@pulumi/mongodbatlas 3.38.0-alpha.1764802483 → 3.38.0-alpha.1764888551

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -79,111 +79,6 @@ import * as outputs from "./types/output";
79
79
  * export const interfaceEndpointIds = pluralDatasource.then(pluralDatasource => pluralDatasource.results.map(__item => __item.interfaceEndpointId));
80
80
  * ```
81
81
  *
82
- * ### AWS MSK Privatelink
83
- * ```typescript
84
- * import * as pulumi from "@pulumi/pulumi";
85
- * import * as aws from "@pulumi/aws";
86
- * import * as mongodbatlas from "@pulumi/mongodbatlas";
87
- *
88
- * const vpc = new aws.ec2.Vpc("vpc", {cidrBlock: "192.168.0.0/22"});
89
- * const azs = aws.getAvailabilityZones({
90
- * state: "available",
91
- * });
92
- * const subnetAz1 = new aws.ec2.Subnet("subnet_az1", {
93
- * availabilityZone: azs.then(azs => azs.names?.[0]),
94
- * cidrBlock: "192.168.0.0/24",
95
- * vpcId: vpc.id,
96
- * });
97
- * const subnetAz2 = new aws.ec2.Subnet("subnet_az2", {
98
- * availabilityZone: azs.then(azs => azs.names?.[1]),
99
- * cidrBlock: "192.168.1.0/24",
100
- * vpcId: vpc.id,
101
- * });
102
- * const sg = new aws.ec2.SecurityGroup("sg", {vpcId: vpc.id});
103
- * const exampleConfiguration = new aws.msk.Configuration("example", {
104
- * name: `${mskClusterName}-msk-configuration`,
105
- * serverProperties: `auto.create.topics.enable=false
106
- * default.replication.factor=3
107
- * min.insync.replicas=2
108
- * num.io.threads=8
109
- * num.network.threads=5
110
- * num.partitions=1
111
- * num.replica.fetchers=2
112
- * replica.lag.time.max.ms=30000
113
- * socket.receive.buffer.bytes=102400
114
- * socket.request.max.bytes=104857600
115
- * socket.send.buffer.bytes=102400
116
- * unclean.leader.election.enable=true
117
- * allow.everyone.if.no.acl.found=false
118
- * `,
119
- * });
120
- * const example = new aws.msk.Cluster("example", {
121
- * clusterName: mskClusterName,
122
- * kafkaVersion: "3.6.0",
123
- * numberOfBrokerNodes: 2,
124
- * brokerNodeGroupInfo: {
125
- * instanceType: "kafka.m5.large",
126
- * clientSubnets: [
127
- * subnetAz1.id,
128
- * subnetAz2.id,
129
- * ],
130
- * securityGroups: [sg.id],
131
- * connectivityInfo: {
132
- * vpcConnectivity: {
133
- * clientAuthentication: {
134
- * sasl: {
135
- * scram: true,
136
- * },
137
- * },
138
- * },
139
- * },
140
- * },
141
- * clientAuthentication: {
142
- * sasl: {
143
- * scram: true,
144
- * },
145
- * },
146
- * configurationInfo: {
147
- * arn: exampleConfiguration.arn,
148
- * revision: exampleConfiguration.latestRevision,
149
- * },
150
- * });
151
- * const exampleClusterPolicy = new aws.msk.ClusterPolicy("example", {
152
- * clusterArn: example.arn,
153
- * policy: pulumi.jsonStringify({
154
- * Version: "2012-10-17",
155
- * Statement: [{
156
- * Effect: "Allow",
157
- * Principal: {
158
- * AWS: `arn:aws:iam::${awsAccountId}:root`,
159
- * },
160
- * Action: [
161
- * "kafka:CreateVpcConnection",
162
- * "kafka:GetBootstrapBrokers",
163
- * "kafka:DescribeCluster",
164
- * "kafka:DescribeClusterV2",
165
- * ],
166
- * Resource: example.arn,
167
- * }],
168
- * }),
169
- * });
170
- * const exampleMskSingleScramSecretAssociation = new aws.index.MskSingleScramSecretAssociation("example", {
