@pulumi/confluentcloud 2.58.0 → 2.59.0-alpha.1770934913
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/accessPoint.d.ts +3 -3
- package/accessPoint.js +3 -3
- package/apiKey.d.ts +12 -4
- package/apiKey.js +12 -4
- package/apiKey.js.map +1 -1
- package/businessMetadata.d.ts +1 -4
- package/businessMetadata.js +1 -4
- package/businessMetadata.js.map +1 -1
- package/businessMetadataBinding.d.ts +22 -7
- package/businessMetadataBinding.js +1 -4
- package/businessMetadataBinding.js.map +1 -1
- package/byokKey.d.ts +3 -3
- package/byokKey.js +3 -3
- package/catalogEntityAttributes.d.ts +36 -7
- package/catalogEntityAttributes.js +9 -4
- package/catalogEntityAttributes.js.map +1 -1
- package/catalogIntegration.d.ts +5 -3
- package/catalogIntegration.js +5 -3
- package/catalogIntegration.js.map +1 -1
- package/certificateAuthority.d.ts +3 -3
- package/certificateAuthority.js +3 -3
- package/certificatePool.d.ts +3 -3
- package/certificatePool.js +3 -3
- package/clusterLink.d.ts +10 -21
- package/clusterLink.js +10 -21
- package/clusterLink.js.map +1 -1
- package/connectArtifact.d.ts +11 -3
- package/connectArtifact.js +11 -3
- package/connectArtifact.js.map +1 -1
- package/connector.d.ts +11 -3
- package/connector.js +11 -3
- package/connector.js.map +1 -1
- package/customConnectorPlugin.d.ts +13 -3
- package/customConnectorPlugin.js +13 -3
- package/customConnectorPlugin.js.map +1 -1
- package/customConnectorPluginVersion.d.ts +13 -3
- package/customConnectorPluginVersion.js +13 -3
- package/customConnectorPluginVersion.js.map +1 -1
- package/dnsForwarder.d.ts +3 -3
- package/dnsForwarder.js +3 -3
- package/dnsRecord.d.ts +3 -3
- package/dnsRecord.js +3 -3
- package/environment.d.ts +9 -3
- package/environment.js +9 -3
- package/environment.js.map +1 -1
- package/flinkArtifact.d.ts +11 -3
- package/flinkArtifact.js +11 -3
- package/flinkArtifact.js.map +1 -1
- package/flinkComputePool.d.ts +9 -3
- package/flinkComputePool.js +9 -3
- package/flinkComputePool.js.map +1 -1
- package/flinkConnection.d.ts +97 -11
- package/flinkConnection.js +97 -11
- package/flinkConnection.js.map +1 -1
- package/flinkStatement.d.ts +32 -11
- package/flinkStatement.js +5 -8
- package/flinkStatement.js.map +1 -1
- package/gateway.d.ts +3 -3
- package/gateway.js +3 -3
- package/getNetwork.d.ts +32 -0
- package/getNetwork.js +32 -0
- package/getNetwork.js.map +1 -1
- package/getProviderIntegrationAuthorization.d.ts +260 -0
- package/getProviderIntegrationAuthorization.js +260 -0
- package/getProviderIntegrationAuthorization.js.map +1 -1
- package/groupMapping.d.ts +3 -3
- package/groupMapping.js +3 -3
- package/identityPool.d.ts +3 -3
- package/identityPool.js +3 -3
- package/identityProvider.d.ts +3 -3
- package/identityProvider.js +3 -3
- package/invitation.d.ts +12 -3
- package/invitation.js +3 -3
- package/invitation.js.map +1 -1
- package/ipFilter.d.ts +3 -3
- package/ipFilter.js +3 -3
- package/ipGroup.d.ts +3 -3
- package/ipGroup.js +3 -3
- package/kafkaAcl.d.ts +30 -11
- package/kafkaAcl.js +3 -8
- package/kafkaAcl.js.map +1 -1
- package/kafkaClientQuota.d.ts +11 -3
- package/kafkaClientQuota.js +11 -3
- package/kafkaClientQuota.js.map +1 -1
- package/kafkaCluster.d.ts +9 -3
- package/kafkaCluster.js +9 -3
- package/kafkaCluster.js.map +1 -1
- package/kafkaClusterConfig.d.ts +1 -4
- package/kafkaClusterConfig.js +1 -4
- package/kafkaClusterConfig.js.map +1 -1
- package/kafkaMirrorTopic.d.ts +54 -4
- package/kafkaMirrorTopic.js +9 -4
- package/kafkaMirrorTopic.js.map +1 -1
- package/kafkaTopic.d.ts +11 -33
- package/kafkaTopic.js +11 -33
- package/kafkaTopic.js.map +1 -1
- package/ksqlCluster.d.ts +3 -3
- package/ksqlCluster.js +3 -3
- package/network.d.ts +9 -3
- package/network.js +9 -3
- package/network.js.map +1 -1
- package/networkLinkEndpoint.d.ts +9 -3
- package/networkLinkEndpoint.js +9 -3
- package/networkLinkEndpoint.js.map +1 -1
- package/networkLinkService.d.ts +9 -3
- package/networkLinkService.js +9 -3
- package/networkLinkService.js.map +1 -1
- package/package.json +2 -2
- package/peering.d.ts +9 -3
- package/peering.js +9 -3
- package/peering.js.map +1 -1
- package/plugin.d.ts +9 -3
- package/plugin.js +9 -3
- package/plugin.js.map +1 -1
- package/privateLinkAccess.d.ts +9 -3
- package/privateLinkAccess.js +9 -3
- package/privateLinkAccess.js.map +1 -1
- package/privateLinkAttachment.d.ts +3 -3
- package/privateLinkAttachment.js +3 -3
- package/privateLinkAttachmentConnection.d.ts +3 -3
- package/privateLinkAttachmentConnection.js +3 -3
- package/providerIntegration.d.ts +9 -3
- package/providerIntegration.js +9 -3
