@pulumi/confluentcloud 2.58.0 → 2.59.0-alpha.1770934913
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessPoint.d.ts +3 -3
- package/accessPoint.js +3 -3
- package/apiKey.d.ts +12 -4
- package/apiKey.js +12 -4
- package/apiKey.js.map +1 -1
- package/businessMetadata.d.ts +1 -4
- package/businessMetadata.js +1 -4
- package/businessMetadata.js.map +1 -1
- package/businessMetadataBinding.d.ts +22 -7
- package/businessMetadataBinding.js +1 -4
- package/businessMetadataBinding.js.map +1 -1
- package/byokKey.d.ts +3 -3
- package/byokKey.js +3 -3
- package/catalogEntityAttributes.d.ts +36 -7
- package/catalogEntityAttributes.js +9 -4
- package/catalogEntityAttributes.js.map +1 -1
- package/catalogIntegration.d.ts +5 -3
- package/catalogIntegration.js +5 -3
- package/catalogIntegration.js.map +1 -1
- package/certificateAuthority.d.ts +3 -3
- package/certificateAuthority.js +3 -3
- package/certificatePool.d.ts +3 -3
- package/certificatePool.js +3 -3
- package/clusterLink.d.ts +10 -21
- package/clusterLink.js +10 -21
- package/clusterLink.js.map +1 -1
- package/connectArtifact.d.ts +11 -3
- package/connectArtifact.js +11 -3
- package/connectArtifact.js.map +1 -1
- package/connector.d.ts +11 -3
- package/connector.js +11 -3
- package/connector.js.map +1 -1
- package/customConnectorPlugin.d.ts +13 -3
- package/customConnectorPlugin.js +13 -3
- package/customConnectorPlugin.js.map +1 -1
- package/customConnectorPluginVersion.d.ts +13 -3
- package/customConnectorPluginVersion.js +13 -3
- package/customConnectorPluginVersion.js.map +1 -1
- package/dnsForwarder.d.ts +3 -3
- package/dnsForwarder.js +3 -3
- package/dnsRecord.d.ts +3 -3
- package/dnsRecord.js +3 -3
- package/environment.d.ts +9 -3
- package/environment.js +9 -3
- package/environment.js.map +1 -1
- package/flinkArtifact.d.ts +11 -3
- package/flinkArtifact.js +11 -3
- package/flinkArtifact.js.map +1 -1
- package/flinkComputePool.d.ts +9 -3
- package/flinkComputePool.js +9 -3
- package/flinkComputePool.js.map +1 -1
- package/flinkConnection.d.ts +97 -11
- package/flinkConnection.js +97 -11
- package/flinkConnection.js.map +1 -1
- package/flinkStatement.d.ts +32 -11
- package/flinkStatement.js +5 -8
- package/flinkStatement.js.map +1 -1
- package/gateway.d.ts +3 -3
- package/gateway.js +3 -3
- package/getNetwork.d.ts +32 -0
- package/getNetwork.js +32 -0
- package/getNetwork.js.map +1 -1
- package/getProviderIntegrationAuthorization.d.ts +260 -0
- package/getProviderIntegrationAuthorization.js +260 -0
- package/getProviderIntegrationAuthorization.js.map +1 -1
- package/groupMapping.d.ts +3 -3
- package/groupMapping.js +3 -3
- package/identityPool.d.ts +3 -3
- package/identityPool.js +3 -3
- package/identityProvider.d.ts +3 -3
- package/identityProvider.js +3 -3
- package/invitation.d.ts +12 -3
- package/invitation.js +3 -3
- package/invitation.js.map +1 -1
- package/ipFilter.d.ts +3 -3
- package/ipFilter.js +3 -3
- package/ipGroup.d.ts +3 -3
- package/ipGroup.js +3 -3
- package/kafkaAcl.d.ts +30 -11
- package/kafkaAcl.js +3 -8
- package/kafkaAcl.js.map +1 -1
- package/kafkaClientQuota.d.ts +11 -3
- package/kafkaClientQuota.js +11 -3
- package/kafkaClientQuota.js.map +1 -1
- package/kafkaCluster.d.ts +9 -3
- package/kafkaCluster.js +9 -3
- package/kafkaCluster.js.map +1 -1
- package/kafkaClusterConfig.d.ts +1 -4
- package/kafkaClusterConfig.js +1 -4
- package/kafkaClusterConfig.js.map +1 -1
- package/kafkaMirrorTopic.d.ts +54 -4
- package/kafkaMirrorTopic.js +9 -4
- package/kafkaMirrorTopic.js.map +1 -1
- package/kafkaTopic.d.ts +11 -33
- package/kafkaTopic.js +11 -33
- package/kafkaTopic.js.map +1 -1
- package/ksqlCluster.d.ts +3 -3
- package/ksqlCluster.js +3 -3
- package/network.d.ts +9 -3
- package/network.js +9 -3
- package/network.js.map +1 -1
- package/networkLinkEndpoint.d.ts +9 -3
- package/networkLinkEndpoint.js +9 -3
- package/networkLinkEndpoint.js.map +1 -1
