@pulumi/confluentcloud 2.58.0 → 2.59.0-alpha.1770934913
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessPoint.d.ts +3 -3
- package/accessPoint.js +3 -3
- package/apiKey.d.ts +12 -4
- package/apiKey.js +12 -4
- package/apiKey.js.map +1 -1
- package/businessMetadata.d.ts +1 -4
- package/businessMetadata.js +1 -4
- package/businessMetadata.js.map +1 -1
- package/businessMetadataBinding.d.ts +22 -7
- package/businessMetadataBinding.js +1 -4
- package/businessMetadataBinding.js.map +1 -1
- package/byokKey.d.ts +3 -3
- package/byokKey.js +3 -3
- package/catalogEntityAttributes.d.ts +36 -7
- package/catalogEntityAttributes.js +9 -4
- package/catalogEntityAttributes.js.map +1 -1
- package/catalogIntegration.d.ts +5 -3
- package/catalogIntegration.js +5 -3
- package/catalogIntegration.js.map +1 -1
- package/certificateAuthority.d.ts +3 -3
- package/certificateAuthority.js +3 -3
- package/certificatePool.d.ts +3 -3
- package/certificatePool.js +3 -3
- package/clusterLink.d.ts +10 -21
- package/clusterLink.js +10 -21
- package/clusterLink.js.map +1 -1
- package/connectArtifact.d.ts +11 -3
- package/connectArtifact.js +11 -3
- package/connectArtifact.js.map +1 -1
- package/connector.d.ts +11 -3
- package/connector.js +11 -3
- package/connector.js.map +1 -1
- package/customConnectorPlugin.d.ts +13 -3
- package/customConnectorPlugin.js +13 -3
- package/customConnectorPlugin.js.map +1 -1
- package/customConnectorPluginVersion.d.ts +13 -3
- package/customConnectorPluginVersion.js +13 -3
- package/customConnectorPluginVersion.js.map +1 -1
- package/dnsForwarder.d.ts +3 -3
- package/dnsForwarder.js +3 -3
- package/dnsRecord.d.ts +3 -3
- package/dnsRecord.js +3 -3
- package/environment.d.ts +9 -3
- package/environment.js +9 -3
- package/environment.js.map +1 -1
- package/flinkArtifact.d.ts +11 -3
- package/flinkArtifact.js +11 -3
- package/flinkArtifact.js.map +1 -1
- package/flinkComputePool.d.ts +9 -3
- package/flinkComputePool.js +9 -3
- package/flinkComputePool.js.map +1 -1
- package/flinkConnection.d.ts +97 -11
- package/flinkConnection.js +97 -11
- package/flinkConnection.js.map +1 -1
- package/flinkStatement.d.ts +32 -11
- package/flinkStatement.js +5 -8
- package/flinkStatement.js.map +1 -1
- package/gateway.d.ts +3 -3
- package/gateway.js +3 -3
- package/getNetwork.d.ts +32 -0
- package/getNetwork.js +32 -0
- package/getNetwork.js.map +1 -1
- package/getProviderIntegrationAuthorization.d.ts +260 -0
- package/getProviderIntegrationAuthorization.js +260 -0
- package/getProviderIntegrationAuthorization.js.map +1 -1
- package/groupMapping.d.ts +3 -3
- package/groupMapping.js +3 -3
- package/identityPool.d.ts +3 -3
- package/identityPool.js +3 -3
- package/identityProvider.d.ts +3 -3
- package/identityProvider.js +3 -3
- package/invitation.d.ts +12 -3
- package/invitation.js +3 -3
- package/invitation.js.map +1 -1
- package/ipFilter.d.ts +3 -3
- package/ipFilter.js +3 -3
- package/ipGroup.d.ts +3 -3
- package/ipGroup.js +3 -3
- package/kafkaAcl.d.ts +30 -11
- package/kafkaAcl.js +3 -8
- package/kafkaAcl.js.map +1 -1
- package/kafkaClientQuota.d.ts +11 -3
- package/kafkaClientQuota.js +11 -3
- package/kafkaClientQuota.js.map +1 -1
- package/kafkaCluster.d.ts +9 -3
- package/kafkaCluster.js +9 -3
- package/kafkaCluster.js.map +1 -1
- package/kafkaClusterConfig.d.ts +1 -4
- package/kafkaClusterConfig.js +1 -4
- package/kafkaClusterConfig.js.map +1 -1
- package/kafkaMirrorTopic.d.ts +54 -4
- package/kafkaMirrorTopic.js +9 -4
- package/kafkaMirrorTopic.js.map +1 -1
- package/kafkaTopic.d.ts +11 -33
- package/kafkaTopic.js +11 -33
- package/kafkaTopic.js.map +1 -1
- package/ksqlCluster.d.ts +3 -3
- package/ksqlCluster.js +3 -3
- package/network.d.ts +9 -3
- package/network.js +9 -3
- package/network.js.map +1 -1
- package/networkLinkEndpoint.d.ts +9 -3