- package/providerIntegration.js.map +1 -1
- package/providerIntegrationAuthorization.d.ts +161 -3
- package/providerIntegrationAuthorization.js +161 -3
- package/providerIntegrationAuthorization.js.map +1 -1
- package/providerIntegrationSetup.d.ts +11 -3
- package/providerIntegrationSetup.js +11 -3
- package/providerIntegrationSetup.js.map +1 -1
- package/roleBinding.d.ts +36 -3
- package/roleBinding.js +3 -3
- package/roleBinding.js.map +1 -1
- package/schema.d.ts +22 -11
- package/schema.js +13 -11
- package/schema.js.map +1 -1
- package/schemaExporter.d.ts +3 -5
- package/schemaExporter.js +3 -5
- package/schemaExporter.js.map +1 -1
- package/schemaRegistryClusterConfig.d.ts +7 -4
- package/schemaRegistryClusterConfig.js +7 -4
- package/schemaRegistryClusterConfig.js.map +1 -1
- package/schemaRegistryClusterMode.d.ts +7 -4
- package/schemaRegistryClusterMode.js +7 -4
- package/schemaRegistryClusterMode.js.map +1 -1
- package/schemaRegistryDek.d.ts +22 -7
- package/schemaRegistryDek.js +1 -4
- package/schemaRegistryDek.js.map +1 -1
- package/schemaRegistryKek.d.ts +22 -7
- package/schemaRegistryKek.js +1 -4
- package/schemaRegistryKek.js.map +1 -1
- package/serviceAccount.d.ts +3 -3
- package/serviceAccount.js +3 -3
- package/subjectConfig.d.ts +7 -4
- package/subjectConfig.js +7 -4
- package/subjectConfig.js.map +1 -1
- package/subjectMode.d.ts +7 -4
- package/subjectMode.js +7 -4
- package/subjectMode.js.map +1 -1
- package/tableflowTopic.d.ts +7 -3
- package/tableflowTopic.js +7 -3
- package/tableflowTopic.js.map +1 -1
- package/tag.d.ts +22 -7
- package/tag.js +1 -4
- package/tag.js.map +1 -1
- package/tagBinding.d.ts +28 -4
- package/tagBinding.js +1 -4
- package/tagBinding.js.map +1 -1
- package/tfImporter.d.ts +6 -0
- package/tfImporter.js +6 -0
- package/tfImporter.js.map +1 -1
- package/transitGatewayAttachment.d.ts +9 -3
- package/transitGatewayAttachment.js +9 -3
- package/transitGatewayAttachment.js.map +1 -1
- package/types/input.d.ts +98 -16
- package/types/output.d.ts +78 -12
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"schemaRegistryClusterConfig.js","sourceRoot":"","sources":["../schemaRegistryClusterConfig.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"schemaRegistryClusterConfig.js","sourceRoot":"","sources":["../schemaRegistryClusterConfig.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqDG;AACH,MAAa,2BAA4B,SAAQ,MAAM,CAAC,cAAc;IAClE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwC,EAAE,IAAmC;QACtI,OAAO,IAAI,2BAA2B,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAClF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,2BAA2B,CAAC,YAAY,CAAC;IAC5E,CAAC;IAgCD,YAAY,IAAY,EAAE,WAAgF,EAAE,IAAmC;QAC3I,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2D,CAAC;YAC1E,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;SAC1E;aAAM;YACH,MAAM,IAAI,GAAG,WAA0D,CAAC;YACxE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;SACzE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,2BAA2B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChF,CAAC;;AAlFL,kEAmFC;AArEG,gBAAgB;AACO,wCAAY,GAAG,8EAA8E,CAAC"}
|
|
@@ -2,6 +2,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
6
|
+
*
|
|
7
|
+
* `confluentcloud.SchemaRegistryClusterMode` provides a Mode resource that enables updating Mode on a Schema Registry cluster on Confluent Cloud.
|
|
8
|
+
*
|
|
9
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental mode deletion. This setting rejects plans that would destroy or recreate the mode, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
10
|
+
*
|
|
5
11
|
* ## Example Usage
|
|
6
12
|
*
|
|
7
13
|
* ### Option #1: Manage multiple Schema Registry clusters in the same Pulumi Stack
|
|
@@ -36,13 +42,10 @@ import * as outputs from "./types/output";
|
|
|
36
42
|
*
|
|
37
43
|
* You can import a Mode by using the Schema Registry cluster ID, Subject name in the format `<Schema Registry cluster ID>`, for example:
|
|
38
44
|
*
|
|
45
|
+
* ```sh
|
|
39
46
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
40
|
-
*
|
|
41
47
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
42
|
-
*
|
|
43
48
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
44
|
-
*
|
|
45
|
-
* ```sh
|
|
46
49
|
* $ pulumi import confluentcloud:index/schemaRegistryClusterMode:SchemaRegistryClusterMode example lsrc-abc123
|
|
47
50
|
* ```
|
|
48
51
|
*
|
|
@@ -6,6 +6,12 @@ exports.SchemaRegistryClusterMode = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
10
|
+
*
|
|
11
|
+
* `confluentcloud.SchemaRegistryClusterMode` provides a Mode resource that enables updating Mode on a Schema Registry cluster on Confluent Cloud.