- package/networkLinkService.d.ts +9 -3
- package/networkLinkService.js +9 -3
- package/networkLinkService.js.map +1 -1
- package/package.json +2 -2
- package/peering.d.ts +9 -3
- package/peering.js +9 -3
- package/peering.js.map +1 -1
- package/plugin.d.ts +9 -3
- package/plugin.js +9 -3
- package/plugin.js.map +1 -1
- package/privateLinkAccess.d.ts +9 -3
- package/privateLinkAccess.js +9 -3
- package/privateLinkAccess.js.map +1 -1
- package/privateLinkAttachment.d.ts +3 -3
- package/privateLinkAttachment.js +3 -3
- package/privateLinkAttachmentConnection.d.ts +3 -3
- package/privateLinkAttachmentConnection.js +3 -3
- package/providerIntegration.d.ts +9 -3
- package/providerIntegration.js +9 -3
- package/providerIntegration.js.map +1 -1
- package/providerIntegrationAuthorization.d.ts +161 -3
- package/providerIntegrationAuthorization.js +161 -3
- package/providerIntegrationAuthorization.js.map +1 -1
- package/providerIntegrationSetup.d.ts +11 -3
- package/providerIntegrationSetup.js +11 -3
- package/providerIntegrationSetup.js.map +1 -1
- package/roleBinding.d.ts +36 -3
- package/roleBinding.js +3 -3
- package/roleBinding.js.map +1 -1
- package/schema.d.ts +22 -11
- package/schema.js +13 -11
- package/schema.js.map +1 -1
- package/schemaExporter.d.ts +3 -5
- package/schemaExporter.js +3 -5
- package/schemaExporter.js.map +1 -1
- package/schemaRegistryClusterConfig.d.ts +7 -4
- package/schemaRegistryClusterConfig.js +7 -4
- package/schemaRegistryClusterConfig.js.map +1 -1
- package/schemaRegistryClusterMode.d.ts +7 -4
- package/schemaRegistryClusterMode.js +7 -4
- package/schemaRegistryClusterMode.js.map +1 -1
- package/schemaRegistryDek.d.ts +22 -7
- package/schemaRegistryDek.js +1 -4
- package/schemaRegistryDek.js.map +1 -1
- package/schemaRegistryKek.d.ts +22 -7
- package/schemaRegistryKek.js +1 -4
- package/schemaRegistryKek.js.map +1 -1
- package/serviceAccount.d.ts +3 -3
- package/serviceAccount.js +3 -3
- package/subjectConfig.d.ts +7 -4
- package/subjectConfig.js +7 -4
- package/subjectConfig.js.map +1 -1
- package/subjectMode.d.ts +7 -4
- package/subjectMode.js +7 -4
- package/subjectMode.js.map +1 -1
- package/tableflowTopic.d.ts +7 -3
- package/tableflowTopic.js +7 -3
- package/tableflowTopic.js.map +1 -1
- package/tag.d.ts +22 -7
- package/tag.js +1 -4
- package/tag.js.map +1 -1
- package/tagBinding.d.ts +28 -4
- package/tagBinding.js +1 -4
- package/tagBinding.js.map +1 -1
- package/tfImporter.d.ts +6 -0
- package/tfImporter.js +6 -0
- package/tfImporter.js.map +1 -1
- package/transitGatewayAttachment.d.ts +9 -3
- package/transitGatewayAttachment.js +9 -3
- package/transitGatewayAttachment.js.map +1 -1
- package/types/input.d.ts +98 -16
- package/types/output.d.ts +78 -12
package/tagBinding.d.ts
CHANGED
|
@@ -58,13 +58,10 @@ import * as outputs from "./types/output";
|
|
|
58
58
|
*
|
|
59
59
|
* You can import a Tag Binding by using the Schema Registry cluster ID, Tag name, entity name and entity type in the format `<Schema Registry Cluster Id>/<Tag Name>/<Entity Name>/<Entity Type>`, for example:
|
|
60
60
|
*
|
|
61
|
+
* ```sh
|
|
61
62
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
62
|
-
*
|
|
63
63
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
64
|
-
*
|
|
65
64
|
* $ export IMPORT_CATALOG_REST_ENDPOINT="<catalog_rest_endpoint>"
|
|
66
|
-
*
|
|
67
|
-
* ```sh
|
|
68
65
|
* $ pulumi import confluentcloud:index/tagBinding:TagBinding main lsrc-8wrx70/PII/lsrc-8wrx70:.:100001/sr_schema
|
|
69
66
|
* ```
|
|
70
67
|
*
|
|
@@ -90,6 +87,15 @@ export declare class TagBinding extends pulumi.CustomResource {
|
|
|
90
87
|
* The Cluster API Credentials.
|
|
91
88
|
*/
|
|
92
89
|
readonly credentials: pulumi.Output<outputs.TagBindingCredentials | undefined>;
|
|
90
|
+
/**
|
|
91
|
+
* An optional flag to disable wait-for-readiness on create. Must be unset when importing. Defaults to `false`.
