + name: dev-aws + writeConnectionSecretToRef: + name: dev-rds-connection-details + namespace: dev-us +######################################################################################################### +crossplane-provider-apiextensions-composition: + compositions: + - name: "nosqls.aws.api.example" + spec: + compositeTypeRef: + apiVersion: aws.api.example/v1alpha1 + kind: NoSQL + resources: + - name: s3Bucket + base: + apiVersion: s3.aws.upbound.io/v1beta1 + kind: Bucket + metadata: + name: basic-bucket + spec: + forProvider: + region: east-2 + providerConfigRef: + name: default + patches: + - type: FromCompositeFieldPath + fromFieldPath: "spec.location" + toFieldPath: "spec.forProvider.region" + transforms: + - type: map + map: + EU: "eu-north-1" + US: "east-2" + - name: dynamoDB + base: + apiVersion: dynamodb.aws.upbound.io/v1beta1 + kind: Table + metadata: + name: nosql-database + spec: + forProvider: + region: "east-2" + writeCapacity: 1 + readCapacity: 1 + attribute: + - name: S3ID + type: S + hashKey: S3ID + patches: + - type: FromCompositeFieldPath + fromFieldPath: "spec.location" + toFieldPath: "spec.forProvider.region" + transforms: + - type: map + map: + EU: "eu-north-1" + US: "east-2" + - name: "eks-cluster" + spec: + compositeTypeRef: + apiVersion: api.example/v1alpha1 + kind: EKSCluster + mode: "Pipeline" + writeConnectionSecretsToNamespace: "crossplane-system" + pipeline: + - functionRef: + name: patch-and-transform + input: + apiVersion: pt.fn.crossplane.io/v1beta1 + kind: Resources + patchSets: + - name: common-parameters + patches: + - fromFieldPath: spec.parameters.region + toFieldPath: spec.forProvider.region + type: FromCompositeFieldPath + resources: + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: VPC + spec: + forProvider: + enableDnsHostnames: true + enableDnsSupport: true + providerConfigRef: + name: dev-aws + name: vpc + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.vpc-cidrBlock + toFieldPath: spec.forProvider.cidrBlock + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: InternetGateway + metadata: + labels: + type: igw + spec: + forProvider: + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: internetgateway + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Subnet + metadata: + labels: + type: subnet + visibility: public + spec: + forProvider: + mapPublicIpOnLaunch: true + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: subnet-public-1 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet1-public-cidrBlock + toFieldPath: spec.forProvider.cidrBlock + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet1-public-availabilityZone + toFieldPath: spec.forProvider.availabilityZone + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet1-public-availabilityZone + toFieldPath: metadata.labels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Subnet + metadata: + labels: + type: subnet + visibility: public + spec: + forProvider: + mapPublicIpOnLaunch: true + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: subnet-public-2 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet2-public-cidrBlock + toFieldPath: spec.forProvider.cidrBlock + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet2-public-availabilityZone + toFieldPath: spec.forProvider.availabilityZone + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet2-public-availabilityZone + toFieldPath: metadata.labels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Subnet + metadata: + labels: + type: subnet + visibility: private + spec: + forProvider: + mapPublicIpOnLaunch: false + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: subnet-private-1 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet1-private-cidrBlock + toFieldPath: spec.forProvider.cidrBlock + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet1-private-availabilityZone + toFieldPath: spec.forProvider.availabilityZone + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet1-private-availabilityZone + toFieldPath: metadata.labels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Subnet + metadata: + labels: + type: subnet + visibility: private + spec: + forProvider: + mapPublicIpOnLaunch: false + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: subnet-private-2 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet2-private-cidrBlock + toFieldPath: spec.forProvider.cidrBlock + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet2-private-availabilityZone + toFieldPath: spec.forProvider.availabilityZone + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet2-private-availabilityZone + toFieldPath: metadata.labels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: EIP + metadata: + labels: + type: eip-1 + spec: + forProvider: + domain: vpc + providerConfigRef: + name: dev-aws + name: elastic-ip-1 + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: EIP + metadata: + labels: + type: eip-2 + spec: + forProvider: + domain: vpc + providerConfigRef: + name: dev-aws + name: elastic-ip-2 + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: NATGateway + metadata: + labels: + type: natgw-1 + spec: + forProvider: + allocationIdSelector: + matchLabels: + type: eip-1 + subnetIdSelector: + matchLabels: + type: subnet + visibility: public + providerConfigRef: + name: dev-aws + name: natgateway-1 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet1-public-availabilityZone + toFieldPath: spec.forProvider.subnetIdSelector.matchLabels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: NATGateway + metadata: + labels: + type: natgw-2 + spec: + forProvider: + allocationIdSelector: + matchLabels: + type: eip-2 + subnetIdSelector: + matchLabels: + type: subnet + visibility: public + providerConfigRef: + name: dev-aws + name: natgateway-2 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet2-public-availabilityZone + toFieldPath: spec.forProvider.subnetIdSelector.matchLabels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: RouteTable + spec: + forProvider: + region: PATCHED + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: routetable-public + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: RouteTable + spec: + forProvider: + region: PATCHED + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: routetable-private-1 + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: RouteTable + spec: + forProvider: + region: PATCHED + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: routetable-private-2 + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: eks.aws.upbound.io/v1beta1 + kind: Cluster + spec: + providerConfigRef: + name: dev-aws + forProvider: + vpcConfig: + - endpointPrivateAccess: false + endpointPublicAccess: true + subnetIdSelector: + matchLabels: + type: subnet + visibility: private + writeConnectionSecretToRef: + namespace: crossplane-system + name: dev-connection-secret + connectionDetails: + - fromConnectionSecretKey: kubeconfig + name: kubeconfig-value + type: FromConnectionSecretKey + name: eks-cluster + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.k8s-version + toFieldPath: spec.forProvider.version + type: FromCompositeFieldPath + - fromFieldPath: metadata.uid + toFieldPath: spec.writeConnectionSecretToRef.name + transforms: + - string: + fmt: '%s-ekscluster-connection' + type: Format + type: string + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.cluster-role + toFieldPath: spec.forProvider.roleArn + type: FromCompositeFieldPath + - base: + apiVersion: iam.aws.upbound.io/v1beta1 + kind: Role + spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "eks.