- package/networkLinkEndpoint.js +9 -3
- package/networkLinkEndpoint.js.map +1 -1
- package/networkLinkService.d.ts +9 -3
- package/networkLinkService.js +9 -3
- package/networkLinkService.js.map +1 -1
- package/package.json +2 -2
- package/peering.d.ts +9 -3
- package/peering.js +9 -3
- package/peering.js.map +1 -1
- package/plugin.d.ts +9 -3
- package/plugin.js +9 -3
- package/plugin.js.map +1 -1
- package/privateLinkAccess.d.ts +9 -3
- package/privateLinkAccess.js +9 -3
- package/privateLinkAccess.js.map +1 -1
- package/privateLinkAttachment.d.ts +3 -3
- package/privateLinkAttachment.js +3 -3
- package/privateLinkAttachmentConnection.d.ts +3 -3
- package/privateLinkAttachmentConnection.js +3 -3
- package/providerIntegration.d.ts +9 -3
- package/providerIntegration.js +9 -3
- package/providerIntegration.js.map +1 -1
- package/providerIntegrationAuthorization.d.ts +161 -3
- package/providerIntegrationAuthorization.js +161 -3
- package/providerIntegrationAuthorization.js.map +1 -1
- package/providerIntegrationSetup.d.ts +11 -3
- package/providerIntegrationSetup.js +11 -3
- package/providerIntegrationSetup.js.map +1 -1
- package/roleBinding.d.ts +36 -3
- package/roleBinding.js +3 -3
- package/roleBinding.js.map +1 -1
- package/schema.d.ts +22 -11
- package/schema.js +13 -11
- package/schema.js.map +1 -1
- package/schemaExporter.d.ts +3 -5
- package/schemaExporter.js +3 -5
- package/schemaExporter.js.map +1 -1
- package/schemaRegistryClusterConfig.d.ts +7 -4
- package/schemaRegistryClusterConfig.js +7 -4
- package/schemaRegistryClusterConfig.js.map +1 -1
- package/schemaRegistryClusterMode.d.ts +7 -4
- package/schemaRegistryClusterMode.js +7 -4
- package/schemaRegistryClusterMode.js.map +1 -1
- package/schemaRegistryDek.d.ts +22 -7
- package/schemaRegistryDek.js +1 -4
- package/schemaRegistryDek.js.map +1 -1
- package/schemaRegistryKek.d.ts +22 -7
- package/schemaRegistryKek.js +1 -4
- package/schemaRegistryKek.js.map +1 -1
- package/serviceAccount.d.ts +3 -3
- package/serviceAccount.js +3 -3
- package/subjectConfig.d.ts +7 -4
- package/subjectConfig.js +7 -4
- package/subjectConfig.js.map +1 -1
- package/subjectMode.d.ts +7 -4
- package/subjectMode.js +7 -4
- package/subjectMode.js.map +1 -1
- package/tableflowTopic.d.ts +7 -3
- package/tableflowTopic.js +7 -3
- package/tableflowTopic.js.map +1 -1
- package/tag.d.ts +22 -7
- package/tag.js +1 -4
- package/tag.js.map +1 -1
- package/tagBinding.d.ts +28 -4
- package/tagBinding.js +1 -4
- package/tagBinding.js.map +1 -1
- package/tfImporter.d.ts +6 -0
- package/tfImporter.js +6 -0
- package/tfImporter.js.map +1 -1
- package/transitGatewayAttachment.d.ts +9 -3
- package/transitGatewayAttachment.js +9 -3
- package/transitGatewayAttachment.js.map +1 -1
- package/types/input.d.ts +98 -16
- package/types/output.d.ts +78 -12
package/accessPoint.d.ts
CHANGED
|
@@ -87,13 +87,13 @@ import * as outputs from "./types/output";
|
|
|
87
87
|
*
|
|
88
88
|
* ## Import
|
|
89
89
|
*
|
|
90
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Access Point.
|
|
91
|
+
*
|
|
90
92
|
* You can import a Access Point by using Environment ID and Access Point ID, in the format `<Environment ID>/<Access Point ID>`. The following example shows how to import a Access Point:
|
|
91
93
|
*
|
|
94
|
+
* ```sh
|
|
92
95
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
93
|
-
*
|
|
94
96
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
95
|
-
*
|
|
96
|
-
* ```sh
|
|
97
97
|
* $ pulumi import confluentcloud:index/accessPoint:AccessPoint main env-abc123/ap-abc123
|
|
98
98
|
* ```
|
|
99
99
|
*
|
package/accessPoint.js
CHANGED
|
@@ -91,13 +91,13 @@ const utilities = require("./utilities");
|
|
|
91
91
|
*
|
|
92
92
|
* ## Import
|
|
93
93
|
*
|
|
94
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Access Point.