|
|
92
|
+
*
|
|
93
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
94
|
+
*
|
|
95
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_tag_binding.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tag_binding.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
96
|
+
*
|
|
97
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TagBinding` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
98
|
+
*/
|
|
93
99
|
readonly disableWaitForReady: pulumi.Output<boolean | undefined>;
|
|
94
100
|
/**
|
|
95
101
|
* The qualified name of the entity, for example, `${data.confluent_schema_registry_cluster.essentials.id}:.:${confluent_schema.purchase.schema_identifier}`, `${data.confluent_schema_registry_cluster.essentials.id}:${confluent_kafka_cluster.basic.id}:${confluent_kafka_topic.purchase.topic_name}`. Refer to the [Examples of qualified names](https://docs.confluent.io/cloud/current/stream-governance/stream-catalog-rest-apis.html#examples-of-qualified-names) to see the full list of supported values for the `entityName` attribute.
|
|
@@ -125,6 +131,15 @@ export interface TagBindingState {
|
|
|
125
131
|
* The Cluster API Credentials.
|
|
126
132
|
*/
|
|
127
133
|
credentials?: pulumi.Input<inputs.TagBindingCredentials>;
|
|
134
|
+
/**
|
|
135
|
+
* An optional flag to disable wait-for-readiness on create. Must be unset when importing. Defaults to `false`.
|
|
136
|
+
*
|
|
137
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
138
|
+
*
|
|
139
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_tag_binding.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tag_binding.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
140
|
+
*
|
|
141
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TagBinding` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
142
|
+
*/
|
|
128
143
|
disableWaitForReady?: pulumi.Input<boolean>;
|
|
129
144
|
/**
|
|
130
145
|
* The qualified name of the entity, for example, `${data.confluent_schema_registry_cluster.essentials.id}:.:${confluent_schema.purchase.schema_identifier}`, `${data.confluent_schema_registry_cluster.essentials.id}:${confluent_kafka_cluster.basic.id}:${confluent_kafka_topic.purchase.topic_name}`. Refer to the [Examples of qualified names](https://docs.confluent.io/cloud/current/stream-governance/stream-catalog-rest-apis.html#examples-of-qualified-names) to see the full list of supported values for the `entityName` attribute.
|
|
@@ -152,6 +167,15 @@ export interface TagBindingArgs {
|
|
|
152
167
|
* The Cluster API Credentials.
|
|
153
168
|
*/
|
|
154
169
|
credentials?: pulumi.Input<inputs.TagBindingCredentials>;
|
|
170
|
+
/**
|
|
171
|
+
* An optional flag to disable wait-for-readiness on create. Must be unset when importing. Defaults to `false`.
|
|
172
|
+
*
|
|
173
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
174
|
+
*
|
|
175
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_tag_binding.main"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tag_binding.main" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
176
|
+
*
|
|
177
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TagBinding` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
178
|
+
*/
|
|
155
179
|
disableWaitForReady?: pulumi.Input<boolean>;
|
|
156
180
|
/**
|
|
157
181
|
* The qualified name of the entity, for example, `${data.confluent_schema_registry_cluster.essentials.id}:.:${confluent_schema.purchase.schema_identifier}`, `${data.confluent_schema_registry_cluster.essentials.id}:${confluent_kafka_cluster.basic.id}:${confluent_kafka_topic.purchase.topic_name}`. Refer to the [Examples of qualified names](https://docs.confluent.io/cloud/current/stream-governance/stream-catalog-rest-apis.html#examples-of-qualified-names) to see the full list of supported values for the `entityName` attribute.
|
package/tagBinding.js
CHANGED
|
@@ -62,13 +62,10 @@ const utilities = require("./utilities");
|
|
|
62
62
|
*
|
|
63
63
|
* You can import a Tag Binding by using the Schema Registry cluster ID, Tag name, entity name and entity type in the format `<Schema Registry Cluster Id>/<Tag Name>/<Entity Name>/<Entity Type>`, for example:
|
|
64
64
|
*
|
|
65
|
+
* ```sh
|
|
65
66
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
66
|
-
*
|
|
67
67
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
68
|
-
*
|
|
69
68
|
* $ export IMPORT_CATALOG_REST_ENDPOINT="<catalog_rest_endpoint>"
|
|
70
|
-
*
|
|
71
|
-
* ```sh
|
|
72
69
|
* $ pulumi import confluentcloud:index/tagBinding:TagBinding main lsrc-8wrx70/PII/lsrc-8wrx70:.:100001/sr_schema
|
|
73
70
|
* ```
|
|
74
71
|
*
|
package/tagBinding.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"tagBinding.js","sourceRoot":"","sources":["../tagBinding.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"tagBinding.js","sourceRoot":"","sources":["../tagBinding.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiEG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;IA0CD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,EAAE,mBAAmB,CAAC;YACnE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,UAAU,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7C,MAAM,IAAI,KAAK,CAAC,wCAAwC,CAAC,CAAC;aAC7D;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,EAAE,mBAAmB,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;;AAvGL,gCAwGC;AA1FG,gBAAgB;AACO,uBAAY,GAAG,4CAA4C,CAAC"}
|
package/tfImporter.d.ts
CHANGED
|
@@ -1,5 +1,11 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
4
|
+
*
|
|
5
|
+
* `confluentcloud.TfImporter` resource provides an Importer resource that enables exporting of your existing Confluent Cloud resources to Terraform Configuration (`main.tf`) and Terraform State (`terraform.tfstate`) files to a local directory called `importedConfluentInfrastructure`.
|
|
6
|
+
*
|
|
7
|
+
* See Resource Importer for Confluent Terraform Provider for step-by-step instructions on how to use the `confluentcloud.TfImporter` resource.
