@pulumi/confluentcloud 2.58.0 → 2.59.0-alpha.1770934913

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (176) hide show
  1. package/accessPoint.d.ts +3 -3
  2. package/accessPoint.js +3 -3
  3. package/apiKey.d.ts +12 -4
  4. package/apiKey.js +12 -4
  5. package/apiKey.js.map +1 -1
  6. package/businessMetadata.d.ts +1 -4
  7. package/businessMetadata.js +1 -4
  8. package/businessMetadata.js.map +1 -1
  9. package/businessMetadataBinding.d.ts +22 -7
  10. package/businessMetadataBinding.js +1 -4
  11. package/businessMetadataBinding.js.map +1 -1
  12. package/byokKey.d.ts +3 -3
  13. package/byokKey.js +3 -3
  14. package/catalogEntityAttributes.d.ts +36 -7
  15. package/catalogEntityAttributes.js +9 -4
  16. package/catalogEntityAttributes.js.map +1 -1
  17. package/catalogIntegration.d.ts +5 -3
  18. package/catalogIntegration.js +5 -3
  19. package/catalogIntegration.js.map +1 -1
  20. package/certificateAuthority.d.ts +3 -3
  21. package/certificateAuthority.js +3 -3
  22. package/certificatePool.d.ts +3 -3
  23. package/certificatePool.js +3 -3
  24. package/clusterLink.d.ts +10 -21
  25. package/clusterLink.js +10 -21
  26. package/clusterLink.js.map +1 -1
  27. package/connectArtifact.d.ts +11 -3
  28. package/connectArtifact.js +11 -3
  29. package/connectArtifact.js.map +1 -1
  30. package/connector.d.ts +11 -3
  31. package/connector.js +11 -3
  32. package/connector.js.map +1 -1
  33. package/customConnectorPlugin.d.ts +13 -3
  34. package/customConnectorPlugin.js +13 -3
  35. package/customConnectorPlugin.js.map +1 -1
  36. package/customConnectorPluginVersion.d.ts +13 -3
  37. package/customConnectorPluginVersion.js +13 -3
  38. package/customConnectorPluginVersion.js.map +1 -1
  39. package/dnsForwarder.d.ts +3 -3
  40. package/dnsForwarder.js +3 -3
  41. package/dnsRecord.d.ts +3 -3
  42. package/dnsRecord.js +3 -3
  43. package/environment.d.ts +9 -3
  44. package/environment.js +9 -3
  45. package/environment.js.map +1 -1
  46. package/flinkArtifact.d.ts +11 -3
  47. package/flinkArtifact.js +11 -3
  48. package/flinkArtifact.js.map +1 -1
  49. package/flinkComputePool.d.ts +9 -3
  50. package/flinkComputePool.js +9 -3
  51. package/flinkComputePool.js.map +1 -1
  52. package/flinkConnection.d.ts +97 -11
  53. package/flinkConnection.js +97 -11
  54. package/flinkConnection.js.map +1 -1
  55. package/flinkStatement.d.ts +32 -11
  56. package/flinkStatement.js +5 -8
  57. package/flinkStatement.js.map +1 -1
  58. package/gateway.d.ts +3 -3
  59. package/gateway.js +3 -3
  60. package/getNetwork.d.ts +32 -0
  61. package/getNetwork.js +32 -0
  62. package/getNetwork.js.map +1 -1
  63. package/getProviderIntegrationAuthorization.d.ts +260 -0
  64. package/getProviderIntegrationAuthorization.js +260 -0
  65. package/getProviderIntegrationAuthorization.js.map +1 -1
  66. package/groupMapping.d.ts +3 -3
  67. package/groupMapping.js +3 -3
  68. package/identityPool.d.ts +3 -3
  69. package/identityPool.js +3 -3
  70. package/identityProvider.d.ts +3 -3
  71. package/identityProvider.js +3 -3
  72. package/invitation.d.ts +12 -3
  73. package/invitation.js +3 -3
  74. package/invitation.js.map +1 -1
  75. package/ipFilter.d.ts +3 -3
  76. package/ipFilter.js +3 -3
  77. package/ipGroup.d.ts +3 -3
  78. package/ipGroup.js +3 -3
  79. package/kafkaAcl.d.ts +30 -11
  80. package/kafkaAcl.js +3 -8
  81. package/kafkaAcl.js.map +1 -1
  82. package/kafkaClientQuota.d.ts +11 -3
  83. package/kafkaClientQuota.js +11 -3
  84. package/kafkaClientQuota.js.map +1 -1
  85. package/kafkaCluster.d.ts +9 -3
  86. package/kafkaCluster.js +9 -3
  87. package/kafkaCluster.js.map +1 -1
  88. package/kafkaClusterConfig.d.ts +1 -4
  89. package/kafkaClusterConfig.js +1 -4
  90. package/kafkaClusterConfig.js.map +1 -1
  91. package/kafkaMirrorTopic.d.ts +54 -4
  92. package/kafkaMirrorTopic.js +9 -4
  93. package/kafkaMirrorTopic.js.map +1 -1
  94. package/kafkaTopic.d.ts +11 -33
  95. package/kafkaTopic.js +11 -33
  96. package/kafkaTopic.js.map +1 -1
  97. package/ksqlCluster.d.ts +3 -3
  98. package/ksqlCluster.js +3 -3
  99. package/network.d.ts +9 -3