|
|
12
|
+
*
|
|
13
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental mode deletion. This setting rejects plans that would destroy or recreate the mode, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
14
|
+
*
|
|
9
15
|
* ## Example Usage
|
|
10
16
|
*
|
|
11
17
|
* ### Option #1: Manage multiple Schema Registry clusters in the same Pulumi Stack
|
|
@@ -40,13 +46,10 @@ const utilities = require("./utilities");
|
|
|
40
46
|
*
|
|
41
47
|
* You can import a Mode by using the Schema Registry cluster ID, Subject name in the format `<Schema Registry cluster ID>`, for example:
|
|
42
48
|
*
|
|
49
|
+
* ```sh
|
|
43
50
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
44
|
-
*
|
|
45
51
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
46
|
-
*
|
|
47
52
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
48
|
-
*
|
|
49
|
-
* ```sh
|
|
50
53
|
* $ pulumi import confluentcloud:index/schemaRegistryClusterMode:SchemaRegistryClusterMode example lsrc-abc123
|
|
51
54
|
* ```
|
|
52
55
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"schemaRegistryClusterMode.js","sourceRoot":"","sources":["../schemaRegistryClusterMode.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"schemaRegistryClusterMode.js","sourceRoot":"","sources":["../schemaRegistryClusterMode.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAiDG;AACH,MAAa,yBAA0B,SAAQ,MAAM,CAAC,cAAc;IAChE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAsC,EAAE,IAAmC;QACpI,OAAO,IAAI,yBAAyB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAChF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,yBAAyB,CAAC,YAAY,CAAC;IAC1E,CAAC;IA4BD,YAAY,IAAY,EAAE,WAA4E,EAAE,IAAmC;QACvI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAyD,CAAC;YACxE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;SAC1E;aAAM;YACH,MAAM,IAAI,GAAG,WAAwD,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;SACzE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,yBAAyB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC9E,CAAC;;AA5EL,8DA6EC;AA/DG,gBAAgB;AACO,sCAAY,GAAG,0EAA0E,CAAC"}
|
package/schemaRegistryDek.d.ts
CHANGED
|
@@ -51,13 +51,10 @@ import * as outputs from "./types/output";
|
|
|
51
51
|
*
|
|
52
52
|
* You can import a Schema Registry Key by using the Schema Registry cluster ID, KEK name, Subject, Version and Algorithm in the format `<Schema Registry Cluster Id>/<Schema Registry KEK Name>/<Subject>/<Version>/<Algorithm>`, for example:
|
|
53
53
|
*
|
|
54
|
+
* ```sh
|
|
54
55
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
55
|
-
*
|
|
56
56
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
57
|
-
*
|
|
58
57
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
59
|
-
*
|
|
60
|
-
* ```sh
|
|
61
58
|
* $ pulumi import confluentcloud:index/schemaRegistryDek:SchemaRegistryDek my_dek lsrc-8wrx70/testkek/ts/1/AES256_GCM
|
|
62
59
|
* ```
|
|
63
60
|
*
|
|
@@ -92,7 +89,13 @@ export declare class SchemaRegistryDek extends pulumi.CustomResource {
|
|
|
92
89
|
*/
|
|
93
90
|
readonly encryptedKeyMaterial: pulumi.Output<string>;
|
|
94
91
|
/**
|
|
95
|
-
*
|
|
92
|
+
* An optional flag to control whether a DEK should be soft-deleted or hard-deleted. Defaults to `false`.
|
|
93
|
+
*
|
|
94
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
95
|
+
*
|
|
96
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_dek.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_dek.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
97
|
+
*
|
|
98
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SchemaRegistryDek` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
96
99
|
*/
|
|
97
100
|
readonly hardDelete: pulumi.Output<boolean | undefined>;
|
|
98
101
|
/**
|
|
@@ -142,7 +145,13 @@ export interface SchemaRegistryDekState {
|
|
|
142
145
|
*/
|
|
143
146
|
encryptedKeyMaterial?: pulumi.Input<string>;
|
|
144
147
|
/**
|
|
145
|
-
*
|
|
148
|
+
* An optional flag to control whether a DEK should be soft-deleted or hard-deleted. Defaults to `false`.
|
|
149
|
+
*
|
|
150
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
151
|
+
*
|
|
152
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_dek.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_dek.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
153
|
+
*
|
|
154
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SchemaRegistryDek` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
146
155
|
*/
|
|
147
156
|
hardDelete?: pulumi.Input<boolean>;
|
|
148
157
|
/**
|
|
@@ -184,7 +193,13 @@ export interface SchemaRegistryDekArgs {
|
|
|
184
193
|
*/
|
|
185
194
|
encryptedKeyMaterial?: pulumi.Input<string>;
|
|
186
195
|
/**
|
|
187
|
-
*
|
|
196
|
+
* An optional flag to control whether a DEK should be soft-deleted or hard-deleted. Defaults to `false`.