|
|
8
|
+
*
|
|
3
9
|
* ## Example Usage
|
|
4
10
|
*
|
|
5
11
|
* ```typescript
|
package/tfImporter.js
CHANGED
|
@@ -6,6 +6,12 @@ exports.TfImporter = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
10
|
+
*
|
|
11
|
+
* `confluentcloud.TfImporter` resource provides an Importer resource that enables exporting of your existing Confluent Cloud resources to Terraform Configuration (`main.tf`) and Terraform State (`terraform.tfstate`) files to a local directory called `importedConfluentInfrastructure`.
|
|
12
|
+
*
|
|
13
|
+
* See Resource Importer for Confluent Terraform Provider for step-by-step instructions on how to use the `confluentcloud.TfImporter` resource.
|
|
14
|
+
*
|
|
9
15
|
* ## Example Usage
|
|
10
16
|
*
|
|
11
17
|
* ```typescript
|
package/tfImporter.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"tfImporter.js","sourceRoot":"","sources":["../tfImporter.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"tfImporter.js","sourceRoot":"","sources":["../tfImporter.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,UAAW,SAAQ,MAAM,CAAC,cAAc;IACjD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuB,EAAE,IAAmC;QACrH,OAAO,IAAI,UAAU,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACjE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,UAAU,CAAC,YAAY,CAAC;IAC3D,CAAC;IA8BD,YAAY,IAAY,EAAE,WAA8C,EAAE,IAAmC;QACzG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0C,CAAC;YACzD,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;SAClD;aAAM;YACH,MAAM,IAAI,GAAG,WAAyC,CAAC;YACvD,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,UAAU,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/D,CAAC;;AAtEL,gCAuEC;AAzDG,gBAAgB;AACO,uBAAY,GAAG,4CAA4C,CAAC"}
|
|
@@ -2,6 +2,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
6
|
+
*
|
|
7
|
+
* `confluentcloud.TransitGatewayAttachment` provides a Transit Gateway Attachment resource that enables creating, editing, and deleting Transit Gateway Attachments on Confluent Cloud.
|
|
8
|
+
*
|
|
9
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental Transit Gateway Attachment deletion. This setting rejects plans that would destroy or recreate the Transit Gateway Attachment, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
10
|
+
*
|
|
5
11
|
* ## Example Usage
|
|
6
12
|
*
|
|
7
13
|
* ### Example Transit Gateway Attachment on AWS
|
|
@@ -50,13 +56,13 @@ import * as outputs from "./types/output";
|
|
|
50
56
|
*
|
|
51
57
|
* ## Import
|
|
52
58
|
*
|
|
59
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Transit Gateway Attachment.
|
|
60
|
+
*
|
|
53
61
|
* You can import a Transit Gateway Attachment by using Environment ID and Transit Gateway Attachment ID, in the format `<Environment ID>/<Transit Gateway Attachment ID>`. The following example shows how to import a Transit Gateway Attachment:
|
|
54
62
|
*
|
|
63
|
+
* ```sh
|
|
55
64
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
56
|
-
*
|
|
57
65
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
58
|
-
*
|
|
59
|
-
* ```sh
|
|
60
66
|
* $ pulumi import confluentcloud:index/transitGatewayAttachment:TransitGatewayAttachment my_tgwa env-abc123/tgwa-abc123
|
|
61
67
|
* ```
|
|
62
68
|
*
|
|
@@ -6,6 +6,12 @@ exports.TransitGatewayAttachment = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
10
|
+
*
|
|
11
|
+
* `confluentcloud.TransitGatewayAttachment` provides a Transit Gateway Attachment resource that enables creating, editing, and deleting Transit Gateway Attachments on Confluent Cloud.
|
|
12
|
+
*
|
|
13
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental Transit Gateway Attachment deletion. This setting rejects plans that would destroy or recreate the Transit Gateway Attachment, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
14
|
+
*
|
|
9
15
|
* ## Example Usage
|
|
10
16
|
*
|
|
11
17
|
* ### Example Transit Gateway Attachment on AWS
|
|
@@ -54,13 +60,13 @@ const utilities = require("./utilities");
|
|
|
54
60
|
*
|
|
55
61
|
* ## Import
|
|
56
62
|
*
|
|
63
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Transit Gateway Attachment.
|
|
64
|
+
*
|
|
57
65
|
* You can import a Transit Gateway Attachment by using Environment ID and Transit Gateway Attachment ID, in the format `<Environment ID>/<Transit Gateway Attachment ID>`. The following example shows how to import a Transit Gateway Attachment:
|
|
58
66
|
*
|
|
67
|
+
* ```sh
|
|
59
68
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
60
|
-
*
|
|
61
69
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
62
|
-
*
|
|
63
|
-
* ```sh
|
|
64
70
|
* $ pulumi import confluentcloud:index/transitGatewayAttachment:TransitGatewayAttachment my_tgwa env-abc123/tgwa-abc123
|
|
65
71
|
* ```
|
|
66
72
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"transitGatewayAttachment.js","sourceRoot":"","sources":["../transitGatewayAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"transitGatewayAttachment.js","sourceRoot":"","sources":["../transitGatewayAttachment.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkEG;AACH,MAAa,wBAAyB,SAAQ,MAAM,CAAC,cAAc;IAC/D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAqC,EAAE,IAAmC;QACnI,OAAO,IAAI,wBAAwB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC/E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,wBAAwB,CAAC,YAAY,CAAC;IACzE,CAAC;IA2BD,YAAY,IAAY,EAAE,WAA0E,EAAE,IAAmC;QACrI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAwD,CAAC;YACvE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;YACnC,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAuD,CAAC;YACrE,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;SAC7C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,wBAAwB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC7E,CAAC;;AA7EL,4DA8EC;AAhEG,gBAAgB;AACO,qCAAY,GAAG,wEAAwE,CAAC"}
|
package/types/input.d.ts
CHANGED
|
@@ -185,7 +185,13 @@ export interface BusinessMetadataCredentials {
|
|
|
185
185
|
*/
|
|
186
186
|
key: pulumi.Input<string>;
|
|
187
187
|
/**
|
|
188
|
-
* The
|
|
188
|
+
* The Schema Registry API Secret.