|
|
95
|
+
*
|
|
94
96
|
* You can import a Access Point by using Environment ID and Access Point ID, in the format `<Environment ID>/<Access Point ID>`. The following example shows how to import a Access Point:
|
|
95
97
|
*
|
|
98
|
+
* ```sh
|
|
96
99
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
97
|
-
*
|
|
98
100
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
99
|
-
*
|
|
100
|
-
* ```sh
|
|
101
101
|
* $ pulumi import confluentcloud:index/accessPoint:AccessPoint main env-abc123/ap-abc123
|
|
102
102
|
* ```
|
|
103
103
|
*
|
package/apiKey.d.ts
CHANGED
|
@@ -2,6 +2,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
6
|
+
*
|
|
7
|
+
* `confluentcloud.ApiKey` provides an API Key resource that enables creating, editing, and deleting Cloud API Keys, Cluster API Keys (Kafka API Key, ksqlDB API Key, Schema Registry API Key, Flink API Key, Tableflow API Key) on Confluent Cloud.
|
|
8
|
+
*
|
|
9
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental API Key deletion. This setting rejects plans that would destroy or recreate the API Key, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
10
|
+
*
|
|
5
11
|
* ## Example Usage
|
|
6
12
|
*
|
|
7
13
|
* ### Example Kafka API Key
|
|
@@ -164,13 +170,15 @@ import * as outputs from "./types/output";
|
|
|
164
170
|
*
|
|
165
171
|
* ## Import
|
|
166
172
|
*
|
|
173
|
+
* > **Note:** You must set the `API_KEY_SECRET` (`secret`) environment variable before importing an API Key.
|
|
174
|
+
*
|
|
167
175
|
* You can import a Cluster API Key by using the Environment ID and Cluster API Key ID in the format `<Environment ID>/<Cluster API Key ID>`, for example:
|
|
168
176
|
*
|
|
177
|
+
* ```sh
|
|
169
178
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
170
|
-
*
|
|
171
179
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
172
|
-
*
|
|
173
180
|
* $ export API_KEY_SECRET="<api_key_secret>"
|
|
181
|
+
* ```
|
|
174
182
|
*
|
|
175
183
|
* Option #1: Cluster API Key
|
|
176
184
|
*
|
|
@@ -180,11 +188,11 @@ import * as outputs from "./types/output";
|
|
|
180
188
|
*
|
|
181
189
|
* You can import a Cloud or Tableflow API Key by using Cloud or Tableflow API Key ID, for example:
|
|
182
190
|
*
|
|
191
|
+
* ```sh
|
|
183
192
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
184
|
-
*
|
|
185
193
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
186
|
-
*
|
|
187
194
|
* $ export API_KEY_SECRET="<api_key_secret>"
|
|
195
|
+
* ```
|
|
188
196
|
*
|
|
189
197
|
* Option #2: Cloud or Tableflow API Key
|
|
190
198
|
*
|
package/apiKey.js
CHANGED
|
@@ -6,6 +6,12 @@ exports.ApiKey = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
10
|
+
*
|
|
11
|
+
* `confluentcloud.ApiKey` provides an API Key resource that enables creating, editing, and deleting Cloud API Keys, Cluster API Keys (Kafka API Key, ksqlDB API Key, Schema Registry API Key, Flink API Key, Tableflow API Key) on Confluent Cloud.
|
|
12
|
+
*
|
|
13
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental API Key deletion. This setting rejects plans that would destroy or recreate the API Key, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
14
|
+
*
|
|
9
15
|
* ## Example Usage
|
|
10
16
|
*
|
|
11
17
|
* ### Example Kafka API Key
|
|
@@ -168,13 +174,15 @@ const utilities = require("./utilities");
|
|
|
168
174
|
*
|
|
169
175
|
* ## Import
|
|
170
176
|
*
|
|
177
|
+
* > **Note:** You must set the `API_KEY_SECRET` (`secret`) environment variable before importing an API Key.