  100. package/network.js +9 -3
  101. package/network.js.map +1 -1
  102. package/networkLinkEndpoint.d.ts +9 -3
  103. package/networkLinkEndpoint.js +9 -3
  104. package/networkLinkEndpoint.js.map +1 -1
  105. package/networkLinkService.d.ts +9 -3
  106. package/networkLinkService.js +9 -3
  107. package/networkLinkService.js.map +1 -1
  108. package/package.json +2 -2
  109. package/peering.d.ts +9 -3
  110. package/peering.js +9 -3
  111. package/peering.js.map +1 -1
  112. package/plugin.d.ts +9 -3
  113. package/plugin.js +9 -3
  114. package/plugin.js.map +1 -1
  115. package/privateLinkAccess.d.ts +9 -3
  116. package/privateLinkAccess.js +9 -3
  117. package/privateLinkAccess.js.map +1 -1
  118. package/privateLinkAttachment.d.ts +3 -3
  119. package/privateLinkAttachment.js +3 -3
  120. package/privateLinkAttachmentConnection.d.ts +3 -3
  121. package/privateLinkAttachmentConnection.js +3 -3
  122. package/providerIntegration.d.ts +9 -3
  123. package/providerIntegration.js +9 -3
  124. package/providerIntegration.js.map +1 -1
  125. package/providerIntegrationAuthorization.d.ts +161 -3
  126. package/providerIntegrationAuthorization.js +161 -3
  127. package/providerIntegrationAuthorization.js.map +1 -1
  128. package/providerIntegrationSetup.d.ts +11 -3
  129. package/providerIntegrationSetup.js +11 -3
  130. package/providerIntegrationSetup.js.map +1 -1
  131. package/roleBinding.d.ts +36 -3
  132. package/roleBinding.js +3 -3
  133. package/roleBinding.js.map +1 -1
  134. package/schema.d.ts +22 -11
  135. package/schema.js +13 -11
  136. package/schema.js.map +1 -1
  137. package/schemaExporter.d.ts +3 -5
  138. package/schemaExporter.js +3 -5
  139. package/schemaExporter.js.map +1 -1
  140. package/schemaRegistryClusterConfig.d.ts +7 -4
  141. package/schemaRegistryClusterConfig.js +7 -4
  142. package/schemaRegistryClusterConfig.js.map +1 -1
  143. package/schemaRegistryClusterMode.d.ts +7 -4
  144. package/schemaRegistryClusterMode.js +7 -4
  145. package/schemaRegistryClusterMode.js.map +1 -1
  146. package/schemaRegistryDek.d.ts +22 -7
  147. package/schemaRegistryDek.js +1 -4
  148. package/schemaRegistryDek.js.map +1 -1
  149. package/schemaRegistryKek.d.ts +22 -7
  150. package/schemaRegistryKek.js +1 -4
  151. package/schemaRegistryKek.js.map +1 -1
  152. package/serviceAccount.d.ts +3 -3
  153. package/serviceAccount.js +3 -3
  154. package/subjectConfig.d.ts +7 -4
  155. package/subjectConfig.js +7 -4
  156. package/subjectConfig.js.map +1 -1
  157. package/subjectMode.d.ts +7 -4
  158. package/subjectMode.js +7 -4
  159. package/subjectMode.js.map +1 -1
  160. package/tableflowTopic.d.ts +7 -3
  161. package/tableflowTopic.js +7 -3
  162. package/tableflowTopic.js.map +1 -1
  163. package/tag.d.ts +22 -7
  164. package/tag.js +1 -4
  165. package/tag.js.map +1 -1
  166. package/tagBinding.d.ts +28 -4
  167. package/tagBinding.js +1 -4
  168. package/tagBinding.js.map +1 -1
  169. package/tfImporter.d.ts +6 -0
  170. package/tfImporter.js +6 -0
  171. package/tfImporter.js.map +1 -1
  172. package/transitGatewayAttachment.d.ts +9 -3
  173. package/transitGatewayAttachment.js +9 -3
  174. package/transitGatewayAttachment.js.map +1 -1
  175. package/types/input.d.ts +98 -16
  176. package/types/output.d.ts +78 -12
package/tagBinding.d.ts CHANGED
@@ -58,13 +58,10 @@ import * as outputs from "./types/output";
58
58
  *
59
59
  * You can import a Tag Binding by using the Schema Registry cluster ID, Tag name, entity name and entity type in the format `<Schema Registry Cluster Id>/<Tag Name>/<Entity Name>/<Entity Type>`, for example:
60
60
  *
61
+ * ```sh
61
62
  * $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
62
- *
63
63
  * $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
64
- *
65
64
  * $ export IMPORT_CATALOG_REST_ENDPOINT="<catalog_rest_endpoint>"
66
- *
67
- * ```sh
68
65
  * $ pulumi import confluentcloud:index/tagBinding:TagBinding main lsrc-8wrx70/PII/lsrc-8wrx70:.:100001/sr_schema
69
66
  * ```
70
67
  *
@@ -90,6 +87,15 @@ export declare class TagBinding extends pulumi.CustomResource {
90
87
  * The Cluster API Credentials.