|
|
189
|
+
*
|
|
190
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
191
|
+
*
|
|
192
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_business_metadata.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_business_metadata.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
193
|
+
*
|
|
194
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.BusinessMetadata` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
189
195
|
*/
|
|
190
196
|
secret: pulumi.Input<string>;
|
|
191
197
|
}
|
|
@@ -261,7 +267,13 @@ export interface CatalogIntegrationCredentials {
|
|
|
261
267
|
*/
|
|
262
268
|
key: pulumi.Input<string>;
|
|
263
269
|
/**
|
|
264
|
-
* The
|
|
270
|
+
* The Tableflow API Secret.
|
|
271
|
+
*
|
|
272
|
+
* > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Catalog Integrations in Confluent Cloud.
|
|
273
|
+
*
|
|
274
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Tableflow API key, create a new Tableflow API key, update the `credentials` block in all configuration files to use the new Tableflow API key, run `pulumi up -target="confluent_catalog_integration.example"`, and remove the old Tableflow API key. Alternatively, in case the old Tableflow API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_catalog_integration.example" -out=rotate-tableflow-api-key` and `pulumi up rotate-tableflow-api-key` instead.
|
|
275
|
+
*
|
|
276
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogIntegration` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
265
277
|
*/
|
|
266
278
|
secret: pulumi.Input<string>;
|
|
267
279
|
}
|
|
@@ -769,7 +781,11 @@ export interface GetCatalogIntegrationCredentials {
|
|
|
769
781
|
*/
|
|
770
782
|
key: string;
|
|
771
783
|
/**
|
|
772
|
-
* The
|
|
784
|
+
* The Tableflow API Secret.
|
|
785
|
+
*
|
|
786
|
+
* > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Catalog Integrations in Confluent Cloud.
|
|
787
|
+
*
|
|
788
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogIntegration` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
773
789
|
*/
|
|
774
790
|
secret: string;
|
|
775
791
|
}
|
|
@@ -779,7 +795,11 @@ export interface GetCatalogIntegrationCredentialsArgs {
|
|
|
779
795
|
*/
|
|
780
796
|
key: pulumi.Input<string>;
|
|
781
797
|
/**
|
|
782
|
-
* The
|
|
798
|
+
* The Tableflow API Secret.
|
|
799
|
+
*
|
|
800
|
+
* > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Catalog Integrations in Confluent Cloud.
|
|
801
|
+
*
|
|
802
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogIntegration` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
783
803
|
*/
|
|
784
804
|
secret: pulumi.Input<string>;
|
|
785
805
|
}
|
|
@@ -825,7 +845,11 @@ export interface GetClusterLinkCredentials {
|
|
|
825
845
|
*/
|
|
826
846
|
key: string;
|
|
827
847
|
/**
|
|
828
|
-
* The
|
|
848
|
+
* The Kafka API Secret.
|
|
849
|
+
*
|
|
850
|
+
* > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
|
|
851
|
+
*
|
|
852
|
+
* !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.ClusterLink` data-source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
829
853
|
*/
|
|
830
854
|
secret: string;
|
|
831
855
|
}
|
|
@@ -835,7 +859,11 @@ export interface GetClusterLinkCredentialsArgs {
|
|
|
835
859
|
*/
|
|
836
860
|
key: pulumi.Input<string>;
|
|
837
861
|
/**
|
|
838
|
-
* The
|
|
862
|
+
* The Kafka API Secret.
|
|
863
|
+
*
|
|
864
|
+
* > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
|
|
865
|
+
*
|
|
866
|
+
* !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.ClusterLink` data-source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
839
867
|
*/
|
|
840
868
|
secret: pulumi.Input<string>;
|
|
841
869
|
}
|
|
@@ -1305,7 +1333,11 @@ export interface GetKafkaTopicCredentials {
|
|
|
1305
1333
|
*/
|
|
1306
1334
|
key: string;
|
|
1307
1335
|
/**
|
|
1308
|
-
* The
|
|
1336
|
+
* The Kafka API Secret.