|
|
197
|
+
*
|
|
198
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
199
|
+
*
|
|
200
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_dek.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_dek.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
201
|
+
*
|
|
202
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SchemaRegistryDek` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
188
203
|
*/
|
|
189
204
|
hardDelete?: pulumi.Input<boolean>;
|
|
190
205
|
/**
|
package/schemaRegistryDek.js
CHANGED
|
@@ -55,13 +55,10 @@ const utilities = require("./utilities");
|
|
|
55
55
|
*
|
|
56
56
|
* You can import a Schema Registry Key by using the Schema Registry cluster ID, KEK name, Subject, Version and Algorithm in the format `<Schema Registry Cluster Id>/<Schema Registry KEK Name>/<Subject>/<Version>/<Algorithm>`, for example:
|
|
57
57
|
*
|
|
58
|
+
* ```sh
|
|
58
59
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
59
|
-
*
|
|
60
60
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
61
|
-
*
|
|
62
61
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
63
|
-
*
|
|
64
|
-
* ```sh
|
|
65
62
|
* $ pulumi import confluentcloud:index/schemaRegistryDek:SchemaRegistryDek my_dek lsrc-8wrx70/testkek/ts/1/AES256_GCM
|
|
66
63
|
* ```
|
|
67
64
|
*
|
package/schemaRegistryDek.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"schemaRegistryDek.js","sourceRoot":"","sources":["../schemaRegistryDek.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"schemaRegistryDek.js","sourceRoot":"","sources":["../schemaRegistryDek.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0DG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;IAsDD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,EAAE,oBAAoB,CAAC;YACrE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,EAAE,oBAAoB,CAAC;YACpE,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;;AAtHL,8CAuHC;AAzGG,gBAAgB;AACO,8BAAY,GAAG,0DAA0D,CAAC"}
|
package/schemaRegistryKek.d.ts
CHANGED
|
@@ -57,13 +57,10 @@ import * as outputs from "./types/output";
|
|
|
57
57
|
*
|
|
58
58
|
* You can import a Schema Registry Key by using the Schema Registry cluster ID, Kek name in the format `<Schema Registry cluster ID>/<Kek name>`, for example:
|
|
59
59
|
*
|
|
60
|
+
* ```sh
|
|
60
61
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
61
|
-
*
|
|
62
62
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
63
|
-
*
|
|
64
63
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
65
|
-
*
|
|
66
|
-
* ```sh
|
|
67
64
|
* $ pulumi import confluentcloud:index/schemaRegistryKek:SchemaRegistryKek aws_key lsrc-8wrx70/aws_key
|
|
68
65
|
* ```
|
|
69
66
|
*
|
|
@@ -94,7 +91,13 @@ export declare class SchemaRegistryKek extends pulumi.CustomResource {
|
|
|
94
91
|
*/
|
|
95
92
|
readonly doc: pulumi.Output<string>;
|
|
96
93
|
/**
|
|
97
|
-
*
|
|
94
|
+
* The optional flag to control whether a kek should be soft or hard deleted. Defaults to `false`.
|
|
95
|
+
*
|
|
96
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
97
|
+
*
|
|
98
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_kek.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_kek.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
99
|
+
*
|
|
100
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SchemaRegistryKek` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
98
101
|
*/
|
|
99
102
|
readonly hardDelete: pulumi.Output<boolean | undefined>;
|
|
100
103
|
/**
|
|
@@ -149,7 +152,13 @@ export interface SchemaRegistryKekState {
|
|
|
149
152
|
*/
|
|
150
153
|
doc?: pulumi.Input<string>;
|
|
151
154
|
/**
|
|
152
|
-
*
|
|
155
|
+
* The optional flag to control whether a kek should be soft or hard deleted. Defaults to `false`.
|
|
156
|
+
*
|
|
157
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
158
|
+
*
|
|
159
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_kek.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_kek.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
160
|
+
*
|
|
161
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SchemaRegistryKek` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
153
162
|
*/
|
|
154
163
|
hardDelete?: pulumi.Input<boolean>;
|
|
155
164
|
/**
|
|
@@ -196,7 +205,13 @@ export interface SchemaRegistryKekArgs {
|
|
|
196
205
|
*/
|
|
197
206
|
doc?: pulumi.Input<string>;
|
|
198
207
|
/**
|
|
199
|
-
*
|
|
208
|
+
* The optional flag to control whether a kek should be soft or hard deleted. Defaults to `false`.