|
|
178
|
+
*
|
|
171
179
|
* You can import a Cluster API Key by using the Environment ID and Cluster API Key ID in the format `<Environment ID>/<Cluster API Key ID>`, for example:
|
|
172
180
|
*
|
|
181
|
+
* ```sh
|
|
173
182
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
174
|
-
*
|
|
175
183
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
176
|
-
*
|
|
177
184
|
* $ export API_KEY_SECRET="<api_key_secret>"
|
|
185
|
+
* ```
|
|
178
186
|
*
|
|
179
187
|
* Option #1: Cluster API Key
|
|
180
188
|
*
|
|
@@ -184,11 +192,11 @@ const utilities = require("./utilities");
|
|
|
184
192
|
*
|
|
185
193
|
* You can import a Cloud or Tableflow API Key by using Cloud or Tableflow API Key ID, for example:
|
|
186
194
|
*
|
|
195
|
+
* ```sh
|
|
187
196
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
188
|
-
*
|
|
189
197
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
190
|
-
*
|
|
191
198
|
* $ export API_KEY_SECRET="<api_key_secret>"
|
|
199
|
+
* ```
|
|
192
200
|
*
|
|
193
201
|
* Option #2: Cloud or Tableflow API Key
|
|
194
202
|
*
|
package/apiKey.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"apiKey.js","sourceRoot":"","sources":["../apiKey.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"apiKey.js","sourceRoot":"","sources":["../apiKey.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAwMG;AACH,MAAa,MAAO,SAAQ,MAAM,CAAC,cAAc;IAC7C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmB,EAAE,IAAmC;QACjH,OAAO,IAAI,MAAM,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC7D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,MAAM,CAAC,YAAY,CAAC;IACvD,CAAC;IAmCD,YAAY,IAAY,EAAE,WAAsC,EAAE,IAAmC;QACjG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsC,CAAC;YACrD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,EAAE,mBAAmB,CAAC;YACnE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAAqC,CAAC;YACnD,IAAI,IAAI,EAAE,KAAK,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxC,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,EAAE,mBAAmB,CAAC;YAClE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,QAAQ,CAAC,EAAE,CAAC;QAC3D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,MAAM,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3D,CAAC;;AAxFL,wBAyFC;AA3EG,gBAAgB;AACO,mBAAY,GAAG,oCAAoC,CAAC"}
|
package/businessMetadata.d.ts
CHANGED
|
@@ -66,13 +66,10 @@ import * as outputs from "./types/output";
|
|
|
66
66
|
*
|
|
67
67
|
* You can import a Business Metadata by using the Schema Registry cluster ID, Business Metadata name in the format `<Schema Registry cluster ID>/<Business Metadata name>`, for example:
|
|
68
68
|
*
|
|
69
|
+
* ```sh
|
|
69
70
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
70
|
-
*
|
|
71
71
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
72
|
-
*
|
|
73
72
|
* $ export IMPORT_CATALOG_REST_ENDPOINT="<catalog_rest_endpoint>"
|
|
74
|
-
*
|
|
75
|
-
* ```sh
|
|
76
73
|
* $ pulumi import confluentcloud:index/businessMetadata:BusinessMetadata pii lsrc-8wrx70/PII
|
|
77
74
|
* ```
|
|
78
75
|
*
|
package/businessMetadata.js
CHANGED
|
@@ -70,13 +70,10 @@ const utilities = require("./utilities");
|
|
|
70
70
|
*
|
|
71
71
|
* You can import a Business Metadata by using the Schema Registry cluster ID, Business Metadata name in the format `<Schema Registry cluster ID>/<Business Metadata name>`, for example:
|
|
72
72
|
*
|
|
73
|
+
* ```sh
|
|
73
74
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
74
|
-
*
|
|
75
75
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
76
|
-
*
|
|
77
76
|
* $ export IMPORT_CATALOG_REST_ENDPOINT="<catalog_rest_endpoint>"
|
|
78
|
-
*
|
|
79
|
-
* ```sh
|
|
80
77
|
* $ pulumi import confluentcloud:index/businessMetadata:BusinessMetadata pii lsrc-8wrx70/PII
|
|
81
78
|
* ```
|
|
82
79
|
*
|
package/businessMetadata.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"businessMetadata.js","sourceRoot":"","sources":["../businessMetadata.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"businessMetadata.js","sourceRoot":"","sources":["../businessMetadata.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyEG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IAoCD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAxFL,4CAyFC;AA3EG,gBAAgB;AACO,6BAAY,GAAG,wDAAwD,CAAC"}
|
|
@@ -66,13 +66,10 @@ import * as outputs from "./types/output";
|
|
|
66
66
|
*
|
|
67
67
|
* You can import a Business Metadata Binding by using the Schema Registry cluster ID, Business Metadata name, entity name and entity type in the format `<Schema Registry Cluster Id>/<Business Metadata Name>/<Entity Name>/<Entity Type>`, for example:
|
|
68
68
|
*
|
|
69
|
+
* ```sh
|
|
69
70
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
70
|
-
*
|
|
71
71
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
72
|
-
*
|
|
73
72
|
* $ export IMPORT_CATALOG_REST_ENDPOINT="<catalog_rest_endpoint>"
|
|
74
|
-
*
|
|
75
|
-
* ```sh
|
|
76
73
|
* $ pulumi import confluentcloud:index/businessMetadataBinding:BusinessMetadataBinding main lsrc-8wrx70/PII/lsrc-8wrx70:.:100001/sr_schema
|
|
77
74
|
* ```
|
|
78
75
|
*
|
|
@@ -95,7 +92,13 @@ export declare class BusinessMetadataBinding extends pulumi.CustomResource {
|
|
|
95
92
|
*/
|
|
96
93
|
static isInstance(obj: any): obj is BusinessMetadataBinding;
|
|
97
94
|
/**
|
|
98
|
-
* The attributes.
|
|
95
|
+
* The block of key-value pair attributes.
|
|
96
|
+
*
|
|
97
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
98
|
+
*
|
|
99
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_business_metadata_binding.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_business_metadata_binding.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
100
|
+
*
|
|
101
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.BusinessMetadataBinding` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
99
102
|
*/
|
|
100
103
|
readonly attributes: pulumi.Output<{
|
|
101
104
|
[key: string]: string;
|
|
@@ -135,7 +138,13 @@ export declare class BusinessMetadataBinding extends pulumi.CustomResource {
|
|
|
135
138
|
*/
|
|
136
139
|
export interface BusinessMetadataBindingState {
|
|
137
140
|
/**
|
|
138
|
-
* The attributes.