|
|
1337
|
+
*
|
|
1338
|
+
* > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
|
|
1339
|
+
*
|
|
1340
|
+
* !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.KafkaTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
1309
1341
|
*/
|
|
1310
1342
|
secret: string;
|
|
1311
1343
|
}
|
|
@@ -1315,7 +1347,11 @@ export interface GetKafkaTopicCredentialsArgs {
|
|
|
1315
1347
|
*/
|
|
1316
1348
|
key: pulumi.Input<string>;
|
|
1317
1349
|
/**
|
|
1318
|
-
* The
|
|
1350
|
+
* The Kafka API Secret.
|
|
1351
|
+
*
|
|
1352
|
+
* > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
|
|
1353
|
+
*
|
|
1354
|
+
* !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.KafkaTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
1319
1355
|
*/
|
|
1320
1356
|
secret: pulumi.Input<string>;
|
|
1321
1357
|
}
|
|
@@ -2183,7 +2219,11 @@ export interface GetTableflowTopicCredentials {
|
|
|
2183
2219
|
*/
|
|
2184
2220
|
key: string;
|
|
2185
2221
|
/**
|
|
2186
|
-
* The
|
|
2222
|
+
* The Tableflow API Secret.
|
|
2223
|
+
*
|
|
2224
|
+
* > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Tableflow Topics in Confluent Cloud.
|
|
2225
|
+
*
|
|
2226
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TableflowTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
2187
2227
|
*/
|
|
2188
2228
|
secret: string;
|
|
2189
2229
|
}
|
|
@@ -2193,7 +2233,11 @@ export interface GetTableflowTopicCredentialsArgs {
|
|
|
2193
2233
|
*/
|
|
2194
2234
|
key: pulumi.Input<string>;
|
|
2195
2235
|
/**
|
|
2196
|
-
* The
|
|
2236
|
+
* The Tableflow API Secret.
|
|
2237
|
+
*
|
|
2238
|
+
* > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Tableflow Topics in Confluent Cloud.
|
|
2239
|
+
*
|
|
2240
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TableflowTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
2197
2241
|
*/
|
|
2198
2242
|
secret: pulumi.Input<string>;
|
|
2199
2243
|
}
|
|
@@ -2914,7 +2958,13 @@ export interface SchemaCredentials {
|
|
|
2914
2958
|
*/
|
|
2915
2959
|
key: pulumi.Input<string>;
|
|
2916
2960
|
/**
|
|
2917
|
-
* The
|
|
2961
|
+
* The Schema Registry API Secret.
|
|
2962
|
+
*
|
|
2963
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Kafka clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Kafka cluster.
|
|
2964
|
+
*
|
|
2965
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Kafka API key, update the `credentials` block in all configuration files to use the new Kafka API key, run `pulumi up -target="confluent_schema.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
2966
|
+
*
|
|
2967
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.Schema` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
2918
2968
|
*/
|
|
2919
2969
|
secret: pulumi.Input<string>;
|
|
2920
2970
|
}
|
|
@@ -2978,7 +3028,15 @@ export interface SchemaRegistryClusterConfigCredentials {
|
|
|
2978
3028
|
*/
|
|
2979
3029
|
key: pulumi.Input<string>;
|
|
2980
3030
|
/**
|
|
2981
|
-
* The
|
|
3031
|
+
* The Schema Registry API Secret.
|
|
3032
|
+
*
|
|
3033
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
3034
|
+
*
|
|
3035
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_cluster_config.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_cluster_config.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
3036
|
+
*
|
|
3037
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SchemaRegistryClusterConfig` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
3038
|
+
*
|
|
3039
|
+
* > **Note:** To configure a config at the context level, affecting all subjects created within that context, use `confluentcloud.SubjectConfig` resource and pass in the context name as the `subjectName`. See the confluentcloud.SubjectConfig` resource documentation for more details.
|
|
2982
3040
|
*/
|
|
2983
3041
|
secret: pulumi.Input<string>;
|
|
2984
3042
|
}
|
|
@@ -2994,7 +3052,13 @@ export interface SchemaRegistryClusterModeCredentials {
|
|
|
2994
3052
|
*/
|
|
2995
3053
|
key: pulumi.Input<string>;
|
|
2996
3054
|
/**
|
|
2997
|
-
* The
|
|
3055
|
+
* The Schema Registry API Secret.
|
|
3056
|
+
*
|
|
3057
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
3058
|
+
*
|
|
3059
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_cluster_mode.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_cluster_mode.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
3060
|
+
*
|
|
3061
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentKafkaClusterMode` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
2998
3062
|
*/
|
|
2999
3063
|
secret: pulumi.Input<string>;
|
|
3000
3064
|
}
|
|
@@ -3102,7 +3166,13 @@ export interface SubjectConfigCredentials {
|
|
|
3102
3166
|
*/
|
|
3103
3167
|
key: pulumi.Input<string>;
|
|
3104
3168
|
/**
|
|
3105
|
-
* The
|
|
3169
|
+
* The Schema Registry API Secret.
|
|
3170
|
+
*
|
|
3171
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
3172
|
+
*
|
|
3173
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_subject_config.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_subject_config.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
3174
|
+
*
|
|
3175
|
+
* !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SubjectConfig` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
3106
3176
|
*/
|
|
3107
3177
|
secret: pulumi.Input<string>;
|
|
3108
3178
|
}
|
|
@@ -3118,7 +3188,13 @@ export interface SubjectModeCredentials {
|
|
|
3118
3188
|
*/
|
|
3119
3189
|
key: pulumi.Input<string>;
|
|
3120
3190
|
/**
|
|
3121
|
-
* The
|
|
3191
|
+
* The Schema Registry API Secret.
