@pulumi/kafka 3.12.3 → 3.12.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/acl.d.ts +2 -0
- package/acl.js +2 -0
- package/acl.js.map +1 -1
- package/package.json +2 -2
- package/userScramCredential.d.ts +45 -0
- package/userScramCredential.js +45 -0
- package/userScramCredential.js.map +1 -1
package/acl.d.ts
CHANGED
|
@@ -120,6 +120,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
120
120
|
* ```sh
|
|
121
121
|
* $ pulumi import kafka:index/acl:Acl example 'User:producer|*|Write|Allow|Topic|orders|Literal'
|
|
122
122
|
* ```
|
|
123
|
+
*
|
|
124
|
+
* > **Note:** Use quotes around the import string to prevent shell expansion of the `*` character.
|
|
123
125
|
*/
|
|
124
126
|
export declare class Acl extends pulumi.CustomResource {
|
|
125
127
|
/**
|
package/acl.js
CHANGED
|
@@ -126,6 +126,8 @@ const utilities = require("./utilities");
|
|
|
126
126
|
* ```sh
|
|
127
127
|
* $ pulumi import kafka:index/acl:Acl example 'User:producer|*|Write|Allow|Topic|orders|Literal'
|
|
128
128
|
* ```
|
|
129
|
+
*
|
|
130
|
+
* > **Note:** Use quotes around the import string to prevent shell expansion of the `*` character.
|
|
129
131
|
*/
|
|
130
132
|
class Acl extends pulumi.CustomResource {
|
|
131
133
|
/**
|
package/acl.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"acl.js","sourceRoot":"","sources":["../acl.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"acl.js","sourceRoot":"","sources":["../acl.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2HG;AACH,MAAa,GAAI,SAAQ,MAAM,CAAC,cAAc;IAC1C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgB,EAAE,IAAmC;QAC9G,OAAO,IAAI,GAAG,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC1D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,GAAG,CAAC,YAAY,CAAC;IACpD,CAAC;IAqBD,YAAY,IAAY,EAAE,WAAgC,EAAE,IAAmC;QAC3F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmC,CAAC;YAClD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,EAAE,OAAO,CAAC;YAC3C,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,EAAE,YAAY,CAAC;YACrD,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,EAAE,yBAAyB,CAAC;SAClF;aAAM;YACH,MAAM,IAAI,GAAG,WAAkC,CAAC;YAChD,IAAI,IAAI,EAAE,OAAO,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1C,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,IAAI,EAAE,YAAY,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/C,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,IAAI,EAAE,iBAAiB,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,+CAA+C,CAAC,CAAC;aACpE;YACD,IAAI,IAAI,EAAE,YAAY,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC/C,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,IAAI,EAAE,eAAe,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,IAAI,IAAI,EAAE,eAAe,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,EAAE,OAAO,CAAC;YAC1C,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,EAAE,YAAY,CAAC;YACpD,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,EAAE,yBAAyB,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,GAAG,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxD,CAAC;;AAzFL,kBA0FC;AA5EG,gBAAgB;AACO,gBAAY,GAAG,qBAAqB,CAAC"}
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/kafka",
|
|
3
|
-
"version": "3.12.
|
|
3
|
+
"version": "3.12.4",
|
|
4
4
|
"description": "A Pulumi package for creating and managing Kafka.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -22,6 +22,6 @@
|
|
|
22
22
|
"pulumi": {
|
|
23
23
|
"resource": true,
|
|
24
24
|
"name": "kafka",
|
|
25
|
-
"version": "3.12.
|
|
25
|
+
"version": "3.12.4"
|
|
26
26
|
}
|
|
27
27
|
}
|
package/userScramCredential.d.ts
CHANGED
|
@@ -1,5 +1,48 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* The `kafka.UserScramCredential` resource manages SCRAM (Salted Challenge Response Authentication Mechanism) credentials for Kafka users. SCRAM provides a secure way to authenticate clients using username/password combinations without transmitting passwords in plain text.