|
|
141
|
+
* The block of key-value pair attributes.
|
|
142
|
+
*
|
|
143
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
144
|
+
*
|
|
145
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_business_metadata_binding.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_business_metadata_binding.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
146
|
+
*
|
|
147
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.BusinessMetadataBinding` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
139
148
|
*/
|
|
140
149
|
attributes?: pulumi.Input<{
|
|
141
150
|
[key: string]: pulumi.Input<string>;
|
|
@@ -167,7 +176,13 @@ export interface BusinessMetadataBindingState {
|
|
|
167
176
|
*/
|
|
168
177
|
export interface BusinessMetadataBindingArgs {
|
|
169
178
|
/**
|
|
170
|
-
* The attributes.
|
|
179
|
+
* The block of key-value pair attributes.
|
|
180
|
+
*
|
|
181
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
182
|
+
*
|
|
183
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_business_metadata_binding.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_business_metadata_binding.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
184
|
+
*
|
|
185
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.BusinessMetadataBinding` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
171
186
|
*/
|
|
172
187
|
attributes?: pulumi.Input<{
|
|
173
188
|
[key: string]: pulumi.Input<string>;
|
|
@@ -70,13 +70,10 @@ const utilities = require("./utilities");
|
|
|
70
70
|
*
|
|
71
71
|
* You can import a Business Metadata Binding by using the Schema Registry cluster ID, Business Metadata name, entity name and entity type in the format `<Schema Registry Cluster Id>/<Business Metadata Name>/<Entity Name>/<Entity Type>`, for example:
|
|
72
72
|
*
|
|
73
|
+
* ```sh
|
|
73
74
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
74
|
-
*
|
|
75
75
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
76
|
-
*
|
|
77
76
|
* $ export IMPORT_CATALOG_REST_ENDPOINT="<catalog_rest_endpoint>"
|
|
78
|
-
*
|
|
79
|
-
* ```sh
|
|
80
77
|
* $ pulumi import confluentcloud:index/businessMetadataBinding:BusinessMetadataBinding main lsrc-8wrx70/PII/lsrc-8wrx70:.:100001/sr_schema
|
|
81
78
|
* ```
|
|
82
79
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"businessMetadataBinding.js","sourceRoot":"","sources":["../businessMetadataBinding.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"businessMetadataBinding.js","sourceRoot":"","sources":["../businessMetadataBinding.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyEG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IA0CD,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;SAC1E;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,IAAI,EAAE,oBAAoB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACvD,MAAM,IAAI,KAAK,CAAC,kDAAkD,CAAC,CAAC;aACvE;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;SACzE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AAvGL,0DAwGC;AA1FG,gBAAgB;AACO,oCAAY,GAAG,sEAAsE,CAAC"}
|
package/byokKey.d.ts
CHANGED
|
@@ -42,13 +42,13 @@ import * as outputs from "./types/output";
|
|
|
42
42
|
*
|
|
43
43
|
* ## Import
|
|
44
44
|
*
|
|
45
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a BYOK Key.
|
|
46
|
+
*
|
|
45
47
|
* You can import a BYOK Key by using BYOK Key ID. The following example shows how to import a BYOK Key:
|
|
46
48
|
*
|
|
49
|
+
* ```sh
|
|
47
50
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
48
|
-
*
|
|
49
51
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
50
|
-
*
|
|
51
|
-
* ```sh
|
|
52
52
|
* $ pulumi import confluentcloud:index/byokKey:ByokKey aws_key cck-abcde
|
|
53
53
|
* ```
|
|
54
54
|
*
|
package/byokKey.js
CHANGED
|
@@ -46,13 +46,13 @@ const utilities = require("./utilities");
|
|
|
46
46
|
*
|
|
47
47
|
* ## Import
|
|
48
48
|
*
|
|
49
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a BYOK Key.
|
|
50
|
+
*
|
|
49
51
|
* You can import a BYOK Key by using BYOK Key ID. The following example shows how to import a BYOK Key:
|
|
50
52
|
*
|
|
53
|
+
* ```sh
|
|
51
54
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
52
|
-
*
|
|
53
55
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
54
|
-
*
|
|
55
|
-
* ```sh
|
|
56
56
|
* $ pulumi import confluentcloud:index/byokKey:ByokKey aws_key cck-abcde
|
|
57
57
|
* ```
|
|
58
58
|
*
|
|
@@ -2,6 +2,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
6
|
+
*
|
|
7
|
+
* `confluentcloud.CatalogEntityAttributes` provides a Catalog Entity Attributes resource that enables creating, evolving, and deleting Catalog Entity Attributes on Confluent Cloud.