|
|
3192
|
+
*
|
|
3193
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
3194
|
+
*
|
|
3195
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_subject_mode.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_subject_mode.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
3196
|
+
*
|
|
3197
|
+
* !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SubjectMode` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
3122
3198
|
*/
|
|
3123
3199
|
secret: pulumi.Input<string>;
|
|
3124
3200
|
}
|
|
@@ -3166,7 +3242,13 @@ export interface TableflowTopicCredentials {
|
|
|
3166
3242
|
*/
|
|
3167
3243
|
key: pulumi.Input<string>;
|
|
3168
3244
|
/**
|
|
3169
|
-
* The
|
|
3245
|
+
* The Tableflow API Secret.
|
|
3246
|
+
*
|
|
3247
|
+
* > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Tableflow Topics in Confluent Cloud.
|
|
3248
|
+
*
|
|
3249
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Tableflow API key, create a new Tableflow API key, update the `credentials` block in all configuration files to use the new Tableflow API key, run `pulumi up -target="confluent_tableflow_topic.example"`, and remove the old Tableflow API key. Alternatively, in case the old Tableflow API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tableflow_topic.example" -out=rotate-tableflow-api-key` and `pulumi up rotate-tableflow-api-key` instead.
|
|
3250
|
+
*
|
|
3251
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TableflowTopic` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
3170
3252
|
*/
|
|
3171
3253
|
secret: pulumi.Input<string>;
|
|
3172
3254
|
}
|
package/types/output.d.ts
CHANGED
|
@@ -184,7 +184,13 @@ export interface BusinessMetadataCredentials {
|
|
|
184
184
|
*/
|
|
185
185
|
key: string;
|
|
186
186
|
/**
|
|
187
|
-
* The
|
|
187
|
+
* The Schema Registry API Secret.
|
|
188
|
+
*
|
|
189
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
190
|
+
*
|
|
191
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_business_metadata.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_business_metadata.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
192
|
+
*
|
|
193
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.BusinessMetadata` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
188
194
|
*/
|
|
189
195
|
secret: string;
|
|
190
196
|
}
|
|
@@ -260,7 +266,13 @@ export interface CatalogIntegrationCredentials {
|
|
|
260
266
|
*/
|
|
261
267
|
key: string;
|
|
262
268
|
/**
|
|
263
|
-
* The
|
|
269
|
+
* The Tableflow API Secret.
|
|
270
|
+
*
|
|
271
|
+
* > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Catalog Integrations in Confluent Cloud.
|
|
272
|
+
*
|
|
273
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Tableflow API key, create a new Tableflow API key, update the `credentials` block in all configuration files to use the new Tableflow API key, run `pulumi up -target="confluent_catalog_integration.example"`, and remove the old Tableflow API key. Alternatively, in case the old Tableflow API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_catalog_integration.example" -out=rotate-tableflow-api-key` and `pulumi up rotate-tableflow-api-key` instead.
|
|
274
|
+
*
|
|
275
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogIntegration` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
264
276
|
*/
|
|
265
277
|
secret: string;
|
|
266
278
|
}
|
|
@@ -860,7 +872,11 @@ export interface GetCatalogIntegrationCredentials {
|
|
|
860
872
|
*/
|
|
861
873
|
key: string;
|
|
862
874
|
/**
|
|
863
|
-
* The
|
|
875
|
+
* The Tableflow API Secret.
|
|
876
|
+
*
|
|
877
|
+
* > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Catalog Integrations in Confluent Cloud.
|
|
878
|
+
*
|
|
879
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.CatalogIntegration` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
864
880
|
*/
|
|
865
881
|
secret: string;
|
|
866
882
|
}
|
|
@@ -902,7 +918,11 @@ export interface GetClusterLinkCredentials {
|
|
|
902
918
|
*/
|
|
903
919
|
key: string;
|
|
904
920
|
/**
|
|
905
|
-
* The
|
|
921
|
+
* The Kafka API Secret.
|
|
922
|
+
*
|
|
923
|
+
* > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
|
|
924
|
+
*
|
|
925
|
+
* !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.ClusterLink` data-source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
906
926
|
*/
|
|
907
927
|
secret: string;
|
|
908
928
|
}
|
|
@@ -1699,7 +1719,11 @@ export interface GetKafkaTopicCredentials {
|
|
|
1699
1719
|
*/
|
|
1700
1720
|
key: string;
|
|
1701
1721
|
/**
|
|
1702
|
-
* The
|
|
1722
|
+
* The Kafka API Secret.
|
|
1723
|
+
*
|
|
1724
|
+
* > **Note:** A Kafka API key consists of a key and a secret. Kafka API keys are required to interact with Kafka clusters in Confluent Cloud. Each Kafka API key is valid for one specific Kafka cluster.
|
|
1725
|
+
*
|
|
1726
|
+
* !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.KafkaTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
1703
1727
|
*/
|
|
1704
1728
|
secret: string;
|
|
1705
1729
|
}
|
|
@@ -2495,7 +2519,11 @@ export interface GetTableflowTopicCredentials {
|
|
|
2495
2519
|
*/
|
|
2496
2520
|
key: string;
|
|
2497
2521
|
/**
|
|
2498
|
-
* The
|
|
2522
|
+
* The Tableflow API Secret.