91
88
  */
92
89
  readonly credentials: pulumi.Output<outputs.TagBindingCredentials | undefined>;
90
+ /**
91
+ * An optional flag to disable wait-for-readiness on create. Must be unset when importing. Defaults to `false`.
92
+ *
93
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
94
+ *
95
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_tag_binding.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tag_binding.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
96
+ *
97
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TagBinding` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
98
+ */
93
99
  readonly disableWaitForReady: pulumi.Output<boolean | undefined>;
94
100
  /**
95
101
  * The qualified name of the entity, for example, `${data.confluent_schema_registry_cluster.essentials.id}:.:${confluent_schema.purchase.schema_identifier}`, `${data.confluent_schema_registry_cluster.essentials.id}:${confluent_kafka_cluster.basic.id}:${confluent_kafka_topic.purchase.topic_name}`. Refer to the [Examples of qualified names](https://docs.confluent.io/cloud/current/stream-governance/stream-catalog-rest-apis.html#examples-of-qualified-names) to see the full list of supported values for the `entityName` attribute.
@@ -125,6 +131,15 @@ export interface TagBindingState {
125
131
  * The Cluster API Credentials.
126
132
  */
127
133
  credentials?: pulumi.Input<inputs.TagBindingCredentials>;
134
+ /**
135
+ * An optional flag to disable wait-for-readiness on create. Must be unset when importing. Defaults to `false`.
136
+ *
137
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
138
+ *
139
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_tag_binding.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tag_binding.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
140
+ *
141
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TagBinding` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
142
+ */
128
143
  disableWaitForReady?: pulumi.Input<boolean>;
129
144
  /**
130
145
  * The qualified name of the entity, for example, `${data.confluent_schema_registry_cluster.essentials.id}:.:${confluent_schema.purchase.schema_identifier}`, `${data.confluent_schema_registry_cluster.essentials.id}:${confluent_kafka_cluster.basic.id}:${confluent_kafka_topic.purchase.topic_name}`. Refer to the [Examples of qualified names](https://docs.confluent.io/cloud/current/stream-governance/stream-catalog-rest-apis.html#examples-of-qualified-names) to see the full list of supported values for the `entityName` attribute.
@@ -152,6 +167,15 @@ export interface TagBindingArgs {
152
167
  * The Cluster API Credentials.
153
168
  */
154
169
  credentials?: pulumi.Input<inputs.TagBindingCredentials>;
170
+ /**
171
+ * An optional flag to disable wait-for-readiness on create. Must be unset when importing. Defaults to `false`.
172
+ *
173
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
174
+ *
175
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_tag_binding.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tag_binding.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
176
+ *
177
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TagBinding` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
178
+ */
155
179
  disableWaitForReady?: pulumi.Input<boolean>;
156
180
  /**
157
181
  * The qualified name of the entity, for example, `${data.confluent_schema_registry_cluster.essentials.id}:.:${confluent_schema.purchase.schema_identifier}`, `${data.confluent_schema_registry_cluster.essentials.id}:${confluent_kafka_cluster.basic.id}:${confluent_kafka_topic.purchase.topic_name}`. Refer to the [Examples of qualified names](https://docs.confluent.io/cloud/current/stream-governance/stream-catalog-rest-apis.html#examples-of-qualified-names) to see the full list of supported values for the `entityName` attribute.