|
|
8
|
+
*
|
|
9
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental catalog entity attributes deletion. This setting rejects plans that would destroy or recreate the schema, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
10
|
+
*
|
|
5
11
|
* ## Example Usage
|
|
6
12
|
*
|
|
7
13
|
* ### Option #1: Manage multiple Schema Registry clusters in the same Pulumi Stack
|
|
@@ -119,13 +125,10 @@ import * as outputs from "./types/output";
|
|
|
119
125
|
*
|
|
120
126
|
* Option #1: Manage multiple Catalog Entity Attributes in the same Pulumi Stack
|
|
121
127
|
*
|
|
128
|
+
* ```sh
|
|
122
129
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
123
|
-
*
|
|
124
130
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
125
|
-
*
|
|
126
131
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
127
|
-
*
|
|
128
|
-
* ```sh
|
|
129
132
|
* $ pulumi import confluentcloud:index/catalogEntityAttributes:CatalogEntityAttributes environment lsrc-abc123/cf_environment/env-abc123/owner,description,ownerEmail
|
|
130
133
|
* ```
|
|
131
134
|
*
|
|
@@ -135,6 +138,8 @@ import * as outputs from "./types/output";
|
|
|
135
138
|
* $ pulumi import confluentcloud:index/catalogEntityAttributes:CatalogEntityAttributes environment lsrc-abc123/cf_environment/env-abc123/owner,description,ownerEmail
|
|
136
139
|
* ```
|
|
137
140
|
*
|
|
141
|
+
* > **Note:** Use the `<Schema Registry Cluster ID>/<Entity Type>/<Entity Name>/` format to import a Catalog Entity Attributes resource with an empty list of attributes.
|
|
142
|
+
*
|
|
138
143
|
* !> **Warning:** Do not forget to delete terminal command history afterwards for security purposes.
|
|
139
144
|
*/
|
|
140
145
|
export declare class CatalogEntityAttributes extends pulumi.CustomResource {
|
|
@@ -154,7 +159,15 @@ export declare class CatalogEntityAttributes extends pulumi.CustomResource {
|
|
|
154
159
|
*/
|
|
155
160
|
static isInstance(obj: any): obj is CatalogEntityAttributes;
|
|
156
161
|
/**
|
|
157
|
-
* The attributes.
|
|
162
|
+
* The block of key-value pair attributes. Refer to the [add-a-topic-owner-and-email](https://docs.confluent.io/cloud/current/stream-governance/stream-catalog-rest-apis.html#add-a-topic-owner-and-email) for more details.
|
|
163
|
+
*
|
|
164
|
+
* > **Note:** You have to set the attribute value to an empty string if you plan to delete an attribute.
|
|
165
|
+
*
|
|
166
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
167
|
+
*
|
|
168
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_catalog_entity_attributes.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_catalog_entity_attributes.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
169
|
+
*
|
|
170
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogEntityAttributes` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
158
171
|
*/
|
|
159
172
|
readonly attributes: pulumi.Output<{
|
|
160
173
|
[key: string]: string;
|
|
@@ -190,7 +203,15 @@ export declare class CatalogEntityAttributes extends pulumi.CustomResource {
|
|
|
190
203
|
*/
|
|
191
204
|
export interface CatalogEntityAttributesState {
|
|
192
205
|
/**
|
|
193
|
-
* The attributes.
|
|
206
|
+
* The block of key-value pair attributes. Refer to the [add-a-topic-owner-and-email](https://docs.confluent.io/cloud/current/stream-governance/stream-catalog-rest-apis.html#add-a-topic-owner-and-email) for more details.
|
|
207
|
+
*
|
|
208
|
+
* > **Note:** You have to set the attribute value to an empty string if you plan to delete an attribute.
|
|
209
|
+
*
|
|
210
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
211
|
+
*
|
|
212
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_catalog_entity_attributes.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_catalog_entity_attributes.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
213
|
+
*
|
|
214
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogEntityAttributes` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
194
215
|
*/
|
|
195
216
|
attributes?: pulumi.Input<{
|
|
196
217
|
[key: string]: pulumi.Input<string>;
|
|
@@ -218,7 +239,15 @@ export interface CatalogEntityAttributesState {
|
|
|
218
239
|
*/
|
|
219
240
|
export interface CatalogEntityAttributesArgs {
|
|
220
241
|
/**
|
|
221
|
-
* The attributes.
|
|
242
|
+
* The block of key-value pair attributes. Refer to the [add-a-topic-owner-and-email](https://docs.confluent.io/cloud/current/stream-governance/stream-catalog-rest-apis.html#add-a-topic-owner-and-email) for more details.
|
|
243
|
+
*
|
|
244
|
+
* > **Note:** You have to set the attribute value to an empty string if you plan to delete an attribute.
|
|
245
|
+
*
|
|
246
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
247
|
+
*
|
|
248
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_catalog_entity_attributes.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_catalog_entity_attributes.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
249
|
+
*
|
|
250
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogEntityAttributes` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
222
251
|
*/
|
|
223
252
|
attributes?: pulumi.Input<{
|
|
224
253
|
[key: string]: pulumi.Input<string>;
|
|
@@ -6,6 +6,12 @@ exports.CatalogEntityAttributes = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
10
|
+
*
|
|
11
|
+
* `confluentcloud.CatalogEntityAttributes` provides a Catalog Entity Attributes resource that enables creating, evolving, and deleting Catalog Entity Attributes on Confluent Cloud.