|
|
2523
|
+
*
|
|
2524
|
+
* > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Tableflow Topics in Confluent Cloud.
|
|
2525
|
+
*
|
|
2526
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TableflowTopic` data source, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
2499
2527
|
*/
|
|
2500
2528
|
secret: string;
|
|
2501
2529
|
}
|
|
@@ -3170,7 +3198,13 @@ export interface SchemaCredentials {
|
|
|
3170
3198
|
*/
|
|
3171
3199
|
key: string;
|
|
3172
3200
|
/**
|
|
3173
|
-
* The
|
|
3201
|
+
* The Schema Registry API Secret.
|
|
3202
|
+
*
|
|
3203
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Kafka clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Kafka cluster.
|
|
3204
|
+
*
|
|
3205
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Kafka API key, update the `credentials` block in all configuration files to use the new Kafka API key, run `pulumi up -target="confluent_schema.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
3206
|
+
*
|
|
3207
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.Schema` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
3174
3208
|
*/
|
|
3175
3209
|
secret: string;
|
|
3176
3210
|
}
|
|
@@ -3234,7 +3268,15 @@ export interface SchemaRegistryClusterConfigCredentials {
|
|
|
3234
3268
|
*/
|
|
3235
3269
|
key: string;
|
|
3236
3270
|
/**
|
|
3237
|
-
* The
|
|
3271
|
+
* The Schema Registry API Secret.
|
|
3272
|
+
*
|
|
3273
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
3274
|
+
*
|
|
3275
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_cluster_config.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_cluster_config.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
3276
|
+
*
|
|
3277
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SchemaRegistryClusterConfig` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
3278
|
+
*
|
|
3279
|
+
* > **Note:** To configure a config at the context level, affecting all subjects created within that context, use `confluentcloud.SubjectConfig` resource and pass in the context name as the `subjectName`. See the confluentcloud.SubjectConfig` resource documentation for more details.
|
|
3238
3280
|
*/
|
|
3239
3281
|
secret: string;
|
|
3240
3282
|
}
|
|
@@ -3250,7 +3292,13 @@ export interface SchemaRegistryClusterModeCredentials {
|
|
|
3250
3292
|
*/
|
|
3251
3293
|
key: string;
|
|
3252
3294
|
/**
|
|
3253
|
-
* The
|
|
3295
|
+
* The Schema Registry API Secret.
|
|
3296
|
+
*
|
|
3297
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
3298
|
+
*
|
|
3299
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_cluster_mode.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_cluster_mode.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
3300
|
+
*
|
|
3301
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentKafkaClusterMode` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
3254
3302
|
*/
|
|
3255
3303
|
secret: string;
|
|
3256
3304
|
}
|
|
@@ -3358,7 +3406,13 @@ export interface SubjectConfigCredentials {
|
|
|
3358
3406
|
*/
|
|
3359
3407
|
key: string;
|
|
3360
3408
|
/**
|
|
3361
|
-
* The
|
|
3409
|
+
* The Schema Registry API Secret.
|
|
3410
|
+
*
|
|
3411
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
3412
|
+
*
|
|
3413
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_subject_config.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_subject_config.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
3414
|
+
*
|
|
3415
|
+
* !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SubjectConfig` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
3362
3416
|
*/
|
|
3363
3417
|
secret: string;
|
|
3364
3418
|
}
|
|
@@ -3374,7 +3428,13 @@ export interface SubjectModeCredentials {
|
|
|
3374
3428
|
*/
|
|
3375
3429
|
key: string;
|
|
3376
3430
|
/**
|
|
3377
|
-
* The
|
|
3431
|
+
* The Schema Registry API Secret.
|
|
3432
|
+
*
|
|
3433
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
3434
|
+
*
|
|
3435
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_subject_mode.orders"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_subject_mode.orders" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
3436
|
+
*
|
|
3437
|
+
* !> **Warning:** Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SubjectMode` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
3378
3438
|
*/
|
|
3379
3439
|
secret: string;
|
|
3380
3440
|
}
|
|
@@ -3422,7 +3482,13 @@ export interface TableflowTopicCredentials {
|
|
|
3422
3482
|
*/
|
|
3423
3483
|
key: string;
|
|
3424
3484
|
/**
|
|
3425
|
-
* The
|
|
3485
|
+
* The Tableflow API Secret.
|
|
3486
|
+
*
|
|
3487
|
+
* > **Note:** A Tableflow API key consists of a key and a secret. Tableflow API keys are required to interact with Tableflow Topics in Confluent Cloud.
|
|
3488
|
+
*
|
|
3489
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Tableflow API key, create a new Tableflow API key, update the `credentials` block in all configuration files to use the new Tableflow API key, run `pulumi up -target="confluent_tableflow_topic.example"`, and remove the old Tableflow API key. Alternatively, in case the old Tableflow API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tableflow_topic.example" -out=rotate-tableflow-api-key` and `pulumi up rotate-tableflow-api-key` instead.
|
|
3490
|
+
*
|
|
3491
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.TableflowTopic` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
3426
3492
|
*/
|
|
3427
3493
|
secret: string;
|
|
3428
3494
|
}
|