package/tagBinding.js CHANGED
@@ -62,13 +62,10 @@ const utilities = require("./utilities");
62
62
  *
63
63
  * You can import a Tag Binding by using the Schema Registry cluster ID, Tag name, entity name and entity type in the format `<Schema Registry Cluster Id>/<Tag Name>/<Entity Name>/<Entity Type>`, for example:
64
64
  *
65
+ * ```sh
65
66
  * $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
66
- *
67
67
  * $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
68
- *
69
68
  * $ export IMPORT_CATALOG_REST_ENDPOINT="<catalog_rest_endpoint>"
70
- *
71
- * ```sh
72
69
  * $ pulumi import confluentcloud:index/tagBinding:TagBinding main lsrc-8wrx70/PII/lsrc-8wrx70:.:100001/sr_schema
73
70
  * ```
74
71
  *
package/tagBinding.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"tagBinding.js","sourceRoot":"","sources":["../tagBinding.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoEG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;IAiCD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,EAAE,mBAAmB,CAAC;YACnE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,EAAE,mBAAmB,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;;AA9FL,gCA+FC;AAjFG,gBAAgB;AACO,uBAAY,GAAG,4CAA4C,CAAC"}
1
+ {"version":3,"file":"tagBinding.js","sourceRoot":"","sources":["../tagBinding.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiEG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;IA0CD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,EAAE,mBAAmB,CAAC;YACnE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,EAAE,mBAAmB,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;;AAvGL,gCAwGC;AA1FG,gBAAgB;AACO,uBAAY,GAAG,4CAA4C,CAAC"}
package/tfImporter.d.ts CHANGED
@@ -1,5 +1,11 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * [![General Availability](https://img.shields.io/badge/Lifecycle%20Stage-General%20Availability-%2345c6e8)](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
4
+ *
5
+ * `confluentcloud.TfImporter` resource provides an Importer resource that enables exporting of your existing Confluent Cloud resources to Terraform Configuration (`main.tf`) and Terraform State (`terraform.tfstate`) files to a local directory called `importedConfluentInfrastructure`.
6
+ *
7
+ * See Resource Importer for Confluent Terraform Provider for step-by-step instructions on how to use the `confluentcloud.TfImporter` resource.
8
+ *
3
9
  * ## Example Usage
4
10
  *
5
11
  * ```typescript
package/tfImporter.js CHANGED
@@ -6,6 +6,12 @@ exports.TfImporter = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * [![General Availability](https://img.shields.io/badge/Lifecycle%20Stage-General%20Availability-%2345c6e8)](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
10
+ *
11
+ * `confluentcloud.TfImporter` resource provides an Importer resource that enables exporting of your existing Confluent Cloud resources to Terraform Configuration (`main.tf`) and Terraform State (`terraform.tfstate`) files to a local directory called `importedConfluentInfrastructure`.
12
+ *
13
+ * See Resource Importer for Confluent Terraform Provider for step-by-step instructions on how to use the `confluentcloud.TfImporter` resource.
14
+ *
9
15
  * ## Example Usage
10
16
  *
11
17
  * ```typescript
package/tfImporter.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"tfImporter.js","sourceRoot":"","sources":["../tfImporter.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;GAmBG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;IA8BD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;SAClD;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;;AAtEL,gCAuEC;AAzDG,gBAAgB;AACO,uBAAY,GAAG,4CAA4C,CAAC"}
1
+ {"version":3,"file":"tfImporter.js","sourceRoot":"","sources":["../tfImporter.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;IA8BD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;SAClD;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;;AAtEL,gCAuEC;AAzDG,gBAAgB;AACO,uBAAY,GAAG,4CAA4C,CAAC"}
@@ -2,6 +2,12 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  import * as inputs from "./types/input";
3
3
  import * as outputs from "./types/output";
4
4
  /**
5
+ * [![General Availability](https://img.shields.io/badge/Lifecycle%20Stage-General%20Availability-%2345c6e8)](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
6
+ *
7
+ * `confluentcloud.TransitGatewayAttachment` provides a Transit Gateway Attachment resource that enables creating, editing, and deleting Transit Gateway Attachments on Confluent Cloud.
8
+ *
9
+ * > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental Transit Gateway Attachment deletion. This setting rejects plans that would destroy or recreate the Transit Gateway Attachment, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
10
+ *
5
11
  * ## Example Usage
6
12
  *
7
13
  * ### Example Transit Gateway Attachment on AWS
@@ -50,13 +56,13 @@ import * as outputs from "./types/output";
50
56
  *
51
57
  * ## Import
52
58
  *
59
+ * > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Transit Gateway Attachment.