171
- * clusterArn: example.arn,
172
- * secretArn: awsSecretArn,
173
- * });
174
- * const test = new mongodbatlas.StreamPrivatelinkEndpoint("test", {
175
- * projectId: projectId,
176
- * providerName: "AWS",
177
- * vendor: "MSK",
178
- * arn: example.arn,
179
- * });
180
- * const singularDatasource = test.id.apply(id => mongodbatlas.getStreamPrivatelinkEndpointOutput({
181
- * projectId: projectId,
182
- * id: id,
183
- * }));
184
- * export const privatelinkEndpointId = singularDatasource.apply(singularDatasource => singularDatasource.id);
185
- * ```
186
- *
187
82
  * ### AWS S3 Privatelink
188
83
  * ```typescript
189
84
  * import * as pulumi from "@pulumi/pulumi";
@@ -191,22 +86,22 @@ import * as outputs from "./types/output";
191
86
  * import * as mongodbatlas from "@pulumi/mongodbatlas";
192
87
  *
193
88
  * // S3 bucket for stream data
194
- * const streamBucket = new aws.s3.BucketV2("stream_bucket", {
89
+ * const streamBucket = new aws.index.S3Bucket("stream_bucket", {
195
90
  * bucket: s3BucketName,
196
91
  * forceDestroy: true,
197
92
  * });
198
- * const streamBucketVersioning = new aws.s3.BucketVersioningV2("stream_bucket_versioning", {
93
+ * const streamBucketVersioning = new aws.index.S3BucketVersioning("stream_bucket_versioning", {
199
94
  * bucket: streamBucket.id,
200
- * versioningConfiguration: {
95
+ * versioningConfiguration: [{
201
96
  * status: "Enabled",
202
- * },
97
+ * }],
203
98
  * });
204
- * const streamBucketEncryption = new aws.s3.BucketServerSideEncryptionConfigurationV2("stream_bucket_encryption", {
99
+ * const streamBucketEncryption = new aws.index.S3BucketServerSideEncryptionConfiguration("stream_bucket_encryption", {
205
100
  * bucket: streamBucket.id,
206
- * rules: [{
207
- * applyServerSideEncryptionByDefault: {
101
+ * rule: [{
102
+ * applyServerSideEncryptionByDefault: [{
208
103
  * sseAlgorithm: "AES256",
209
- * },
104
+ * }],
210
105
  * }],
211
106
  * });
212
107
  * // PrivateLink for S3
@@ -317,111 +212,6 @@ export interface GetStreamPrivatelinkEndpointsResult {
317
212
  * export const interfaceEndpointIds = pluralDatasource.then(pluralDatasource => pluralDatasource.results.map(__item => __item.interfaceEndpointId));
318
213
  * ```
319
214
  *
320
- * ### AWS MSK Privatelink
321
- * ```typescript
322
- * import * as pulumi from "@pulumi/pulumi";
323
- * import * as aws from "@pulumi/aws";
324
- * import * as mongodbatlas from "@pulumi/mongodbatlas";
325
- *
326
- * const vpc = new aws.ec2.Vpc("vpc", {cidrBlock: "192.168.0.0/22"});
327
- * const azs = aws.getAvailabilityZones({
328
- * state: "available",
329
- * });
330
- * const subnetAz1 = new aws.ec2.Subnet("subnet_az1", {
331
- * availabilityZone: azs.then(azs => azs.names?.[0]),
332
- * cidrBlock: "192.168.0.0/24",
333
- * vpcId: vpc.id,
334
- * });
335
- * const subnetAz2 = new aws.ec2.Subnet("subnet_az2", {
336
- * availabilityZone: azs.then(azs => azs.names?.[1]),
337
- * cidrBlock: "192.168.1.0/24",
338
- * vpcId: vpc.id,
339
- * });
340
- * const sg = new aws.ec2.SecurityGroup("sg", {vpcId: vpc.id});
341
- * const exampleConfiguration = new aws.msk.Configuration("example", {
342