|
|
12
|
+
*
|
|
13
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental catalog entity attributes deletion. This setting rejects plans that would destroy or recreate the schema, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
14
|
+
*
|
|
9
15
|
* ## Example Usage
|
|
10
16
|
*
|
|
11
17
|
* ### Option #1: Manage multiple Schema Registry clusters in the same Pulumi Stack
|
|
@@ -123,13 +129,10 @@ const utilities = require("./utilities");
|
|
|
123
129
|
*
|
|
124
130
|
* Option #1: Manage multiple Catalog Entity Attributes in the same Pulumi Stack
|
|
125
131
|
*
|
|
132
|
+
* ```sh
|
|
126
133
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
127
|
-
*
|
|
128
134
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
129
|
-
*
|
|
130
135
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
131
|
-
*
|
|
132
|
-
* ```sh
|
|
133
136
|
* $ pulumi import confluentcloud:index/catalogEntityAttributes:CatalogEntityAttributes environment lsrc-abc123/cf_environment/env-abc123/owner,description,ownerEmail
|
|
134
137
|
* ```
|
|
135
138
|
*
|
|
@@ -139,6 +142,8 @@ const utilities = require("./utilities");
|
|
|
139
142
|
* $ pulumi import confluentcloud:index/catalogEntityAttributes:CatalogEntityAttributes environment lsrc-abc123/cf_environment/env-abc123/owner,description,ownerEmail
|
|
140
143
|
* ```
|
|
141
144
|
*
|
|
145
|
+
* > **Note:** Use the `<Schema Registry Cluster ID>/<Entity Type>/<Entity Name>/` format to import a Catalog Entity Attributes resource with an empty list of attributes.
|
|
146
|
+
*
|
|
142
147
|
* !> **Warning:** Do not forget to delete terminal command history afterwards for security purposes.
|
|
143
148
|
*/
|
|
144
149
|
class CatalogEntityAttributes extends pulumi.CustomResource {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"catalogEntityAttributes.js","sourceRoot":"","sources":["../catalogEntityAttributes.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"catalogEntityAttributes.js","sourceRoot":"","sources":["../catalogEntityAttributes.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4IG;AACH,MAAa,uBAAwB,SAAQ,MAAM,CAAC,cAAc;IAC9D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAoC,EAAE,IAAmC;QAClI,OAAO,IAAI,uBAAuB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC9E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,uBAAuB,CAAC,YAAY,CAAC;IACxE,CAAC;IAwCD,YAAY,IAAY,EAAE,WAAwE,EAAE,IAAmC;QACnI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAuD,CAAC;YACtE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;SAC1E;aAAM;YACH,MAAM,IAAI,GAAG,WAAsD,CAAC;YACpE,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;SACzE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,uBAAuB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC5E,CAAC;;AAhGL,0DAiGC;AAnFG,gBAAgB;AACO,oCAAY,GAAG,sEAAsE,CAAC"}
|
package/catalogIntegration.d.ts
CHANGED
|
@@ -2,6 +2,10 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
6
|
+
*
|
|
7
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental catalog integration deletion. This setting rejects plans that would destroy or recreate the catalog integration, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
8
|
+
*
|
|
5
9
|
* ## Example Usage
|
|
6
10
|
*
|
|
7
11
|
* ### Option #1: Manage multiple Catalog Integrations in the same Pulumi Stack
|
|
@@ -58,11 +62,9 @@ import * as outputs from "./types/output";
|
|
|
58
62
|
*
|
|
59
63
|
* Option #1: Manage multiple Catalog Integrations in the same Pulumi Stack
|
|
60
64
|
*
|
|
65
|
+
* ```sh
|
|
61
66
|
* $ export IMPORT_TABLEFLOW_API_KEY="<tableflow_api_key>"
|
|
62
|
-
*
|
|
63
67
|
* $ export IMPORT_TABLEFLOW_API_SECRET="<tableflow_api_secret>"
|
|
64
|
-
*
|
|
65
|
-
* ```sh
|
|
66
68
|
* $ pulumi import confluentcloud:index/catalogIntegration:CatalogIntegration example env-abc123/lkc-abc123/tci-abc123
|
|
67
69
|
* ```
|
|
68
70
|
*
|
package/catalogIntegration.js
CHANGED
|
@@ -6,6 +6,10 @@ exports.CatalogIntegration = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
10
|
+
*
|
|
11
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental catalog integration deletion. This setting rejects plans that would destroy or recreate the catalog integration, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
12
|
+
*
|
|
9
13
|
* ## Example Usage
|
|
10
14
|
*
|
|
11
15
|
* ### Option #1: Manage multiple Catalog Integrations in the same Pulumi Stack
|
|
@@ -62,11 +66,9 @@ const utilities = require("./utilities");
|
|
|
62
66
|
*
|
|
63
67
|
* Option #1: Manage multiple Catalog Integrations in the same Pulumi Stack