60
+ *
53
61
  * You can import a Transit Gateway Attachment by using Environment ID and Transit Gateway Attachment ID, in the format `<Environment ID>/<Transit Gateway Attachment ID>`. The following example shows how to import a Transit Gateway Attachment:
54
62
  *
63
+ * ```sh
55
64
  * $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
56
- *
57
65
  * $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
58
- *
59
- * ```sh
60
66
  * $ pulumi import confluentcloud:index/transitGatewayAttachment:TransitGatewayAttachment my_tgwa env-abc123/tgwa-abc123
61
67
  * ```
62
68
  *
@@ -6,6 +6,12 @@ exports.TransitGatewayAttachment = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
+ * [![General Availability](https://img.shields.io/badge/Lifecycle%20Stage-General%20Availability-%2345c6e8)](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
10
+ *
11
+ * `confluentcloud.TransitGatewayAttachment` provides a Transit Gateway Attachment resource that enables creating, editing, and deleting Transit Gateway Attachments on Confluent Cloud.
12
+ *
13
+ * > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental Transit Gateway Attachment deletion. This setting rejects plans that would destroy or recreate the Transit Gateway Attachment, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
14
+ *
9
15
  * ## Example Usage
10
16
  *
11
17
  * ### Example Transit Gateway Attachment on AWS
@@ -54,13 +60,13 @@ const utilities = require("./utilities");
54
60
  *
55
61
  * ## Import
56
62
  *
63
+ * > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Transit Gateway Attachment.
64
+ *
57
65
  * You can import a Transit Gateway Attachment by using Environment ID and Transit Gateway Attachment ID, in the format `<Environment ID>/<Transit Gateway Attachment ID>`. The following example shows how to import a Transit Gateway Attachment:
58
66
  *
67
+ * ```sh
59
68
  * $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
60
- *
61
69
  * $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
62
- *
63
- * ```sh
64
70
  * $ pulumi import confluentcloud:index/transitGatewayAttachment:TransitGatewayAttachment my_tgwa env-abc123/tgwa-abc123
65
71
  * ```
66
72
  *
@@ -1 +1 @@
1
- {"version":3,"file":"transitGatewayAttachment.js","sourceRoot":"","sources":["../transitGatewayAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4DG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IA2BD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;YACnC,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AA7EL,4DA8EC;AAhEG,gBAAgB;AACO,qCAAY,GAAG,wEAAwE,CAAC"}
1
+ {"version":3,"file":"transitGatewayAttachment.js","sourceRoot":"","sources":["../transitGatewayAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkEG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IA2BD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;YACnC,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AA7EL,4DA8EC;AAhEG,gBAAgB;AACO,qCAAY,GAAG,wEAAwE,CAAC"}
package/types/input.d.ts CHANGED
@@ -185,7 +185,13 @@ export interface BusinessMetadataCredentials {
185
185
  */
186
186
  key: pulumi.Input<string>;
187
187
  /**
188
- * The Cluster API Secret for your Confluent Cloud cluster.
188
+ * The Schema Registry API Secret.
189
+ *
190
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
191
+ *
192
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_business_metadata.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_business_metadata.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
193
+ *
194
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.BusinessMetadata` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
189
195
  */
190
196
  secret: pulumi.Input<string>;
191
197
  }
@@ -261,7 +267,13 @@ export interface CatalogIntegrationCredentials {
261
267
  */
262
268
  key: pulumi.Input<string>;
263
269
  /**
264
- * The Cluster API Secret for your Confluent Cloud cluster.
270
+ * The Tableflow API Secret.
271
+ *
272
+ * > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Catalog Integrations in Confluent Cloud.
273
+ *
274
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Tableflow API key, create a new Tableflow API key, update the `credentials` block in all configuration files to use the new Tableflow API key, run `pulumi up -target="confluent_catalog_integration.example"`, and remove the old Tableflow API key. Alternatively, in case the old Tableflow API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_catalog_integration.example" -out=rotate-tableflow-api-key` and `pulumi up rotate-tableflow-api-key` instead.
275
+ *
276
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogIntegration` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
265
277
  */
266
278
  secret: pulumi.Input<string>;
267
279
  }
@@ -769,7 +781,11 @@ export interface GetCatalogIntegrationCredentials {
769
781
  */
770
782
  key: string;
771
783
  /**
772
- * The Cluster API Secret for your Confluent Cloud cluster.
784
+ * The Tableflow API Secret.
785
+ *
786
+ * > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Catalog Integrations in Confluent Cloud.
787
+ *
788
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogIntegration` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
773
789
  */
774
790
  secret: string;
775
791
  }
@@ -779,7 +795,11 @@ export interface GetCatalogIntegrationCredentialsArgs {
779
795
  */
780
796
  key: pulumi.Input<string>;
781
797
  /**
782
- * The Cluster API Secret for your Confluent Cloud cluster.
798
+ * The Tableflow API Secret.
799
+ *
800
+ * > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Catalog Integrations in Confluent Cloud.
801
+ *
802
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogIntegration` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
783
803
  */
784
804
  secret: pulumi.Input<string>;
785
805
  }
@@ -825,7 +845,11 @@ export interface GetClusterLinkCredentials {
825
845
  */
826
846
  key: string;
827
847
  /**
828
- * The Cluster API Secret for your Confluent Cloud cluster.