- * name: `${mskClusterName}-msk-configuration`,
343
- * serverProperties: `auto.create.topics.enable=false
344
- * default.replication.factor=3
345
- * min.insync.replicas=2
346
- * num.io.threads=8
347
- * num.network.threads=5
348
- * num.partitions=1
349
- * num.replica.fetchers=2
350
- * replica.lag.time.max.ms=30000
351
- * socket.receive.buffer.bytes=102400
352
- * socket.request.max.bytes=104857600
353
- * socket.send.buffer.bytes=102400
354
- * unclean.leader.election.enable=true
355
- * allow.everyone.if.no.acl.found=false
356
- * `,
357
- * });
358
- * const example = new aws.msk.Cluster("example", {
359
- * clusterName: mskClusterName,
360
- * kafkaVersion: "3.6.0",
361
- * numberOfBrokerNodes: 2,
362
- * brokerNodeGroupInfo: {
363
- * instanceType: "kafka.m5.large",
364
- * clientSubnets: [
365
- * subnetAz1.id,
366
- * subnetAz2.id,
367
- * ],
368
- * securityGroups: [sg.id],
369
- * connectivityInfo: {
370
- * vpcConnectivity: {
371
- * clientAuthentication: {
372
- * sasl: {
373
- * scram: true,
374
- * },
375
- * },
376
- * },
377
- * },
378
- * },
379
- * clientAuthentication: {
380
- * sasl: {
381
- * scram: true,
382
- * },
383
- * },
384
- * configurationInfo: {
385
- * arn: exampleConfiguration.arn,
386
- * revision: exampleConfiguration.latestRevision,
387
- * },
388
- * });
389
- * const exampleClusterPolicy = new aws.msk.ClusterPolicy("example", {
390
- * clusterArn: example.arn,
391
- * policy: pulumi.jsonStringify({
392
- * Version: "2012-10-17",
393
- * Statement: [{
394
- * Effect: "Allow",
395
- * Principal: {
396
- * AWS: `arn:aws:iam::${awsAccountId}:root`,
397
- * },
398
- * Action: [
399
- * "kafka:CreateVpcConnection",
400
- * "kafka:GetBootstrapBrokers",
401
- * "kafka:DescribeCluster",
402
- * "kafka:DescribeClusterV2",
403
- * ],
404
- * Resource: example.arn,
405
- * }],
406
- * }),
407
- * });
408
- * const exampleMskSingleScramSecretAssociation = new aws.index.MskSingleScramSecretAssociation("example", {
409
- * clusterArn: example.arn,
410
- * secretArn: awsSecretArn,
411
- * });
412
- * const test = new mongodbatlas.StreamPrivatelinkEndpoint("test", {
413
- * projectId: projectId,
414
- * providerName: "AWS",
415
- * vendor: "MSK",
416
- * arn: example.arn,
417
- * });
418
- * const singularDatasource = test.id.apply(id => mongodbatlas.getStreamPrivatelinkEndpointOutput({
419
- * projectId: projectId,
420
- * id: id,
421
- * }));
422
- * export const privatelinkEndpointId = singularDatasource.apply(singularDatasource => singularDatasource.id);
423
- * ```
424
- *
425
215
  * ### AWS S3 Privatelink
426
216
  * ```typescript
427
217
  * import * as pulumi from "@pulumi/pulumi";
@@ -429,22 +219,22 @@ export interface GetStreamPrivatelinkEndpointsResult {
429
219
  * import * as mongodbatlas from "@pulumi/mongodbatlas";
430
220
  *
431
221
  * // S3 bucket for stream data
432
- * const streamBucket = new aws.s3.BucketV2("stream_bucket", {
222
+ * const streamBucket = new aws.index.S3Bucket("stream_bucket", {
433
223
  * bucket: s3BucketName,
434
224
  * forceDestroy: true,
435
225
  * });
436
- * const streamBucketVersioning = new aws.s3.BucketVersioningV2("stream_bucket_versioning", {
226