|
|
64
68
|
*
|
|
69
|
+
* ```sh
|
|
65
70
|
* $ export IMPORT_TABLEFLOW_API_KEY="<tableflow_api_key>"
|
|
66
|
-
*
|
|
67
71
|
* $ export IMPORT_TABLEFLOW_API_SECRET="<tableflow_api_secret>"
|
|
68
|
-
*
|
|
69
|
-
* ```sh
|
|
70
72
|
* $ pulumi import confluentcloud:index/catalogIntegration:CatalogIntegration example env-abc123/lkc-abc123/tci-abc123
|
|
71
73
|
* ```
|
|
72
74
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"catalogIntegration.js","sourceRoot":"","sources":["../catalogIntegration.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"catalogIntegration.js","sourceRoot":"","sources":["../catalogIntegration.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0EG;AACH,MAAa,kBAAmB,SAAQ,MAAM,CAAC,cAAc;IACzD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA+B,EAAE,IAAmC;QAC7H,OAAO,IAAI,kBAAkB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACzE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,kBAAkB,CAAC,YAAY,CAAC;IACnE,CAAC;IAoCD,YAAY,IAAY,EAAE,WAA8D,EAAE,IAAmC;QACzH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAkD,CAAC;YACjE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;SAClD;aAAM;YACH,MAAM,IAAI,GAAG,WAAiD,CAAC;YAC/D,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,YAAY,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/C,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,kBAAkB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACvE,CAAC;;AAjGL,gDAkGC;AApFG,gBAAgB;AACO,+BAAY,GAAG,4DAA4D,CAAC"}
|
|
@@ -20,13 +20,13 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
20
20
|
*
|
|
21
21
|
* ## Import
|
|
22
22
|
*
|
|
23
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Certificate Authority.
|
|
24
|
+
*
|
|
23
25
|
* You can import a Certificate Authority by using Certificate Authority ID, for example:
|
|
24
26
|
*
|
|
27
|
+
* ```sh
|
|
25
28
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
26
|
-
*
|
|
27
29
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
28
|
-
*
|
|
29
|
-
* ```sh
|
|
30
30
|
* $ pulumi import confluentcloud:index/certificateAuthority:CertificateAuthority main op-abc123
|
|
31
31
|
* ```
|
|
32
32
|
*
|
package/certificateAuthority.js
CHANGED
|
@@ -26,13 +26,13 @@ const utilities = require("./utilities");
|
|
|
26
26
|
*
|
|
27
27
|
* ## Import
|
|
28
28
|
*
|
|
29
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Certificate Authority.
|
|
30
|
+
*
|
|
29
31
|
* You can import a Certificate Authority by using Certificate Authority ID, for example:
|
|
30
32
|
*
|
|
33
|
+
* ```sh
|
|
31
34
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
32
|
-
*
|
|
33
35
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
34
|
-
*
|
|
35
|
-
* ```sh
|
|
36
36
|
* $ pulumi import confluentcloud:index/certificateAuthority:CertificateAuthority main op-abc123
|
|
37
37
|
* ```
|
|
38
38
|
*
|
package/certificatePool.d.ts
CHANGED
|
@@ -25,13 +25,13 @@ import * as outputs from "./types/output";
|
|
|
25
25
|
*
|
|
26
26
|
* ## Import
|
|
27
27
|
*
|
|
28
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Certificate Pool.
|
|
29
|
+
*
|
|
28
30
|
* You can import a Certificate Pool by using Certificate Authority ID and Certificate Pool ID, in the format `<Certificate Authority ID>/<Certificate Pool ID>`. The following example shows how to import a Certificate Pool:
|
|
29
31
|
*
|
|
32
|
+
* ```sh
|
|
30
33
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
31
|
-
*
|
|
32
34
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
33
|
-
*
|
|
34
|
-
* ```sh
|
|
35
35
|
* $ pulumi import confluentcloud:index/certificatePool:CertificatePool main op-abc123/pool-abc123
|
|
36
36
|
* ```
|
|
37
37
|
*
|
package/certificatePool.js
CHANGED
|
@@ -29,13 +29,13 @@ const utilities = require("./utilities");
|
|
|
29
29
|
*
|
|
30
30
|
* ## Import
|
|
31
31
|
*
|
|
32
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Certificate Pool.
|
|
33
|
+
*
|
|
32
34
|
* You can import a Certificate Pool by using Certificate Authority ID and Certificate Pool ID, in the format `<Certificate Authority ID>/<Certificate Pool ID>`. The following example shows how to import a Certificate Pool:
|
|
33
35
|
*
|
|
36
|
+
* ```sh
|
|
34
37
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
35
|
-
*
|
|
36
38
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
37
|
-
*
|
|
38
|
-
* ```sh
|
|
39
39
|
* $ pulumi import confluentcloud:index/certificatePool:CertificatePool main op-abc123/pool-abc123
|
|
40
40
|
* ```
|
|
41
41
|
*
|