|
|
209
|
+
*
|
|
210
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
211
|
+
*
|
|
212
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_schema_registry_kek.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_schema_registry_kek.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
213
|
+
*
|
|
214
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.SchemaRegistryKek` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
200
215
|
*/
|
|
201
216
|
hardDelete?: pulumi.Input<boolean>;
|
|
202
217
|
/**
|
package/schemaRegistryKek.js
CHANGED
|
@@ -61,13 +61,10 @@ const utilities = require("./utilities");
|
|
|
61
61
|
*
|
|
62
62
|
* You can import a Schema Registry Key by using the Schema Registry cluster ID, Kek name in the format `<Schema Registry cluster ID>/<Kek name>`, for example:
|
|
63
63
|
*
|
|
64
|
+
* ```sh
|
|
64
65
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
65
|
-
*
|
|
66
66
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
67
|
-
*
|
|
68
67
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
69
|
-
*
|
|
70
|
-
* ```sh
|
|
71
68
|
* $ pulumi import confluentcloud:index/schemaRegistryKek:SchemaRegistryKek aws_key lsrc-8wrx70/aws_key
|
|
72
69
|
* ```
|
|
73
70
|
*
|
package/schemaRegistryKek.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"schemaRegistryKek.js","sourceRoot":"","sources":["../schemaRegistryKek.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"schemaRegistryKek.js","sourceRoot":"","sources":["../schemaRegistryKek.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAgEG;AACH,MAAa,iBAAkB,SAAQ,MAAM,CAAC,cAAc;IACxD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA8B,EAAE,IAAmC;QAC5H,OAAO,IAAI,iBAAiB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACxE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,iBAAiB,CAAC,YAAY,CAAC;IAClE,CAAC;IAyDD,YAAY,IAAY,EAAE,WAA4D,EAAE,IAAmC;QACvH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAiD,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,EAAE,GAAG,CAAC;YACnC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,EAAE,MAAM,CAAC;SAC5C;aAAM;YACH,MAAM,IAAI,GAAG,WAAgD,CAAC;YAC9D,IAAI,IAAI,EAAE,QAAQ,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3C,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,EAAE,GAAG,CAAC;YAClC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;YAC5C,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC;YAChD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,EAAE,MAAM,CAAC;SAC3C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,iBAAiB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACtE,CAAC;;AAzHL,8CA0HC;AA5GG,gBAAgB;AACO,8BAAY,GAAG,0DAA0D,CAAC"}
|
package/serviceAccount.d.ts
CHANGED
|
@@ -43,13 +43,13 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
43
43
|
*
|
|
44
44
|
* ## Import
|
|
45
45
|
*
|
|
46
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Service Account.
|
|
47
|
+
*
|
|
46
48
|
* You can import a Service Account by using Service Account ID, for example:
|
|
47
49
|
*
|
|
50
|
+
* ```sh
|
|
48
51
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
49
|
-
*
|
|
50
52
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
51
|
-
*
|
|
52
|
-
* ```sh
|
|
53
53
|
* $ pulumi import confluentcloud:index/serviceAccount:ServiceAccount my_sa sa-abc123
|
|
54
54
|
* ```
|
|
55
55
|
*
|
package/serviceAccount.js
CHANGED
|
@@ -49,13 +49,13 @@ const utilities = require("./utilities");
|
|
|
49
49
|
*
|
|
50
50
|
* ## Import
|
|
51
51
|
*
|
|
52
|
+
* > **Note:** `CONFLUENT_CLOUD_API_KEY` and `CONFLUENT_CLOUD_API_SECRET` environment variables must be set before importing a Service Account.
|
|
53
|
+
*
|
|
52
54
|
* You can import a Service Account by using Service Account ID, for example:
|
|
53
55
|
*
|
|
56
|
+
* ```sh
|
|
54
57
|
* $ export CONFLUENT_CLOUD_API_KEY="<cloud_api_key>"
|
|
55
|
-
*
|
|
56
58
|
* $ export CONFLUENT_CLOUD_API_SECRET="<cloud_api_secret>"
|
|
57
|
-
*
|
|
58
|
-
* ```sh
|
|
59
59
|
* $ pulumi import confluentcloud:index/serviceAccount:ServiceAccount my_sa sa-abc123
|
|
60
60
|
* ```
|
|
61
61
|
*
|
package/subjectConfig.d.ts
CHANGED
|
@@ -2,6 +2,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
6
|
+
*
|
|
7
|
+
* `confluentcloud.SubjectConfig` provides a Subject Config resource that enables updating Subject Config on a Schema Registry cluster on Confluent Cloud.
|
|
8
|
+
*
|
|
9
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental subject config deletion. This setting rejects plans that would destroy or recreate the subject config, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
10
|
+
*
|
|
5
11
|
* ## Example Usage
|
|
6
12
|
*
|
|
7
13
|
* ### Option #1: Manage multiple Schema Registry clusters in the same Pulumi Stack
|
|
@@ -69,13 +75,10 @@ import * as outputs from "./types/output";
|
|
|
69
75
|
*
|
|
70
76
|
* You can import a Subject Config by using the Schema Registry cluster ID, Subject name in the format `<Schema Registry cluster ID>/<Subject name>`, for example:
|
|
71
77
|
*
|
|
78
|
+
* ```sh
|
|
72
79
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
73
|
-
*
|
|
74
80
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
75
|
-
*
|
|
76
81
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
77
|
-
*
|
|
78
|
-
* ```sh
|
|
79
82
|
* $ pulumi import confluentcloud:index/subjectConfig:SubjectConfig example lsrc-abc123/test-subject
|
|
80
83
|
* ```
|
|
81
84
|
*
|
package/subjectConfig.js
CHANGED
|
@@ -6,6 +6,12 @@ exports.SubjectConfig = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
10
|
+
*
|
|
11
|
+
* `confluentcloud.SubjectConfig` provides a Subject Config resource that enables updating Subject Config on a Schema Registry cluster on Confluent Cloud.