+ * const streamBucketVersioning = new aws.index.S3BucketVersioning("stream_bucket_versioning", {
437
227
  * bucket: streamBucket.id,
438
- * versioningConfiguration: {
228
+ * versioningConfiguration: [{
439
229
  * status: "Enabled",
440
- * },
230
+ * }],
441
231
  * });
442
- * const streamBucketEncryption = new aws.s3.BucketServerSideEncryptionConfigurationV2("stream_bucket_encryption", {
232
+ * const streamBucketEncryption = new aws.index.S3BucketServerSideEncryptionConfiguration("stream_bucket_encryption", {
443
233
  * bucket: streamBucket.id,
444
- * rules: [{
445
- * applyServerSideEncryptionByDefault: {
234
+ * rule: [{
235
+ * applyServerSideEncryptionByDefault: [{
446
236
  * sseAlgorithm: "AES256",
447
- * },
237
+ * }],
448
238
  * }],
449
239
  * });
450
240
  * // PrivateLink for S3
@@ -84,111 +84,6 @@ const utilities = require("./utilities");
84
84
  * export const interfaceEndpointIds = pluralDatasource.then(pluralDatasource => pluralDatasource.results.map(__item => __item.interfaceEndpointId));
85
85
  * ```
86
86
  *
87
- * ### AWS MSK Privatelink
88
- * ```typescript
89
- * import * as pulumi from "@pulumi/pulumi";
90
- * import * as aws from "@pulumi/aws";
91
- * import * as mongodbatlas from "@pulumi/mongodbatlas";
92
- *
93
- * const vpc = new aws.ec2.Vpc("vpc", {cidrBlock: "192.168.0.0/22"});
94
- * const azs = aws.getAvailabilityZones({
95
- * state: "available",
96
- * });
97
- * const subnetAz1 = new aws.ec2.Subnet("subnet_az1", {
98
- * availabilityZone: azs.then(azs => azs.names?.[0]),
99
- * cidrBlock: "192.168.0.0/24",
100
- * vpcId: vpc.id,
101
- * });
102
- * const subnetAz2 = new aws.ec2.Subnet("subnet_az2", {
103
- * availabilityZone: azs.then(azs => azs.names?.[1]),
104
- * cidrBlock: "192.168.1.0/24",
105
- * vpcId: vpc.id,
106
- * });
107
- * const sg = new aws.ec2.SecurityGroup("sg", {vpcId: vpc.id});
108
- * const exampleConfiguration = new aws.msk.Configuration("example", {
109
- * name: `${mskClusterName}-msk-configuration`,
110
- * serverProperties: `auto.create.topics.enable=false
111
- * default.replication.factor=3
112
- * min.insync.replicas=2
113
- * num.io.threads=8
114
- * num.network.threads=5
115
- * num.partitions=1
116
- * num.replica.fetchers=2
117
- * replica.lag.time.max.ms=30000
118
- * socket.receive.buffer.bytes=102400
119
- * socket.request.max.bytes=104857600
120
- * socket.send.buffer.bytes=102400
121
- * unclean.leader.election.enable=true
122
- * allow.everyone.if.no.acl.found=false
123
- * `,
124
- * });
125
- * const example = new aws.msk.Cluster("example", {
126
- * clusterName: mskClusterName,
127
- * kafkaVersion: "3.6.0",
128
- * numberOfBrokerNodes: 2,
129
- * brokerNodeGroupInfo: {
130
- * instanceType: "kafka.m5.large",
131
- * clientSubnets: [
132
- * subnetAz1.id,
133
- * subnetAz2.id,
134
- * ],
135
- * securityGroups: [sg.id],
136
- * connectivityInfo: {
137
- * vpcConnectivity: {
138
- * clientAuthentication: {
139
- * sasl: {
140
- * scram: true,
141
- * },
142
- * },
143
- * },
144
- * },
145
- * },
146
- * clientAuthentication: {
147
- * sasl: {
148
- * scram: true,
149
- * },
150
- * },
151
- * configurationInfo: {
152
- * arn: exampleConfiguration.arn,
153
- * revision: exampleConfiguration.latestRevision,