848
+ * The Kafka API Secret.
849
+ *
850
+ * > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
851
+ *
852
+ * !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.ClusterLink` data-source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
829
853
  */
830
854
  secret: string;
831
855
  }
@@ -835,7 +859,11 @@ export interface GetClusterLinkCredentialsArgs {
835
859
  */
836
860
  key: pulumi.Input<string>;
837
861
  /**
838
- * The Cluster API Secret for your Confluent Cloud cluster.
862
+ * The Kafka API Secret.
863
+ *
864
+ * > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
865
+ *
866
+ * !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.ClusterLink` data-source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
839
867
  */
840
868
  secret: pulumi.Input<string>;
841
869
  }
@@ -1305,7 +1333,11 @@ export interface GetKafkaTopicCredentials {
1305
1333
  */
1306
1334
  key: string;
1307
1335
  /**
1308
- * The Cluster API Secret for your Confluent Cloud cluster.
1336
+ * The Kafka API Secret.
1337
+ *
1338
+ * > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
1339
+ *
1340
+ * !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.KafkaTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
1309
1341
  */
1310
1342
  secret: string;
1311
1343
  }
@@ -1315,7 +1347,11 @@ export interface GetKafkaTopicCredentialsArgs {
1315
1347
  */
1316
1348
  key: pulumi.Input<string>;
1317
1349
  /**
1318
- * The Cluster API Secret for your Confluent Cloud cluster.
1350
+ * The Kafka API Secret.
1351
+ *
1352
+ * > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
1353
+ *
1354
+ * !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.KafkaTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
1319
1355
  */
1320
1356
  secret: pulumi.Input<string>;
1321
1357
  }
@@ -2183,7 +2219,11 @@ export interface GetTableflowTopicCredentials {
2183
2219
  */
2184
2220
  key: string;
2185
2221
  /**
2186
- * The Cluster API Secret for your Confluent Cloud cluster.
2222
+ * The Tableflow API Secret.
2223
+ *
2224
+ * > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Tableflow Topics in Confluent Cloud.
2225
+ *
2226
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TableflowTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
2187
2227
  */
2188
2228
  secret: string;
2189
2229
  }
@@ -2193,7 +2233,11 @@ export interface GetTableflowTopicCredentialsArgs {
2193
2233
  */
2194
2234
  key: pulumi.Input<string>;
2195
2235
  /**
2196
- * The Cluster API Secret for your Confluent Cloud cluster.
2236
+ * The Tableflow API Secret.
2237
+ *
2238
+ * > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Tableflow Topics in Confluent Cloud.
2239
+ *
2240
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TableflowTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
2197
2241
  */
2198
2242
  secret: pulumi.Input<string>;
2199
2243
  }
@@ -2914,7 +2958,13 @@ export interface SchemaCredentials {
2914
2958
  */
2915
2959
  key: pulumi.Input<string>;
2916
2960
  /**
2917
- * The Cluster API Secret for your Confluent Cloud cluster.
2961
+ * The Schema Registry API Secret.
2962
+ *
2963
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Kafka clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Kafka cluster.
2964
+ *
2965
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Kafka API key, update the `credentials` block in all configuration files to use the new Kafka API key, run `pulumi up -target="confluent_schema.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
2966
+ *
2967
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.Schema` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
2918
2968
  */
2919
2969
  secret: pulumi.Input<string>;
2920
2970
  }
@@ -2978,7 +3028,15 @@ export interface SchemaRegistryClusterConfigCredentials {
2978
3028
  */
2979
3029
  key: pulumi.Input<string>;
2980
3030
  /**
2981
- * The Cluster API Secret for your Confluent Cloud cluster.
3031
+ * The Schema Registry API Secret.
3032
+ *
3033
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
3034
+ *
3035
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_cluster_config.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_cluster_config.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
3036
+ *
3037
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SchemaRegistryClusterConfig` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
3038
+ *
3039
+ * > **Note:** To configure a config at the context level, affecting all subjects created within that context, use `confluentcloud.SubjectConfig` resource and pass in the context name as the `subjectName`. See the confluentcloud.SubjectConfig` resource documentation for more details.
2982
3040
  */
2983
3041
  secret: pulumi.Input<string>;
2984
3042
  }
@@ -2994,7 +3052,13 @@ export interface SchemaRegistryClusterModeCredentials {
2994
3052
  */
2995
3053
  key: pulumi.Input<string>;
2996
3054
  /**
2997
- * The Cluster API Secret for your Confluent Cloud cluster.
3055
+ * The Schema Registry API Secret.