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + providerConfigRef: + name: dev-aws + name: role + - base: + apiVersion: iam.aws.upbound.io/v1beta1 + kind: RolePolicyAttachment + spec: + forProvider: + roleSelector: + matchControllerRef: true + policyArn: arn:aws:iam::aws:policy/AmazonEKSClusterPolicy + providerConfigRef: + name: dev-aws + name: rolePolicyAttachment + - base: + apiVersion: eks.aws.upbound.io/v1beta1 + kind: NodeGroup + spec: + forProvider: + clusterNameSelector: + matchControllerRef: true + instanceTypes: + - t3.medium + scalingConfig: + - minSize: 1 + subnetIdSelector: + matchControllerRef: true + matchLabels: + type: subnet + visibility: private + providerConfigRef: + name: dev-aws + name: eks-nodegroup + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.workers-size + toFieldPath: spec.forProvider.scalingConfig[0].desiredSize + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.workers-size + toFieldPath: spec.forProvider.scalingConfig[0].maxSize + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.workload-type + toFieldPath: spec.forProvider.amiType + transforms: + - map: + gpu: x86_GPU + non-gpu: x86 + type: map + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.workernode-role + toFieldPath: spec.forProvider.nodeRoleArn + type: FromCompositeFieldPath + step: patch-and-transform + - name: "vpc" + spec: + compositeTypeRef: + apiVersion: api.example/v1alpha1 + kind: XVPC + mode: "Pipeline" + pipeline: + - step: compose-resources + functionRef: + name: go-templating + input: + apiVersion: gotemplating.fn.crossplane.io/v1beta1 + kind: GoTemplate + source: Inline + inline: + template: | + {{ $claimNamespace := index $.observed.composite.resource.metadata.labels "crossplane.io/claim-namespace" }} + {{ $tenantAwsProviderConfigRef := printf "%s-aws" $claimNamespace }} + {{ $params := get .observed.composite.resource.spec "parameters" | default dict }} + --- + apiVersion: ec2.aws.crossplane.io/v1beta1 + kind: VPC + metadata: + annotations: + {{ setResourceNameAnnotation "vpc" }} + crossplane.io/external-name: {{ get $params "id" | default ( print $claimNamespace "-vpc" ) }} + spec: + forProvider: + region: {{ get $params "region" | default "east-1" }} + vpcCidrBlock: {{ get $params "vpcCIDRBlock" | default "192.168.0.0/16" }} + enableDnsSupport: true + enableDnsHostNames: true + instanceTenancy: default + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef }} + - name: "rdsinstance" + spec: + compositeTypeRef: + apiVersion: api.example/v1alpha1 + kind: XRDSInstance + mode: "Pipeline" + pipeline: + - step: compose-resources + functionRef: + name: go-templating + input: + apiVersion: gotemplating.fn.crossplane.io/v1beta1 + kind: GoTemplate + source: Inline + inline: + template: | + {{ $claimNamespace := index $.observed.composite.resource.metadata.labels "crossplane.io/claim-namespace" }} + {{ $claimNamespaceTrimmed := $claimNamespace | replace "-" "" }} + {{ $tenantAwsProviderConfigRef := printf "%s-aws" $claimNamespace }} + {{ $params := get .observed.composite.resource.spec "parameters" | default dict }} + --- + apiVersion: rds.aws.upbound.io/v1beta2 + kind: Instance + metadata: + annotations: + {{ setResourceNameAnnotation "rdsInstance" }} + crossplane.io/external-name: {{ get $params "id" | default ( print $claimNamespace "-rds-instance" ) }} + spec: + forProvider: + allocatedStorage: {{ get $params "storage" | default 20 }} + autoGeneratePassword: true + autoMinorVersionUpgrade: true + backupRetentionPeriod: 14 + backupWindow: "09:46-10:16" + dbName: {{ get $params "name" | default ( print $claimNamespaceTrimmed "db" ) }} + engine: postgres + engineVersion: "16.1" # 16.3? console shows RDS 16.1-R2 (PostgreSQL 13.1-R2) + instanceClass: {{ printf "db.t3.%s" (get $params "size" | default "micro") }} + maintenanceWindow: Mon:00:00-Mon:03:00 + passwordSecretRef: + key: password + name: {{ printf "%s-rds-root" $claimNamespace }} + namespace: {{ $claimNamespace }} + publiclyAccessible: false + region: {{ printf "%s-1" (get $params "region" | default "east") }} + skipFinalSnapshot: true + storageEncrypted: true + storageType: gp2 + username: adminuser + writeConnectionSecretToRef: + name: {{ printf "%s-rds-connection-details" $claimNamespace }} + namespace: {{ $claimNamespace }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef }} + - name: "eksnetwork.api.example" + spec: + compositeTypeRef: + apiVersion: api.example/v1alpha1 + kind: XEKSNetwork + mode: "Pipeline" + pipeline: + - step: compose-resources + functionRef: + name: go-templating + input: + apiVersion: gotemplating.fn.crossplane.io/v1beta1 + kind: GoTemplate + source: Inline + inline: + template: | + {{ $claimNamespace := index $.observed.composite.resource.metadata.labels "crossplane.io/claim-namespace" }} + {{ $tenantAwsProviderConfigRef := printf "%s-aws" $claimNamespace }} + {{ $params := get .observed.composite.resource.spec "parameters" | default dict }} + --- + {{ $vpcResourceName := "vpc" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: VPC + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $vpcResourceName }} + spec: + forProvider: + cidrBlock: {{ $params.vpcCidrBlock | toYaml }} + enableDnsHostnames: true + enableDnsSupport: true + tags: + Name: {{ printf "%s-%s" $params.id $vpcResourceName | toYaml }} + region: {{ $params.region | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + --- + {{ $igwResourceName := "internet-gateway" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: InternetGateway + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $igwResourceName }} + spec: + forProvider: + region: {{ $params.region | toYaml }} + tags: + Name: {{ printf "%s-%s" $params.id $igwResourceName | toYaml }} + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + {{ $region := $params.region | toYaml }} + {{- range $i, $subnet := $params.subnets }} + --- + {{ $subnetResourceName := printf "subnet-%s-%s-%s" $subnet.availabilityZone $subnet.type (toString $i) }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Subnet + metadata: + labels: + zone: {{ $subnet.availabilityZone }} + {{- if eq $subnet.type "private" }} + access: private + {{- else }} + access: public + {{- end }} + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $subnetResourceName }} + spec: + forProvider: + cidrBlock: {{ $subnet.cidrBlock | toYaml }} + {{ if eq $subnet.type "public" }} + mapPublicIpOnLaunch: true + {{ end }} + tags: + {{- if eq $subnet.type "private" }} + kubernetes.io/role/internal-elb: "1" + {{- else }} + kubernetes.io/role/elb: "1" + {{- end }} + Name: {{ printf "%s-%s" $params.id $subnetResourceName | toYaml }} + region: {{ $region }} + vpcIdSelector: + matchControllerRef: true + availabilityZone: {{ $subnet.availabilityZone | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + {{- end }} + --- + {{ $routeTableResourceName := "route-table" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: RouteTable + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $routeTableResourceName }} + spec: + forProvider: + vpcIdSelector: + matchControllerRef: true + region: {{ $params.region | toYaml }} + tags: + Name: {{ printf "%s-%s" $params.id $routeTableResourceName | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + --- + {{ $publicRouteResourceName := "public-route" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Route + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $publicRouteResourceName }} + spec: + forProvider: + destinationCidrBlock: 0.0.0.0/0 + gatewayIdSelector: + matchControllerRef: true + routeTableIdSelector: + matchControllerRef: true + region: {{ $params.region | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + --- + {{ $mainRouteTableAssociationResourceName := "main-route-table-association" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: MainRouteTableAssociation + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $mainRouteTableAssociationResourceName }} + spec: + forProvider: + region: {{ $params.region | toYaml }} + routeTableIdSelector: + matchControllerRef: true + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + {{- range $i, $subnet := $params.subnets }} + --- + {{ $routeTableAssociationResourceName := printf "route-table-association-%s-%s-%s" $subnet.availabilityZone $subnet.type (toString $i) }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: RouteTableAssociation + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $routeTableAssociationResourceName }} + spec: + forProvider: + region: {{ $region }} + routeTableIdSelector: + matchControllerRef: true + subnetIdSelector: + matchControllerRef: true + matchLabels: + {{- if eq $subnet.type "private" }} + access: private + {{- else }} + access: public + {{- end }} + zone: {{ $subnet.availabilityZone | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + {{- end }} + --- + {{ $sgResourceName := "security-group" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: SecurityGroup + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $sgResourceName }} + spec: + forProvider: + description: Allow access to databases + name: {{ printf "%s-%s" $params.id $sgResourceName | toYaml }} + vpcIdSelector: + matchControllerRef: true + region: {{ $params.region | toYaml }} + tags: + Name: {{ printf "%s-%s" $params.id $sgResourceName | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + --- + {{ $sgrpRulePostGresResourceName := "security-group-rule-postgres" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: SecurityGroupRule + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $sgrpRulePostGresResourceName }} + spec: + forProvider: + cidrBlocks: + - 192.168.0.0/16 + description: Everywhere + fromPort: 5432 + protocol: tcp + securityGroupIdSelector: + matchControllerRef: true + toPort: 5432 + type: ingress + region: {{ $params.region | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + --- + {{ $sgrpRuleMySQLResourceName := "security-group-rule-mysql" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: SecurityGroupRule + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $sgrpRuleMySQLResourceName }} + spec: + forProvider: + cidrBlocks: + - 192.168.0.0/16 + description: Everywhere + fromPort: 3306 + protocol: tcp + securityGroupIdSelector: + matchControllerRef: true + toPort: 3306 + type: ingress + region: {{ $params.region | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + - step: set-xr-status + functionRef: + name: go-templating + input: + apiVersion: gotemplating.fn.crossplane.io/v1beta1 + kind: GoTemplate + source: Inline + inline: + template: | + {{ $observedResources := get .observed "resources" | default dict }} + {{ $params := get .observed.composite.resource.spec "parameters" | default dict }} + {{ $vpcStatus := dig "vpc" "resource" "status" dict $observedResources }} + {{ $subnetsStatus := dict }} + {{ range $i, $subnet := $params.subnets }} + {{ $subnetResourceName := printf "subnet-%s-%s-%s" $subnet.availabilityZone $subnet.type (toString $i) }} + {{ $subnetStatuses := dig $subnetResourceName "resource" "status" dict $observedResources }} + {{ $subnetsStatus = merge $subnetsStatus (dict $subnetResourceName $subnetStatuses) }} + {{ end }} + apiVersion: api.example/v1alpha1 + kind: XEKSNetwork + status: + vpc: {{ $vpcStatus | toYaml | nindent 4 }} + subnets: {{ $subnetsStatus | toYaml | nindent 4 }} + - step: automatically-detect-ready-composed-resources + functionRef: + name: auto-ready + +######################################################################################################### diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-apiextensions-composition/templates/compostions-apiextensions-crossplane-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-apiextensions-composition/templates/compostions-apiextensions-crossplane-io.yaml new file mode 100644 index 0000000..533e29c --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-apiextensions-composition/templates/compostions-apiextensions-crossplane-io.yaml @@ -0,0 +1,822 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-apiextensions-composition/templates/compostions-apiextensions-crossplane-io.yaml +apiVersion: apiextensions.crossplane.io/v1 +kind: Composition +metadata: + name: nosqls.aws.api.example +spec: + compositeTypeRef: + apiVersion: aws.api.example/v1alpha1 + kind: NoSQL + resources: + - base: + apiVersion: s3.aws.upbound.io/v1beta1 + kind: Bucket + metadata: + name: basic-bucket + spec: + forProvider: + region: east-2 + providerConfigRef: + name: default + name: s3Bucket + patches: + - fromFieldPath: spec.location + toFieldPath: spec.forProvider.region + transforms: + - map: + EU: eu-north-1 + US: east-2 + type: map + type: FromCompositeFieldPath + - base: + apiVersion: dynamodb.aws.upbound.io/v1beta1 + kind: Table + metadata: + name: nosql-database + spec: + forProvider: + attribute: + - name: S3ID + type: S + hashKey: S3ID + readCapacity: 1 + region: east-2 + writeCapacity: 1 + name: dynamoDB + patches: + - fromFieldPath: spec.location + toFieldPath: spec.forProvider.region + transforms: + - map: + EU: eu-north-1 + US: east-2 + type: map + type: FromCompositeFieldPath +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-apiextensions-composition/templates/compostions-apiextensions-crossplane-io.yaml +apiVersion: apiextensions.crossplane.io/v1 +kind: Composition +metadata: + name: eks-cluster +spec: + compositeTypeRef: + apiVersion: api.example/v1alpha1 + kind: EKSCluster + mode: "Pipeline" + writeConnectionSecretsToNamespace: "crossplane-system" + pipeline: + - functionRef: + name: patch-and-transform + input: + apiVersion: pt.fn.crossplane.io/v1beta1 + kind: Resources + patchSets: + - name: common-parameters + patches: + - fromFieldPath: spec.parameters.region + toFieldPath: spec.forProvider.region + type: FromCompositeFieldPath + resources: + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: VPC + spec: + forProvider: + enableDnsHostnames: true + enableDnsSupport: true + providerConfigRef: + name: dev-aws + name: vpc + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.vpc-cidrBlock + toFieldPath: spec.forProvider.cidrBlock + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: InternetGateway + metadata: + labels: + type: igw + spec: + forProvider: + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: internetgateway + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Subnet + metadata: + labels: + type: subnet + visibility: public + spec: + forProvider: + mapPublicIpOnLaunch: true + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: subnet-public-1 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet1-public-cidrBlock + toFieldPath: spec.forProvider.cidrBlock + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet1-public-availabilityZone + toFieldPath: spec.forProvider.availabilityZone + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet1-public-availabilityZone + toFieldPath: metadata.labels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Subnet + metadata: + labels: + type: subnet + visibility: public + spec: + forProvider: + mapPublicIpOnLaunch: true + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: subnet-public-2 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet2-public-cidrBlock + toFieldPath: spec.forProvider.cidrBlock + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet2-public-availabilityZone + toFieldPath: spec.forProvider.availabilityZone + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet2-public-availabilityZone + toFieldPath: metadata.labels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Subnet + metadata: + labels: + type: subnet + visibility: private + spec: + forProvider: + mapPublicIpOnLaunch: false + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: subnet-private-1 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet1-private-cidrBlock + toFieldPath: spec.forProvider.cidrBlock + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet1-private-availabilityZone + toFieldPath: spec.forProvider.availabilityZone + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet1-private-availabilityZone + toFieldPath: metadata.labels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Subnet + metadata: + labels: + type: subnet + visibility: private + spec: + forProvider: + mapPublicIpOnLaunch: false + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: subnet-private-2 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet2-private-cidrBlock + toFieldPath: spec.forProvider.cidrBlock + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet2-private-availabilityZone + toFieldPath: spec.forProvider.availabilityZone + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.subnet2-private-availabilityZone + toFieldPath: metadata.labels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: EIP + metadata: + labels: + type: eip-1 + spec: + forProvider: + domain: vpc + providerConfigRef: + name: dev-aws + name: elastic-ip-1 + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: EIP + metadata: + labels: + type: eip-2 + spec: + forProvider: + domain: vpc + providerConfigRef: + name: dev-aws + name: elastic-ip-2 + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: NATGateway + metadata: + labels: + type: natgw-1 + spec: + forProvider: + allocationIdSelector: + matchLabels: + type: eip-1 + subnetIdSelector: + matchLabels: + type: subnet + visibility: public + providerConfigRef: + name: dev-aws + name: natgateway-1 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet1-public-availabilityZone + toFieldPath: spec.forProvider.subnetIdSelector.matchLabels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: NATGateway + metadata: + labels: + type: natgw-2 + spec: + forProvider: + allocationIdSelector: + matchLabels: + type: eip-2 + subnetIdSelector: + matchLabels: + type: subnet + visibility: public + providerConfigRef: + name: dev-aws + name: natgateway-2 + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.subnet2-public-availabilityZone + toFieldPath: spec.forProvider.subnetIdSelector.matchLabels.zone + type: FromCompositeFieldPath + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: RouteTable + spec: + forProvider: + region: PATCHED + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: routetable-public + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: RouteTable + spec: + forProvider: + region: PATCHED + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: routetable-private-1 + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: RouteTable + spec: + forProvider: + region: PATCHED + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: routetable-private-2 + patches: + - patchSetName: common-parameters + type: PatchSet + - base: + apiVersion: eks.aws.upbound.io/v1beta1 + kind: Cluster + spec: + forProvider: + vpcConfig: + - endpointPrivateAccess: false + endpointPublicAccess: true + subnetIdSelector: + matchLabels: + type: subnet + visibility: private + providerConfigRef: + name: dev-aws + writeConnectionSecretToRef: + name: dev-connection-secret + namespace: crossplane-system + connectionDetails: + - fromConnectionSecretKey: kubeconfig + name: kubeconfig-value + type: FromConnectionSecretKey + name: eks-cluster + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.k8s-version + toFieldPath: spec.forProvider.version + type: FromCompositeFieldPath + - fromFieldPath: metadata.uid + toFieldPath: spec.writeConnectionSecretToRef.name + transforms: + - string: + fmt: '%s-ekscluster-connection' + type: Format + type: string + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.cluster-role + toFieldPath: spec.forProvider.roleArn + type: FromCompositeFieldPath + - base: + apiVersion: iam.aws.upbound.io/v1beta1 + kind: Role + spec: + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "eks.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + providerConfigRef: + name: dev-aws + name: role + - base: + apiVersion: iam.aws.upbound.io/v1beta1 + kind: RolePolicyAttachment + spec: + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonEKSClusterPolicy + roleSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws + name: rolePolicyAttachment + - base: + apiVersion: eks.aws.upbound.io/v1beta1 + kind: NodeGroup + spec: + forProvider: + clusterNameSelector: + matchControllerRef: true + instanceTypes: + - t3.medium + scalingConfig: + - minSize: 1 + subnetIdSelector: + matchControllerRef: true + matchLabels: + type: subnet + visibility: private + providerConfigRef: + name: dev-aws + name: eks-nodegroup + patches: + - patchSetName: common-parameters + type: PatchSet + - fromFieldPath: spec.parameters.workers-size + toFieldPath: spec.forProvider.scalingConfig[0].desiredSize + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.workers-size + toFieldPath: spec.forProvider.scalingConfig[0].maxSize + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.workload-type + toFieldPath: spec.forProvider.amiType + transforms: + - map: + gpu: x86_GPU + non-gpu: x86 + type: map + type: FromCompositeFieldPath + - fromFieldPath: spec.parameters.workernode-role + toFieldPath: spec.forProvider.nodeRoleArn + type: FromCompositeFieldPath + step: patch-and-transform +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-apiextensions-composition/templates/compostions-apiextensions-crossplane-io.yaml +apiVersion: apiextensions.crossplane.io/v1 +kind: Composition +metadata: + name: vpc +spec: + compositeTypeRef: + apiVersion: api.example/v1alpha1 + kind: XVPC + mode: "Pipeline" + pipeline: + - functionRef: + name: go-templating + input: + apiVersion: gotemplating.fn.crossplane.io/v1beta1 + inline: + template: | + {{ $claimNamespace := index $.observed.composite.resource.metadata.labels "crossplane.io/claim-namespace" }} + {{ $tenantAwsProviderConfigRef := printf "%s-aws" $claimNamespace }} + {{ $params := get .observed.composite.resource.spec "parameters" | default dict }} + --- + apiVersion: ec2.aws.crossplane.io/v1beta1 + kind: VPC + metadata: + annotations: + {{ setResourceNameAnnotation "vpc" }} + crossplane.io/external-name: {{ get $params "id" | default ( print $claimNamespace "-vpc" ) }} + spec: + forProvider: + region: {{ get $params "region" | default "east-1" }} + vpcCidrBlock: {{ get $params "vpcCIDRBlock" | default "192.168.0.0/16" }} + enableDnsSupport: true + enableDnsHostNames: true + instanceTenancy: default + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef }} + kind: GoTemplate + source: Inline + step: compose-resources +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-apiextensions-composition/templates/compostions-apiextensions-crossplane-io.yaml +apiVersion: apiextensions.crossplane.io/v1 +kind: Composition +metadata: + name: rdsinstance +spec: + compositeTypeRef: + apiVersion: api.example/v1alpha1 + kind: XRDSInstance + mode: "Pipeline" + pipeline: + - functionRef: + name: go-templating + input: + apiVersion: gotemplating.fn.crossplane.io/v1beta1 + inline: + template: | + {{ $claimNamespace := index $.observed.composite.resource.metadata.labels "crossplane.io/claim-namespace" }} + {{ $claimNamespaceTrimmed := $claimNamespace | replace "-" "" }} + {{ $tenantAwsProviderConfigRef := printf "%s-aws" $claimNamespace }} + {{ $params := get .observed.composite.resource.spec "parameters" | default dict }} + --- + apiVersion: rds.aws.upbound.io/v1beta2 + kind: Instance + metadata: + annotations: + {{ setResourceNameAnnotation "rdsInstance" }} + crossplane.io/external-name: {{ get $params "id" | default ( print $claimNamespace "-rds-instance" ) }} + spec: + forProvider: + allocatedStorage: {{ get $params "storage" | default 20 }} + autoGeneratePassword: true + autoMinorVersionUpgrade: true + backupRetentionPeriod: 14 + backupWindow: "09:46-10:16" + dbName: {{ get $params "name" | default ( print $claimNamespaceTrimmed "db" ) }} + engine: postgres + engineVersion: "16.1" # 16.3? console shows RDS 16.1-R2 (PostgreSQL 13.1-R2) + instanceClass: {{ printf "db.t3.%s" (get $params "size" | default "micro") }} + maintenanceWindow: Mon:00:00-Mon:03:00 + passwordSecretRef: + key: password + name: {{ printf "%s-rds-root" $claimNamespace }} + namespace: {{ $claimNamespace }} + publiclyAccessible: false + region: {{ printf "%s-1" (get $params "region" | default "east") }} + skipFinalSnapshot: true + storageEncrypted: true + storageType: gp2 + username: adminuser + writeConnectionSecretToRef: + name: {{ printf "%s-rds-connection-details" $claimNamespace }} + namespace: {{ $claimNamespace }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef }} + kind: GoTemplate + source: Inline + step: compose-resources +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-apiextensions-composition/templates/compostions-apiextensions-crossplane-io.yaml +apiVersion: apiextensions.crossplane.io/v1 +kind: Composition +metadata: + name: eksnetwork.api.example +spec: + compositeTypeRef: + apiVersion: api.example/v1alpha1 + kind: XEKSNetwork + mode: "Pipeline" + pipeline: + - functionRef: + name: go-templating + input: + apiVersion: gotemplating.fn.crossplane.io/v1beta1 + inline: + template: | + {{ $claimNamespace := index $.observed.composite.resource.metadata.labels "crossplane.io/claim-namespace" }} + {{ $tenantAwsProviderConfigRef := printf "%s-aws" $claimNamespace }} + {{ $params := get .observed.composite.resource.spec "parameters" | default dict }} + --- + {{ $vpcResourceName := "vpc" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: VPC + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $vpcResourceName }} + spec: + forProvider: + cidrBlock: {{ $params.vpcCidrBlock | toYaml }} + enableDnsHostnames: true + enableDnsSupport: true + tags: + Name: {{ printf "%s-%s" $params.id $vpcResourceName | toYaml }} + region: {{ $params.region | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + --- + {{ $igwResourceName := "internet-gateway" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: InternetGateway + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $igwResourceName }} + spec: + forProvider: + region: {{ $params.region | toYaml }} + tags: + Name: {{ printf "%s-%s" $params.id $igwResourceName | toYaml }} + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + {{ $region := $params.region | toYaml }} + {{- range $i, $subnet := $params.subnets }} + --- + {{ $subnetResourceName := printf "subnet-%s-%s-%s" $subnet.availabilityZone $subnet.type (toString $i) }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Subnet + metadata: + labels: + zone: {{ $subnet.availabilityZone }} + {{- if eq $subnet.type "private" }} + access: private + {{- else }} + access: public + {{- end }} + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $subnetResourceName }} + spec: + forProvider: + cidrBlock: {{ $subnet.cidrBlock | toYaml }} + {{ if eq $subnet.type "public" }} + mapPublicIpOnLaunch: true + {{ end }} + tags: + {{- if eq $subnet.type "private" }} + kubernetes.io/role/internal-elb: "1" + {{- else }} + kubernetes.io/role/elb: "1" + {{- end }} + Name: {{ printf "%s-%s" $params.id $subnetResourceName | toYaml }} + region: {{ $region }} + vpcIdSelector: + matchControllerRef: true + availabilityZone: {{ $subnet.availabilityZone | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + {{- end }} + --- + {{ $routeTableResourceName := "route-table" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: RouteTable + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $routeTableResourceName }} + spec: + forProvider: + vpcIdSelector: + matchControllerRef: true + region: {{ $params.region | toYaml }} + tags: + Name: {{ printf "%s-%s" $params.id $routeTableResourceName | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + --- + {{ $publicRouteResourceName := "public-route" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: Route + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $publicRouteResourceName }} + spec: + forProvider: + destinationCidrBlock: 0.0.0.0/0 + gatewayIdSelector: + matchControllerRef: true + routeTableIdSelector: + matchControllerRef: true + region: {{ $params.region | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + --- + {{ $mainRouteTableAssociationResourceName := "main-route-table-association" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: MainRouteTableAssociation + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $mainRouteTableAssociationResourceName }} + spec: + forProvider: + region: {{ $params.region | toYaml }} + routeTableIdSelector: + matchControllerRef: true + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + {{- range $i, $subnet := $params.subnets }} + --- + {{ $routeTableAssociationResourceName := printf "route-table-association-%s-%s-%s" $subnet.availabilityZone $subnet.type (toString $i) }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: RouteTableAssociation + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $routeTableAssociationResourceName }} + spec: + forProvider: + region: {{ $region }} + routeTableIdSelector: + matchControllerRef: true + subnetIdSelector: + matchControllerRef: true + matchLabels: + {{- if eq $subnet.type "private" }} + access: private + {{- else }} + access: public + {{- end }} + zone: {{ $subnet.availabilityZone | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + {{- end }} + --- + {{ $sgResourceName := "security-group" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: SecurityGroup + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $sgResourceName }} + spec: + forProvider: + description: Allow access to databases + name: {{ printf "%s-%s" $params.id $sgResourceName | toYaml }} + vpcIdSelector: + matchControllerRef: true + region: {{ $params.region | toYaml }} + tags: + Name: {{ printf "%s-%s" $params.id $sgResourceName | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + --- + {{ $sgrpRulePostGresResourceName := "security-group-rule-postgres" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: SecurityGroupRule + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $sgrpRulePostGresResourceName }} + spec: + forProvider: + cidrBlocks: + - 192.168.0.0/16 + description: Everywhere + fromPort: 5432 + protocol: tcp + securityGroupIdSelector: + matchControllerRef: true + toPort: 5432 + type: ingress + region: {{ $params.region | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + --- + {{ $sgrpRuleMySQLResourceName := "security-group-rule-mysql" }} + apiVersion: ec2.aws.upbound.io/v1beta1 + kind: SecurityGroupRule + metadata: + labels: + eksnetworks.api.example/network-id: {{ $params.id | toYaml }} + annotations: + {{ setResourceNameAnnotation $sgrpRuleMySQLResourceName }} + spec: + forProvider: + cidrBlocks: + - 192.168.0.0/16 + description: Everywhere + fromPort: 3306 + protocol: tcp + securityGroupIdSelector: + matchControllerRef: true + toPort: 3306 + type: ingress + region: {{ $params.region | toYaml }} + providerConfigRef: + name: {{ $tenantAwsProviderConfigRef | toYaml }} + kind: GoTemplate + source: Inline + step: compose-resources + - functionRef: + name: go-templating + input: + apiVersion: gotemplating.fn.crossplane.io/v1beta1 + inline: + template: | + {{ $observedResources := get .observed "resources" | default dict }} + {{ $params := get .observed.composite.resource.spec "parameters" | default dict }} + {{ $vpcStatus := dig "vpc" "resource" "status" dict $observedResources }} + {{ $subnetsStatus := dict }} + {{ range $i, $subnet := $params.subnets }} + {{ $subnetResourceName := printf "subnet-%s-%s-%s" $subnet.availabilityZone $subnet.type (toString $i) }} + {{ $subnetStatuses := dig $subnetResourceName "resource" "status" dict $observedResources }} + {{ $subnetsStatus = merge $subnetsStatus (dict $subnetResourceName $subnetStatuses) }} + {{ end }} + apiVersion: api.example/v1alpha1 + kind: XEKSNetwork + status: + vpc: {{ $vpcStatus | toYaml | nindent 4 }} + subnets: {{ $subnetsStatus | toYaml | nindent 4 }} + kind: GoTemplate + source: Inline + step: set-xr-status + - functionRef: + name: auto-ready + step: automatically-detect-ready-composed-resources diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/eip-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/eip-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..692781b --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/eip-ec2-aws-upbound-io.yaml @@ -0,0 +1,26 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/eip-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: EIP +metadata: + name: dev-ekscluster +spec: + deletionPolicy: "" + forProvider: + domain: vpc + region: west-2 + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/eip-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: EIP +metadata: + name: dev-ekscluster-2 +spec: + deletionPolicy: "" + forProvider: + domain: vpc + region: west-2 + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/internet-gateway-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/internet-gateway-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..491ade3 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/internet-gateway-ec2-aws-upbound-io.yaml @@ -0,0 +1,30 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/internet-gateway-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: InternetGateway +metadata: + name: dev-ekscluster +spec: + deletionPolicy: "" + forProvider: + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/internet-gateway-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: InternetGateway +metadata: + name: reference-eks-network +spec: + deletionPolicy: "" + forProvider: + region: east-1 + tags: + Name: platform-ref-eks-network-internet-gateway + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/main-route-rable-association-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/main-route-rable-association-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..7c44279 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/main-route-rable-association-ec2-aws-upbound-io.yaml @@ -0,0 +1,16 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/main-route-rable-association-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: MainRouteTableAssociation +metadata: + name: reference-eks-network +spec: + deletionPolicy: "" + forProvider: + region: east-1 + routeTableIdSelector: + matchControllerRef: true + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/nat-gateway-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/nat-gateway-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..7f248f3 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/nat-gateway-ec2-aws-upbound-io.yaml @@ -0,0 +1,40 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/nat-gateway-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: NATGateway +metadata: + name: dev-ekscluster +spec: + deletionPolicy: "" + forProvider: + allocationIdSelector: + matchLabels: + type: eip-1 + region: west-2 + subnetIdSelector: + matchLabels: + type: subnet + visibility: public + zone: west-2a + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/nat-gateway-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: NATGateway +metadata: + name: dev-ekscluster-2 +spec: + deletionPolicy: "" + forProvider: + allocationIdSelector: + matchLabels: + type: eip-2 + region: west-2 + subnetIdSelector: + matchLabels: + type: subnet + visibility: public + zone: west-2b + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..399c9ad --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-ec2-aws-upbound-io.yaml @@ -0,0 +1,17 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Route +metadata: + name: reference-eks-network +spec: + deletionPolicy: "" + forProvider: + destinationCidrBlock: 0.0.0.0/0 + gatewayIdSelector: + matchControllerRef: true + region: east-1 + routeTableIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-association-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-association-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..334e813 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-association-ec2-aws-upbound-io.yaml @@ -0,0 +1,76 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-association-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: RouteTableAssociation +metadata: + name: reference-eks-network-public +spec: + deletionPolicy: "" + forProvider: + region: east-1 + routeTableIdSelector: + matchControllerRef: true + subnetIdSelector: + matchControllerRef: true + matchLabels: + access: public + zone: east-1a + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-association-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: RouteTableAssociation +metadata: + name: reference-eks-network-private +spec: + deletionPolicy: "" + forProvider: + region: east-1 + routeTableIdSelector: + matchControllerRef: true + subnetIdSelector: + matchControllerRef: true + matchLabels: + access: private + zone: east-1a + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-association-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: RouteTableAssociation +metadata: + name: reference-eks-network-public-1b +spec: + deletionPolicy: "" + forProvider: + region: east-1 + routeTableIdSelector: + matchControllerRef: true + subnetIdSelector: + matchControllerRef: true + matchLabels: + access: public + zone: east-1b + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-association-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: RouteTableAssociation +metadata: + name: reference-eks-network-private-1b +spec: + deletionPolicy: "" + forProvider: + region: east-1 + routeTableIdSelector: + matchControllerRef: true + subnetIdSelector: + matchControllerRef: true + matchLabels: + access: private + zone: east-1b + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..6c56542 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-ec2-aws-upbound-io.yaml @@ -0,0 +1,30 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: RouteTable +metadata: + name: dev-ekscluster +spec: + deletionPolicy: "" + forProvider: + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/route-table-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: RouteTable +metadata: + name: reference-eks-network +spec: + deletionPolicy: "" + forProvider: + region: east-1 + tags: + Name: platform-ref-eks-network-route-table + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/security-group-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/security-group-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..88c5e15 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/security-group-ec2-aws-upbound-io.yaml @@ -0,0 +1,18 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/security-group-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroup +metadata: + name: reference-eks-network +spec: + deletionPolicy: "" + forProvider: + description: Allow access to databases + name: platform-ref-eks-network-security-group + region: east-1 + tags: + Name: platform-ref-eks-network-security-group + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/security-group-rule-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/security-group-rule-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..4b706a3 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/security-group-rule-ec2-aws-upbound-io.yaml @@ -0,0 +1,42 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/security-group-rule-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroupRuleRule +metadata: + name: reference-eks-network +spec: + deletionPolicy: "" + forProvider: + cidrBlocks: + - 192.168.0.0/16 + description: Everywhere + fromPort: 3306 + protocol: tcp + region: east-1 + securityGroupIdSelector: + matchControllerRef: true + toPort: 3306 + type: ingress + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/security-group-rule-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: SecurityGroupRuleRule +metadata: + name: reference-eks-network-5432 +spec: + deletionPolicy: "" + forProvider: + cidrBlocks: + - 192.168.0.0/16 + description: Everywhere + fromPort: 5432 + protocol: tcp + region: east-1 + securityGroupIdSelector: + matchControllerRef: true + toPort: 5432 + type: ingress + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..254fa55 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml @@ -0,0 +1,146 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + name: dev-ekscluster +spec: + deletionPolicy: "" + forProvider: + availabilityZone: west-2a + cidrBlock: 192.168.50.0/24 + mapPublicIpOnLaunch: false + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + name: reference-eks-network +spec: + deletionPolicy: "" + forProvider: + availabilityZone: east-1a + cidrBlock: 192.168.128.0/18 + region: east-1 + tags: + Name: platform-ref-eks-network-subnet-east-1a-private-2 + kubernetes.io/role/internal-elb: "1" + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + name: reference-eks-network-public-0 +spec: + deletionPolicy: "" + forProvider: + availabilityZone: east-1a + cidrBlock: 192.168.0.0/18 + mapPublicIpOnLaunch: true + region: east-1 + tags: + Name: platform-ref-eks-network-subnet-east-1a-public-0 + kubernetes.io/role/elb: "1" + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + name: reference-eks-network-east-1b-private-3 +spec: + deletionPolicy: "" + forProvider: + availabilityZone: east-1b + cidrBlock: 192.168.192.0/18 + region: east-1 + tags: + Name: platform-ref-eks-network-subnet-east-1b-private-3 + kubernetes.io/role/internal-elb: "1" + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + name: reference-eks-network-east-1b-public-1 +spec: + deletionPolicy: "" + forProvider: + availabilityZone: east-1b + cidrBlock: 192.168.64.0/18 + mapPublicIpOnLaunch: true + region: east-1 + tags: + Name: platform-ref-eks-network-subnet-east-1b-public-1 + kubernetes.io/role/elb: "1" + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + name: dev-ekscluster-2 +spec: + deletionPolicy: "" + forProvider: + availabilityZone: west-2b + cidrBlock: 192.168.51.0/24 + mapPublicIpOnLaunch: false + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + name: dev-ekscluster-3 +spec: + deletionPolicy: "" + forProvider: + availabilityZone: west-2b + cidrBlock: 192.168.49.0/24 + mapPublicIpOnLaunch: true + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/subnet-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: Subnet +metadata: + name: dev-ekscluster-4 +spec: + deletionPolicy: "" + forProvider: + availabilityZone: west-2b + cidrBlock: 192.168.49.0/24 + mapPublicIpOnLaunch: true + region: west-2 + vpcIdSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/vpc-ec2-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/vpc-ec2-aws-upbound-io.yaml new file mode 100644 index 0000000..11aaac6 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/vpc-ec2-aws-upbound-io.yaml @@ -0,0 +1,48 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/vpc-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + name: dev-ekscluster +spec: + deletionPolicy: "" + forProvider: + cidrBlock: 192.168.48.0/20 + enableDnsHostnames: true + enableDnsSupport: true + region: west-2 + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/vpc-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + name: reference-eks-network +spec: + deletionPolicy: "" + forProvider: + cidrBlock: 192.168.0.0/16 + enableDnsHostnames: true + enableDnsSupport: true + region: east-1 + tags: + Name: platform-ref-eks-network-vpc + providerConfigRef: + name: dev-aws +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-ec2/templates/vpc-ec2-aws-upbound-io.yaml +apiVersion: ec2.aws.upbound.io/v1beta1 +kind: VPC +metadata: + name: vpc-west-2 +spec: + deletionPolicy: "" + forProvider: + enableDnsHostNames: true + enableDnsSupport: true + instanceTenancy: default + region: west-2 + vpcCidrBlock: 10.0.0.0/16 + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-eks/templates/cluster-eks-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-eks/templates/cluster-eks-aws-upbound-io.yaml new file mode 100644 index 0000000..1ce2073 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-eks/templates/cluster-eks-aws-upbound-io.yaml @@ -0,0 +1,40 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-eks/templates/cluster-eks-aws-upbound-io.yaml +apiVersion: eks.aws.upbound.io/v1beta1 +kind: Cluster +metadata: + name: dev-ekscluster + annotations: + crossplane.io/composition-resource-name: eks-cluster + labels: + openmcp.cloud/blueprint-building-block: "crossplane-provider-aws-eks" + openmcp.cloud/blueprint-building-block-version: "0.0.12" + crossplane.io/claim-namespace: dev-us + crossplane.io/composite: dev-ekscluster + ownerReferences: + - apiVersion: api.example/v1alpha1 + blockOwnerDeletion: true + controller: true + kind: EKSCluster + name: dev-ekscluster + uid: "" +spec: + deletionPolicy: "" + forProvider: + region: west-2 + roleArn: arn:aws:iam::XXXX:role/EKS-Cluster-Role + version: "1.29" + vpcConfig: + - endpointPrivateAccess: false + endpointPublicAccess: true + subnetIdSelector: + matchLabels: + type: subnet + visibility: private + providerConfigRef: + name: dev-aws + writeConnectionSecretToRef: + name: dev-connection-secret + namespace: crossplane-system + publishConnectionDetailsTo: + {} diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-eks/templates/node-group-eks-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-eks/templates/node-group-eks-aws-upbound-io.yaml new file mode 100644 index 0000000..3ae5b5f --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-eks/templates/node-group-eks-aws-upbound-io.yaml @@ -0,0 +1,41 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-eks/templates/node-group-eks-aws-upbound-io.yaml +apiVersion: eks.aws.upbound.io/v1beta1 +kind: NodeGroup +metadata: + name: dev-ekscluster + annotations: + crossplane.io/composition-resource-name: eks-nodegroup + labels: + openmcp.cloud/blueprint-building-block: "crossplane-provider-aws-eks" + openmcp.cloud/blueprint-building-block-version: "0.0.12" + crossplane.io/claim-namespace: dev-us + crossplane.io/composite: dev-ekscluster + ownerReferences: + - apiVersion: api.example/v1alpha1 + blockOwnerDeletion: true + controller: true + kind: EKSCluster + name: dev-ekscluster + uid: "" +spec: + deletionPolicy: "" + forProvider: + amiType: x86 + clusterNameSelector: + matchControllerRef: true + instanceTypes: + - t3.medium + nodeRoleArn: arn:aws:iam::XXXX:role/EKS-WorkerNode-Role + region: west-2 + scalingConfig: + - desiredSize: 2 + maxSize: 2 + minSize: 1 + subnetIdSelector: + matchControllerRef: true + matchLabels: + type: subnet + visibility: private + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-iam/templates/role-iam-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-iam/templates/role-iam-aws-upbound-io.yaml new file mode 100644 index 0000000..2806fb0 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-iam/templates/role-iam-aws-upbound-io.yaml @@ -0,0 +1,38 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-iam/templates/role-iam-aws-upbound-io.yaml +apiVersion: iam.aws.upbound.io/v1beta1 +kind: Role +metadata: + name: dev-ekscluster + annotations: + crossplane.io/composition-resource-name: role + labels: + openmcp.cloud/blueprint-building-block: "crossplane-provider-aws-iam" + openmcp.cloud/blueprint-building-block-version: "0.0.13" + crossplane.io/claim-namespace: dev-us + crossplane.io/composite: dev-ekscluster + ownerReferences: + - apiVersion: api.example/v1alpha1 + blockOwnerDeletion: true + controller: true + kind: EKSCluster + name: dev-ekscluster + uid: "" +spec: + deletionPolicy: "" + forProvider: + assumeRolePolicy: | + { + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Service": "eks.amazonaws.com" + }, + "Action": "sts:AssumeRole" + } + ] + } + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-iam/templates/role-policy-attachment-iam-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-iam/templates/role-policy-attachment-iam-aws-upbound-io.yaml new file mode 100644 index 0000000..f414976 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-iam/templates/role-policy-attachment-iam-aws-upbound-io.yaml @@ -0,0 +1,28 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-iam/templates/role-policy-attachment-iam-aws-upbound-io.yaml +apiVersion: iam.aws.upbound.io/v1beta1 +kind: RolePolicyAttachment +metadata: + name: dev-ekscluster + annotations: + crossplane.io/composition-resource-name: rolePolicyAttachment + labels: + openmcp.cloud/blueprint-building-block: "crossplane-provider-aws-iam" + openmcp.cloud/blueprint-building-block-version: "0.0.13" + crossplane.io/claim-namespace: dev-us + crossplane.io/composite: dev-ekscluster + ownerReferences: + - apiVersion: api.example/v1alpha1 + blockOwnerDeletion: true + controller: true + kind: EKSCluster + name: dev-ekscluster + uid: "" +spec: + deletionPolicy: "" + forProvider: + policyArn: arn:aws:iam::aws:policy/AmazonEKSClusterPolicy + roleSelector: + matchControllerRef: true + providerConfigRef: + name: dev-aws diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-rdr/templates/instance-rdr-aws-upbound-io.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-rdr/templates/instance-rdr-aws-upbound-io.yaml new file mode 100644 index 0000000..15753b6 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/crossplane-provider-aws-rdr/templates/instance-rdr-aws-upbound-io.yaml @@ -0,0 +1,34 @@ +--- +# Source: provider-aws.zzzz/charts/crossplane-provider-aws-rdr/templates/instance-rdr-aws-upbound-io.yaml +apiVersion: rds.aws.upbound.io/v1beta2 +kind: Instance +metadata: + name: rds-instance +spec: + deletionPolicy: "" + forProvider: + allocatedStorage: 20 + autoGeneratePassword: true + autoMinorVersionUpgrade: true + backupRetentionPeriod: 14 + backupWindow: 09:46-10:16 + dbName: clopsdevusdb + engine: postgres + engineVersion: "16.1" + instanceClass: db.t3.micro + maintenanceWindow: Mon:00:00-Mon:03:00 + passwordSecretRef: + key: password + name: dev-rds-root + namespace: dev-us + publiclyAccessible: false + region: east-1 + skipFinalSnapshot: true + storageEncrypted: true + storageType: gp2 + username: adminuser + providerConfigRef: + name: dev-aws + writeConnectionSecretToRef: + name: dev-rds-connection-details + namespace: dev-us diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/external-secrets-config/templates/external-secret.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/external-secrets-config/templates/external-secret.yaml new file mode 100644 index 0000000..a055e58 --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/external-secrets-config/templates/external-secret.yaml @@ -0,0 +1,26 @@ +--- +# Source: provider-aws.zzzz/charts/external-secrets-config/templates/external-secret.yaml +apiVersion: external-secrets.io/v1beta1 +kind: ExternalSecret +metadata: + name: "btp-account-test" + namespace: "default" + labels: + openmcp.cloud/blueprint-building-block: "external-secrets-config" + openmcp.cloud/blueprint-building-block-version: "0.1.10" +spec: + refreshInterval: "15m" + secretStoreRef: + name: "hashicorp-vault" + kind: "SecretStore" + target: + name: "btp-account-test" + data: + - remoteRef: + key: "" + property: btp-cis-provider-credentials + secretKey: btp-cis-provider-credentials + - remoteRef: + key: "" + property: btp-service-account-provider-credentials + secretKey: btp-service-account-provider-credentials diff --git a/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/external-secrets-config/templates/secret-store.yaml b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/external-secrets-config/templates/secret-store.yaml new file mode 100644 index 0000000..05d51eb --- /dev/null +++ b/manifests/helm/umbrella/blueprints/provider-aws.abc.shoot.live.k8s-hana.ondemand.com/provider-aws.zzzz/charts/external-secrets-config/templates/secret-store.yaml @@ -0,0 +1,24 @@ +--- +# Source: provider-aws.zzzz/charts/external-secrets-config/templates/secret-store.yaml +apiVersion: external-secrets.io/v1beta1 +kind: SecretStore +metadata: + name: "hashicorp-vault" + namespace: "default" + labels: + openmcp.cloud/blueprint-building-block: "external-secrets-config" + openmcp.cloud/blueprint-building-block-version: "0.1.10" +spec: + provider: + vault: + auth: + appRole: + path: approle + roleId: "" + secretRef: + key: token + name: hashicorp-vault-token + namespace: ns1 + path: k8s-clusters + server: https://vault.example/ + version: v2