|
|
12
|
+
*
|
|
13
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental subject config deletion. This setting rejects plans that would destroy or recreate the subject config, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
14
|
+
*
|
|
9
15
|
* ## Example Usage
|
|
10
16
|
*
|
|
11
17
|
* ### Option #1: Manage multiple Schema Registry clusters in the same Pulumi Stack
|
|
@@ -73,13 +79,10 @@ const utilities = require("./utilities");
|
|
|
73
79
|
*
|
|
74
80
|
* You can import a Subject Config by using the Schema Registry cluster ID, Subject name in the format `<Schema Registry cluster ID>/<Subject name>`, for example:
|
|
75
81
|
*
|
|
82
|
+
* ```sh
|
|
76
83
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
77
|
-
*
|
|
78
84
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
79
|
-
*
|
|
80
85
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
81
|
-
*
|
|
82
|
-
* ```sh
|
|
83
86
|
* $ pulumi import confluentcloud:index/subjectConfig:SubjectConfig example lsrc-abc123/test-subject
|
|
84
87
|
* ```
|
|
85
88
|
*
|
package/subjectConfig.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"subjectConfig.js","sourceRoot":"","sources":["../subjectConfig.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"subjectConfig.js","sourceRoot":"","sources":["../subjectConfig.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkFG;AACH,MAAa,aAAc,SAAQ,MAAM,CAAC,cAAc;IACpD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA0B,EAAE,IAAmC;QACxH,OAAO,IAAI,aAAa,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACpE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,aAAa,CAAC,YAAY,CAAC;IAC9D,CAAC;IA8CD,YAAY,IAAY,EAAE,WAAoD,EAAE,IAAmC;QAC/G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA6C,CAAC;YAC5D,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;SACtD;aAAM;YACH,MAAM,IAAI,GAAG,WAA4C,CAAC;YAC1D,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,EAAE,kBAAkB,CAAC;YAChE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,EAAE,SAAS,CAAC;YAC9C,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,aAAa,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAClE,CAAC;;AAvGL,sCAwGC;AA1FG,gBAAgB;AACO,0BAAY,GAAG,kDAAkD,CAAC"}
|
package/subjectMode.d.ts
CHANGED
|
@@ -2,6 +2,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
6
|
+
*
|
|
7
|
+
* `confluentcloud.SubjectMode` provides a Subject Mode resource that enables updating Subject Mode on a Schema Registry cluster on Confluent Cloud.
|
|
8
|
+
*
|
|
9
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental subject mode deletion. This setting rejects plans that would destroy or recreate the subject mode, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
10
|
+
*
|
|
5
11
|
* ## Example Usage
|
|
6
12
|
*
|
|
7
13
|
* ### Option #1: Manage multiple Schema Registry clusters in the same Pulumi Stack
|
|
@@ -40,13 +46,10 @@ import * as outputs from "./types/output";
|
|
|
40
46
|
*
|
|
41
47
|
* You can import a Subject Mode by using the Schema Registry cluster ID, Subject name in the format `<Schema Registry cluster ID>/<Subject name>`, for example:
|
|
42
48
|
*
|
|
49
|
+
* ```sh
|
|
43
50
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
44
|
-
*
|
|
45
51
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
46
|
-
*
|
|
47
52
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
48
|
-
*
|
|
49
|
-
* ```sh
|
|
50
53
|
* $ pulumi import confluentcloud:index/subjectMode:SubjectMode example lsrc-abc123/test-subject
|
|
51
54
|
* ```
|
|
52
55
|
*
|
package/subjectMode.js
CHANGED
|
@@ -6,6 +6,12 @@ exports.SubjectMode = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
10
|
+
*
|
|
11
|
+
* `confluentcloud.SubjectMode` provides a Subject Mode resource that enables updating Subject Mode on a Schema Registry cluster on Confluent Cloud.
|
|
12
|
+
*
|
|
13
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental subject mode deletion. This setting rejects plans that would destroy or recreate the subject mode, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
14
|
+
*
|
|
9
15
|
* ## Example Usage
|
|
10
16
|
*
|
|
11
17
|
* ### Option #1: Manage multiple Schema Registry clusters in the same Pulumi Stack
|
|
@@ -44,13 +50,10 @@ const utilities = require("./utilities");
|
|
|
44
50
|
*
|
|
45
51
|
* You can import a Subject Mode by using the Schema Registry cluster ID, Subject name in the format `<Schema Registry cluster ID>/<Subject name>`, for example:
|
|
46
52
|
*
|
|
53
|
+
* ```sh
|
|
47
54
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
48
|
-
*
|
|
49
55
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
50
|
-
*
|
|
51
56
|
* $ export IMPORT_SCHEMA_REGISTRY_REST_ENDPOINT="<schema_registry_rest_endpoint>"
|
|
52
|
-
*
|
|
53
|
-
* ```sh
|
|
54
57
|
* $ pulumi import confluentcloud:index/subjectMode:SubjectMode example lsrc-abc123/test-subject
|
|
55
58
|
* ```
|
|
56
59
|
*
|
package/subjectMode.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"subjectMode.js","sourceRoot":"","sources":["../subjectMode.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"subjectMode.js","sourceRoot":"","sources":["../subjectMode.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqDG;AACH,MAAa,WAAY,SAAQ,MAAM,CAAC,cAAc;IAClD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAwB,EAAE,IAAmC;QACtH,OAAO,IAAI,WAAW,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAClE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,WAAW,CAAC,YAAY,CAAC;IAC5D,CAAC;IAgCD,YAAY,IAAY,EAAE,WAAgD,EAAE,IAAmC;QAC3G,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA2C,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,EAAE,KAAK,CAAC;YACvC,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;SACtD;aAAM;YACH,MAAM,IAAI,GAAG,WAA0C,CAAC;YACxD,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,EAAE,KAAK,CAAC;YACtC,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;SACrD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,WAAW,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAChE,CAAC;;AArFL,kCAsFC;AAxEG,gBAAgB;AACO,wBAAY,GAAG,8CAA8C,CAAC"}
|
package/tableflowTopic.d.ts
CHANGED
|
@@ -2,6 +2,12 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
6
|
+
*
|
|
7
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental tableflow topic deletion. This setting rejects plans that would destroy or recreate the tableflow topic, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
8
|
+
*
|
|
9
|
+
* > **Note:** Make sure to use `confluentcloud.CatalogIntegration` resource if you want to integrate Tableflow with AWS Glue Catalog or Snowflake Open Catalog.