3056
+ *
3057
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
3058
+ *
3059
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_cluster_mode.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_cluster_mode.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
3060
+ *
3061
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentKafkaClusterMode` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
2998
3062
  */
2999
3063
  secret: pulumi.Input<string>;
3000
3064
  }
@@ -3102,7 +3166,13 @@ export interface SubjectConfigCredentials {
3102
3166
  */
3103
3167
  key: pulumi.Input<string>;
3104
3168
  /**
3105
- * The Cluster API Secret for your Confluent Cloud cluster.
3169
+ * The Schema Registry API Secret.
3170
+ *
3171
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
3172
+ *
3173
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_subject_config.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_subject_config.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
3174
+ *
3175
+ * !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SubjectConfig` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
3106
3176
  */
3107
3177
  secret: pulumi.Input<string>;
3108
3178
  }
@@ -3118,7 +3188,13 @@ export interface SubjectModeCredentials {
3118
3188
  */
3119
3189
  key: pulumi.Input<string>;
3120
3190
  /**
3121
- * The Cluster API Secret for your Confluent Cloud cluster.
3191
+ * The Schema Registry API Secret.
3192
+ *
3193
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
3194
+ *
3195
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_subject_mode.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_subject_mode.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
3196
+ *
3197
+ * !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SubjectMode` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
3122
3198
  */
3123
3199
  secret: pulumi.Input<string>;
3124
3200
  }
@@ -3166,7 +3242,13 @@ export interface TableflowTopicCredentials {
3166
3242
  */
3167
3243
  key: pulumi.Input<string>;
3168
3244
  /**
3169
- * The Cluster API Secret for your Confluent Cloud cluster.
3245
+ * The Tableflow API Secret.
3246
+ *
3247
+ * > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Tableflow Topics in Confluent Cloud.
3248
+ *
3249
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Tableflow API key, create a new Tableflow API key, update the `credentials` block in all configuration files to use the new Tableflow API key, run `pulumi up -target="confluent_tableflow_topic.example"`, and remove the old Tableflow API key. Alternatively, in case the old Tableflow API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tableflow_topic.example" -out=rotate-tableflow-api-key` and `pulumi up rotate-tableflow-api-key` instead.
3250
+ *
3251
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TableflowTopic` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
3170
3252
  */
3171
3253
  secret: pulumi.Input<string>;
3172
3254
  }
package/types/output.d.ts CHANGED
@@ -184,7 +184,13 @@ export interface BusinessMetadataCredentials {
184
184
  */
185
185
  key: string;
186
186
  /**
187
- * The Cluster API Secret for your Confluent Cloud cluster.
187
+ * The Schema Registry API Secret.
188
+ *
189
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
190
+ *
191
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_business_metadata.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_business_metadata.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
192
+ *
193
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.BusinessMetadata` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
188
194
  */
189
195
  secret: string;
190
196
  }
@@ -260,7 +266,13 @@ export interface CatalogIntegrationCredentials {
260
266
  */
261
267
  key: string;
262
268
  /**
263
- * The Cluster API Secret for your Confluent Cloud cluster.
269
+ * The Tableflow API Secret.
270
+ *
271
+ * > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Catalog Integrations in Confluent Cloud.
272
+ *
273
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Tableflow API key, create a new Tableflow API key, update the `credentials` block in all configuration files to use the new Tableflow API key, run `pulumi up -target="confluent_catalog_integration.example"`, and remove the old Tableflow API key. Alternatively, in case the old Tableflow API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_catalog_integration.example" -out=rotate-tableflow-api-key` and `pulumi up rotate-tableflow-api-key` instead.
274
+ *
275
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogIntegration` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
264
276
  */
265
277
  secret: string;
266
278
  }
@@ -860,7 +872,11 @@ export interface GetCatalogIntegrationCredentials {
860
872
  */
861
873
  key: string;
862
874
  /**
863
- * The Cluster API Secret for your Confluent Cloud cluster.
875
+ * The Tableflow API Secret.
876
+ *
877
+ * > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Catalog Integrations in Confluent Cloud.
878
+ *
879
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogIntegration` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
864
880
  */
865
881
  secret: string;
866
882
  }
@@ -902,7 +918,11 @@ export interface GetClusterLinkCredentials {
902
918
  */
903
919
  key: string;
904
920
  /**
905
- * The Cluster API Secret for your Confluent Cloud cluster.
921
+ * The Kafka API Secret.
922
+ *
923
+ * > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
924
+ *
925
+ * !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.ClusterLink` data-source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
906
926
  */
907
927
  secret: string;
908
928
  }
@@ -1699,7 +1719,11 @@ export interface GetKafkaTopicCredentials {
1699
1719
  */
1700
1720
  key: string;
1701
1721
  /**
1702
- * The Cluster API Secret for your Confluent Cloud cluster.