|
|
4
|
+
*
|
|
5
|
+
* ## Example Usage
|
|
6
|
+
*
|
|
7
|
+
* ### Basic SCRAM-SHA-256 User
|
|
8
|
+
*
|
|
9
|
+
* ### SCRAM-SHA-512 User with Custom Iterations
|
|
10
|
+
*
|
|
11
|
+
* ### Multiple Users with Random Passwords
|
|
12
|
+
*
|
|
13
|
+
* ### Integration with ACLs
|
|
14
|
+
*
|
|
15
|
+
* ## SCRAM Mechanisms
|
|
16
|
+
*
|
|
17
|
+
* ### SCRAM-SHA-256
|
|
18
|
+
* - Provides good security with reasonable performance
|
|
19
|
+
* - Recommended for most use cases
|
|
20
|
+
* - Default iterations: 4096
|
|
21
|
+
*
|
|
22
|
+
* ### SCRAM-SHA-512
|
|
23
|
+
* - Provides stronger security at a slight performance cost
|
|
24
|
+
* - Recommended for high-security environments
|
|
25
|
+
* - Default iterations: 4096
|
|
26
|
+
*
|
|
27
|
+
* ## Client Configuration
|
|
28
|
+
*
|
|
29
|
+
* After creating SCRAM credentials, configure your Kafka clients:
|
|
30
|
+
*
|
|
31
|
+
* ### Java Client Configuration
|
|
32
|
+
*
|
|
33
|
+
* ### Python Client (kafka-python)
|
|
34
|
+
*
|
|
35
|
+
* ## Best Practices
|
|
36
|
+
*
|
|
37
|
+
* 1. **Use Strong Passwords**: Generate random passwords of sufficient length (32+ characters recommended)
|
|
38
|
+
* 2. **Choose Appropriate Iterations**: Higher iterations provide better security but impact authentication performance
|
|
39
|
+
* 3. **Prefer SCRAM-SHA-512**: For production environments with sensitive data
|
|
40
|
+
* 4. **Secure Password Storage**: Use Terraform variables, environment variables, or secret management systems
|
|
41
|
+
* 5. **Regular Rotation**: Implement a password rotation policy for production environments
|
|
42
|
+
* 6. **Combine with TLS**: Always use SCRAM with TLS encryption (SASL_SSL) in production
|
|
43
|
+
*
|
|
44
|
+
* > **Warning:** The password is stored in Terraform state. Ensure your state backend is encrypted and access is restricted.
|
|
45
|
+
*
|
|
3
46
|
* ## Import
|
|
4
47
|
*
|
|
5
48
|
* SCRAM credentials can be imported using the format `username|scram_mechanism|password`:
|
|
@@ -7,6 +50,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
7
50
|
* ```sh
|
|
8
51
|
* $ pulumi import kafka:index/userScramCredential:UserScramCredential example 'my-user|SCRAM-SHA-256|my-password'
|
|
9
52
|
* ```
|
|
53
|
+
*
|
|
54
|
+
* > **Note:** The password must be provided during import as it cannot be read from Kafka.
|
|
10
55
|
*/
|
|
11
56
|
export declare class UserScramCredential extends pulumi.CustomResource {
|
|
12
57
|
/**
|
package/userScramCredential.js
CHANGED
|
@@ -6,6 +6,49 @@ exports.UserScramCredential = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
+
* The `kafka.UserScramCredential` resource manages SCRAM (Salted Challenge Response Authentication Mechanism) credentials for Kafka users. SCRAM provides a secure way to authenticate clients using username/password combinations without transmitting passwords in plain text.