|
|
10
|
+
*
|
|
5
11
|
* ## Example Usage
|
|
6
12
|
*
|
|
7
13
|
* ### Option #1: Manage multiple Tableflow Topics in the same Pulumi Stack
|
|
@@ -56,11 +62,9 @@ import * as outputs from "./types/output";
|
|
|
56
62
|
*
|
|
57
63
|
* Option #1: Manage multiple Tableflow Topics in the same Pulumi Stack
|
|
58
64
|
*
|
|
65
|
+
* ```sh
|
|
59
66
|
* $ export IMPORT_TABLEFLOW_API_KEY="<tableflow_api_key>"
|
|
60
|
-
*
|
|
61
67
|
* $ export IMPORT_TABLEFLOW_API_SECRET="<tableflow_api_secret>"
|
|
62
|
-
*
|
|
63
|
-
* ```sh
|
|
64
68
|
* $ pulumi import confluentcloud:index/tableflowTopic:TableflowTopic example env-abc123/lkc-abc123/orders
|
|
65
69
|
* ```
|
|
66
70
|
*
|
package/tableflowTopic.js
CHANGED
|
@@ -6,6 +6,12 @@ exports.TableflowTopic = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* [](https://docs.confluent.io/cloud/current/api.html#section/Versioning/API-Lifecycle-Policy)
|
|
10
|
+
*
|
|
11
|
+
* > **Note:** It is recommended to set `lifecycle { preventDestroy = true }` on production instances to prevent accidental tableflow topic deletion. This setting rejects plans that would destroy or recreate the tableflow topic, such as attempting to change uneditable attributes. Read more about it in the Terraform docs.
|
|
12
|
+
*
|
|
13
|
+
* > **Note:** Make sure to use `confluentcloud.CatalogIntegration` resource if you want to integrate Tableflow with AWS Glue Catalog or Snowflake Open Catalog.
|
|
14
|
+
*
|
|
9
15
|
* ## Example Usage
|
|
10
16
|
*
|
|
11
17
|
* ### Option #1: Manage multiple Tableflow Topics in the same Pulumi Stack
|
|
@@ -60,11 +66,9 @@ const utilities = require("./utilities");
|
|
|
60
66
|
*
|
|
61
67
|
* Option #1: Manage multiple Tableflow Topics in the same Pulumi Stack
|
|
62
68
|
*
|
|
69
|
+
* ```sh
|
|
63
70
|
* $ export IMPORT_TABLEFLOW_API_KEY="<tableflow_api_key>"
|
|
64
|
-
*
|
|
65
71
|
* $ export IMPORT_TABLEFLOW_API_SECRET="<tableflow_api_secret>"
|
|
66
|
-
*
|
|
67
|
-
* ```sh
|
|
68
72
|
* $ pulumi import confluentcloud:index/tableflowTopic:TableflowTopic example env-abc123/lkc-abc123/orders
|
|
69
73
|
* ```
|
|
70
74
|
*
|
package/tableflowTopic.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"tableflowTopic.js","sourceRoot":"","sources":["../tableflowTopic.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"tableflowTopic.js","sourceRoot":"","sources":["../tableflowTopic.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0EG;AACH,MAAa,cAAe,SAAQ,MAAM,CAAC,cAAc;IACrD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA2B,EAAE,IAAmC;QACzH,OAAO,IAAI,cAAc,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IACrE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,cAAc,CAAC,YAAY,CAAC;IAC/D,CAAC;IAuED,YAAY,IAAY,EAAE,WAAsD,EAAE,IAAmC;QACjH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA8C,CAAC;YAC7D,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,EAAE,wBAAwB,CAAC;YAC7E,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,EAAE,gBAAgB,CAAC;YAC7D,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,EAAE,kBAAkB,CAAC;YACjE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,EAAE,aAAa,CAAC;YACvD,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;YAC/C,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,EAAE,SAAS,CAAC;SAClD;aAAM;YACH,MAAM,IAAI,GAAG,WAA6C,CAAC;YAC3D,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,WAAW,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC9C,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,IAAI,EAAE,YAAY,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/C,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,EAAE,wBAAwB,CAAC;YAC5E,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,EAAE,aAAa,CAAC;YACtD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,kBAAkB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACvD,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACzD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACnD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,cAAc,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACnE,CAAC;;AAtJL,wCAuJC;AAzIG,gBAAgB;AACO,2BAAY,GAAG,oDAAoD,CAAC"}
|
package/tag.d.ts
CHANGED
|
@@ -50,13 +50,10 @@ import * as outputs from "./types/output";
|
|
|
50
50
|
*
|
|
51
51
|
* You can import a Tag by using the Schema Registry cluster ID, Tag name in the format `<Schema Registry cluster ID>/<Tag name>`, for example:
|
|
52
52
|
*
|
|
53
|
+
* ```sh
|
|
53
54
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
54
|
-
*
|
|
55
55
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
56
|
-
*
|
|
57
56
|
* $ export IMPORT_CATALOG_REST_ENDPOINT="<catalog_rest_endpoint>"
|
|
58
|
-
*
|
|
59
|
-
* ```sh
|
|
60
57
|
* $ pulumi import confluentcloud:index/tag:Tag pii lsrc-8wrx70/PII
|
|
61
58
|
* ```
|
|
62
59
|
*
|
|
@@ -83,7 +80,13 @@ export declare class Tag extends pulumi.CustomResource {
|
|
|
83
80
|
*/
|
|
84
81
|
readonly credentials: pulumi.Output<outputs.TagCredentials | undefined>;
|
|
85
82
|
/**
|
|
86
|
-
* The description of the tag
|
|
83
|
+
* The description of the tag.