1722
+ * The Kafka API Secret.
1723
+ *
1724
+ * > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
1725
+ *
1726
+ * !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.KafkaTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
1703
1727
  */
1704
1728
  secret: string;
1705
1729
  }
@@ -2495,7 +2519,11 @@ export interface GetTableflowTopicCredentials {
2495
2519
  */
2496
2520
  key: string;
2497
2521
  /**
2498
- * The Cluster API Secret for your Confluent Cloud cluster.
2522
+ * The Tableflow API Secret.
2523
+ *
2524
+ * > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Tableflow Topics in Confluent Cloud.
2525
+ *
2526
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TableflowTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
2499
2527
  */
2500
2528
  secret: string;
2501
2529
  }
@@ -3170,7 +3198,13 @@ export interface SchemaCredentials {
3170
3198
  */
3171
3199
  key: string;
3172
3200
  /**
3173
- * The Cluster API Secret for your Confluent Cloud cluster.
3201
+ * The Schema Registry API Secret.
3202
+ *
3203
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Kafka clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Kafka cluster.
3204
+ *
3205
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Kafka API key, update the `credentials` block in all configuration files to use the new Kafka API key, run `pulumi up -target="confluent_schema.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
3206
+ *
3207
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.Schema` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
3174
3208
  */
3175
3209
  secret: string;
3176
3210
  }
@@ -3234,7 +3268,15 @@ export interface SchemaRegistryClusterConfigCredentials {
3234
3268
  */
3235
3269
  key: string;
3236
3270
  /**
3237
- * The Cluster API Secret for your Confluent Cloud cluster.
3271
+ * The Schema Registry API Secret.
3272
+ *
3273
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
3274
+ *
3275
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_cluster_config.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_cluster_config.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
3276
+ *
3277
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SchemaRegistryClusterConfig` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
3278
+ *
3279
+ * > **Note:** To configure a config at the context level, affecting all subjects created within that context, use `confluentcloud.SubjectConfig` resource and pass in the context name as the `subjectName`. See the confluentcloud.SubjectConfig` resource documentation for more details.
3238
3280
  */
3239
3281
  secret: string;
3240
3282
  }
@@ -3250,7 +3292,13 @@ export interface SchemaRegistryClusterModeCredentials {
3250
3292
  */
3251
3293
  key: string;
3252
3294
  /**
3253
- * The Cluster API Secret for your Confluent Cloud cluster.
3295
+ * The Schema Registry API Secret.
3296
+ *
3297
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
3298
+ *
3299
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_cluster_mode.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_cluster_mode.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
3300
+ *
3301
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentKafkaClusterMode` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
3254
3302
  */
3255
3303
  secret: string;
3256
3304
  }
@@ -3358,7 +3406,13 @@ export interface SubjectConfigCredentials {
3358
3406
  */
3359
3407
  key: string;
3360
3408
  /**
3361
- * The Cluster API Secret for your Confluent Cloud cluster.
3409
+ * The Schema Registry API Secret.
3410
+ *
3411
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
3412
+ *
3413
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_subject_config.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_subject_config.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
3414
+ *
3415
+ * !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SubjectConfig` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
3362
3416
  */
3363
3417
  secret: string;
3364
3418
  }
@@ -3374,7 +3428,13 @@ export interface SubjectModeCredentials {
3374
3428
  */
3375
3429
  key: string;
3376
3430
  /**
3377
- * The Cluster API Secret for your Confluent Cloud cluster.
3431
+ * The Schema Registry API Secret.
3432
+ *
3433
+ * > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
3434
+ *
3435
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_subject_mode.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_subject_mode.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
3436
+ *
3437
+ * !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SubjectMode` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
3378
3438
  */
3379
3439
  secret: string;
3380
3440
  }
@@ -3422,7 +3482,13 @@ export interface TableflowTopicCredentials {
3422
3482
  */
3423
3483
  key: string;
3424
3484
  /**
3425
- * The Cluster API Secret for your Confluent Cloud cluster.
3485
+ * The Tableflow API Secret.
3486
+ *
3487
+ * > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Tableflow Topics in Confluent Cloud.
3488
+ *
3489
+ * > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Tableflow API key, create a new Tableflow API key, update the `credentials` block in all configuration files to use the new Tableflow API key, run `pulumi up -target="confluent_tableflow_topic.example"`, and remove the old Tableflow API key. Alternatively, in case the old Tableflow API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tableflow_topic.example" -out=rotate-tableflow-api-key` and `pulumi up rotate-tableflow-api-key` instead.
3490
+ *
3491
+ * !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TableflowTopic` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
3426
3492
  */
3427
3493
  secret: string;
3428
3494
  }