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ### Basic SCRAM-SHA-256 User
|
|
14
|
+
*
|
|
15
|
+
* ### SCRAM-SHA-512 User with Custom Iterations
|
|
16
|
+
*
|
|
17
|
+
* ### Multiple Users with Random Passwords
|
|
18
|
+
*
|
|
19
|
+
* ### Integration with ACLs
|
|
20
|
+
*
|
|
21
|
+
* ## SCRAM Mechanisms
|
|
22
|
+
*
|
|
23
|
+
* ### SCRAM-SHA-256
|
|
24
|
+
* - Provides good security with reasonable performance
|
|
25
|
+
* - Recommended for most use cases
|
|
26
|
+
* - Default iterations: 4096
|
|
27
|
+
*
|
|
28
|
+
* ### SCRAM-SHA-512
|
|
29
|
+
* - Provides stronger security at a slight performance cost
|
|
30
|
+
* - Recommended for high-security environments
|
|
31
|
+
* - Default iterations: 4096
|
|
32
|
+
*
|
|
33
|
+
* ## Client Configuration
|
|
34
|
+
*
|
|
35
|
+
* After creating SCRAM credentials, configure your Kafka clients:
|
|
36
|
+
*
|
|
37
|
+
* ### Java Client Configuration
|
|
38
|
+
*
|
|
39
|
+
* ### Python Client (kafka-python)
|
|
40
|
+
*
|
|
41
|
+
* ## Best Practices
|
|
42
|
+
*
|
|
43
|
+
* 1. **Use Strong Passwords**: Generate random passwords of sufficient length (32+ characters recommended)
|
|
44
|
+
* 2. **Choose Appropriate Iterations**: Higher iterations provide better security but impact authentication performance
|
|
45
|
+
* 3. **Prefer SCRAM-SHA-512**: For production environments with sensitive data
|
|
46
|
+
* 4. **Secure Password Storage**: Use Terraform variables, environment variables, or secret management systems
|
|
47
|
+
* 5. **Regular Rotation**: Implement a password rotation policy for production environments
|
|
48
|
+
* 6. **Combine with TLS**: Always use SCRAM with TLS encryption (SASL_SSL) in production
|
|
49
|
+
*
|
|
50
|
+
* > **Warning:** The password is stored in Terraform state. Ensure your state backend is encrypted and access is restricted.
|
|
51
|
+
*
|
|
9
52
|
* ## Import
|
|
10
53
|
*
|
|
11
54
|
* SCRAM credentials can be imported using the format `username|scram_mechanism|password`:
|
|
@@ -13,6 +56,8 @@ const utilities = require("./utilities");
|
|
|
13
56
|
* ```sh
|
|
14
57
|
* $ pulumi import kafka:index/userScramCredential:UserScramCredential example 'my-user|SCRAM-SHA-256|my-password'
|
|
15
58
|
* ```
|
|
59
|
+
*
|
|
60
|
+
* > **Note:** The password must be provided during import as it cannot be read from Kafka.
|
|
16
61
|
*/
|
|
17
62
|
class UserScramCredential extends pulumi.CustomResource {
|
|
18
63
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"userScramCredential.js","sourceRoot":"","sources":["../userScramCredential.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"userScramCredential.js","sourceRoot":"","sources":["../userScramCredential.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqDG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IAC1D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,EAAE,EAAE,GAAG,IAAI,EAAE,EAAE,EAAE,EAAE,EAAE,CAAC,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;IAoCD,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;YAC7C,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,EAAE,UAAU,CAAC;YACjD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,EAAE,iBAAiB,CAAC;YAC/D,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,EAAE,eAAe,CAAC;YAC3D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,EAAE,cAAc,CAAC;YACzD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,EAAE,QAAQ,CAAC;SAChD;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,IAAI,EAAE,cAAc,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACjD,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,IAAI,IAAI,EAAE,QAAQ,KAAK,SAAS,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3C,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YACvF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,EAAE,UAAU,CAAC,CAAC,CAAC,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,CAAC,SAAS,CAAC;YAC7F,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,EAAE,iBAAiB,CAAC;YAC9D,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,EAAE,eAAe,CAAC;YAC1D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,EAAE,cAAc,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,EAAE,QAAQ,CAAC;SAC/C;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,UAAU,EAAE,YAAY,CAAC,EAAE,CAAC;QAC3E,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxE,CAAC;;AA5FL,kDA6FC;AA/EG,gBAAgB;AACO,gCAAY,GAAG,qDAAqD,CAAC"}
|