|
|
84
|
+
*
|
|
85
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
86
|
+
*
|
|
87
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_tag.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tag.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
88
|
+
*
|
|
89
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.Tag` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
87
90
|
*/
|
|
88
91
|
readonly description: pulumi.Output<string | undefined>;
|
|
89
92
|
/**
|
|
@@ -121,7 +124,13 @@ export interface TagState {
|
|
|
121
124
|
*/
|
|
122
125
|
credentials?: pulumi.Input<inputs.TagCredentials>;
|
|
123
126
|
/**
|
|
124
|
-
* The description of the tag
|
|
127
|
+
* The description of the tag.
|
|
128
|
+
*
|
|
129
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
130
|
+
*
|
|
131
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_tag.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tag.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
132
|
+
*
|
|
133
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.Tag` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
125
134
|
*/
|
|
126
135
|
description?: pulumi.Input<string>;
|
|
127
136
|
/**
|
|
@@ -151,7 +160,13 @@ export interface TagArgs {
|
|
|
151
160
|
*/
|
|
152
161
|
credentials?: pulumi.Input<inputs.TagCredentials>;
|
|
153
162
|
/**
|
|
154
|
-
* The description of the tag
|
|
163
|
+
* The description of the tag.
|
|
164
|
+
*
|
|
165
|
+
* > **Note:** A Schema Registry API key consists of a key and a secret. Schema Registry API keys are required to interact with Schema Registry clusters in Confluent Cloud. Each Schema Registry API key is valid for one specific Schema Registry cluster.
|
|
166
|
+
*
|
|
167
|
+
* > **Note:** Use Option #2 to simplify the key rotation process. When using Option #1, to rotate a Schema Registry API key, create a new Schema Registry API key, update the `credentials` block in all configuration files to use the new Schema Registry API key, run `pulumi up -target="confluent_tag.pii"`, and remove the old Schema Registry API key. Alternatively, in case the old Schema Registry API Key was deleted already, you might need to run `pulumi preview -refresh=false -target="confluent_tag.pii" -out=rotate-schema-registry-api-key` and `pulumi up rotate-schema-registry-api-key` instead.
|
|
168
|
+
*
|
|
169
|
+
* !> **Warning:** Use Option #2 to avoid exposing sensitive `credentials` value in a state file. When using Option #1, Terraform doesn't encrypt the sensitive `credentials` value of the `confluentcloud.Tag` resource, so you must keep your state file secure to avoid exposing it. Refer to the Terraform documentation to learn more about securing your state file.
|
|
155
170
|
*/
|
|
156
171
|
description?: pulumi.Input<string>;
|
|
157
172
|
/**
|
package/tag.js
CHANGED
|
@@ -54,13 +54,10 @@ const utilities = require("./utilities");
|
|
|
54
54
|
*
|
|
55
55
|
* You can import a Tag by using the Schema Registry cluster ID, Tag name in the format `<Schema Registry cluster ID>/<Tag name>`, for example:
|
|
56
56
|
*
|
|
57
|
+
* ```sh
|
|
57
58
|
* $ export IMPORT_SCHEMA_REGISTRY_API_KEY="<schema_registry_api_key>"
|
|
58
|
-
*
|
|
59
59
|
* $ export IMPORT_SCHEMA_REGISTRY_API_SECRET="<schema_registry_api_secret>"
|
|
60
|
-
*
|
|
61
60
|
* $ export IMPORT_CATALOG_REST_ENDPOINT="<catalog_rest_endpoint>"
|
|
62
|
-
*
|
|
63
|
-
* ```sh
|
|
64
61
|
* $ pulumi import confluentcloud:index/tag:Tag pii lsrc-8wrx70/PII
|
|
65
62
|
* ```
|
|
66
63
|
*
|
package/tag.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"tag.js","sourceRoot":"","sources":["../tag.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"tag.js","sourceRoot":"","sources":["../tag.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAyDG;AACH,MAAa,GAAI,SAAQ,MAAM,CAAC,cAAc;IAC1C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgB,EAAE,IAAmC;QAC9G,OAAO,IAAI,GAAG,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC1D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,GAAG,CAAC,YAAY,CAAC;IACpD,CAAC;IA0CD,YAAY,IAAY,EAAE,WAAgC,EAAE,IAAmC;QAC3F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmC,CAAC;YAClD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,EAAE,WAAW,CAAC;YACnD,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,EAAE,IAAI,CAAC;YACrC,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,EAAE,qBAAqB,CAAC;YACvE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;SAC9C;aAAM;YACH,MAAM,IAAI,GAAG,WAAkC,CAAC;YAChD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,EAAE,WAAW,CAAC;YAClD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,EAAE,IAAI,CAAC;YACpC,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,EAAE,qBAAqB,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,aAAa,CAAC,EAAE,CAAC;QAChE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,GAAG,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxD,CAAC;;AA9FL,kBA+FC;AAjFG,gBAAgB;AACO,gBAAY,GAAG,8BAA8B,CAAC"}
|