154
- * },
155
- * });
156
- * const exampleClusterPolicy = new aws.msk.ClusterPolicy("example", {
157
- * clusterArn: example.arn,
158
- * policy: pulumi.jsonStringify({
159
- * Version: "2012-10-17",
160
- * Statement: [{
161
- * Effect: "Allow",
162
- * Principal: {
163
- * AWS: `arn:aws:iam::${awsAccountId}:root`,
164
- * },
165
- * Action: [
166
- * "kafka:CreateVpcConnection",
167
- * "kafka:GetBootstrapBrokers",
168
- * "kafka:DescribeCluster",
169
- * "kafka:DescribeClusterV2",
170
- * ],
171
- * Resource: example.arn,
172
- * }],
173
- * }),
174
- * });
175
- * const exampleMskSingleScramSecretAssociation = new aws.index.MskSingleScramSecretAssociation("example", {
176
- * clusterArn: example.arn,
177
- * secretArn: awsSecretArn,
178
- * });
179
- * const test = new mongodbatlas.StreamPrivatelinkEndpoint("test", {
180
- * projectId: projectId,
181
- * providerName: "AWS",
182
- * vendor: "MSK",
183
- * arn: example.arn,
184
- * });
185
- * const singularDatasource = test.id.apply(id => mongodbatlas.getStreamPrivatelinkEndpointOutput({
186
- * projectId: projectId,
187
- * id: id,
188
- * }));
189
- * export const privatelinkEndpointId = singularDatasource.apply(singularDatasource => singularDatasource.id);
190
- * ```
191
- *
192
87
  * ### AWS S3 Privatelink
193
88
  * ```typescript
194
89
  * import * as pulumi from "@pulumi/pulumi";
@@ -196,22 +91,22 @@ const utilities = require("./utilities");
196
91
  * import * as mongodbatlas from "@pulumi/mongodbatlas";
197
92
  *
198
93
  * // S3 bucket for stream data
199
- * const streamBucket = new aws.s3.BucketV2("stream_bucket", {
94
+ * const streamBucket = new aws.index.S3Bucket("stream_bucket", {
200
95
  * bucket: s3BucketName,
201
96
  * forceDestroy: true,
202
97
  * });
203
- * const streamBucketVersioning = new aws.s3.BucketVersioningV2("stream_bucket_versioning", {
98
+ * const streamBucketVersioning = new aws.index.S3BucketVersioning("stream_bucket_versioning", {
204
99
  * bucket: streamBucket.id,
205
- * versioningConfiguration: {
100
+ * versioningConfiguration: [{
206
101
  * status: "Enabled",
207
- * },
102
+ * }],
208
103
  * });
209
- * const streamBucketEncryption = new aws.s3.BucketServerSideEncryptionConfigurationV2("stream_bucket_encryption", {
104
+ * const streamBucketEncryption = new aws.index.S3BucketServerSideEncryptionConfiguration("stream_bucket_encryption", {
210
105
  * bucket: streamBucket.id,
211
- * rules: [{
212
- * applyServerSideEncryptionByDefault: {
106
+ * rule: [{
107
+ * applyServerSideEncryptionByDefault: [{
213
108
  * sseAlgorithm: "AES256",
214
- * },
109
+ * }],
215
110
  * }],
216
111
  * });
217
112
  * // PrivateLink for S3
@@ -311,111 +206,6 @@ exports.getStreamPrivatelinkEndpoints = getStreamPrivatelinkEndpoints;
311
206
  * export const interfaceEndpointIds = pluralDatasource.then(pluralDatasource => pluralDatasource.results.map(__item => __item.interfaceEndpointId));
312
207
  * ```
313
208
  *
314
- * ### AWS MSK Privatelink
315
- * ```typescript
316
- * import * as pulumi from "@pulumi/pulumi";
317
- * import * as aws from "@pulumi/aws";
318
- * import * as mongodbatlas from "@pulumi/mongodbatlas";
319
- *
320
- * const vpc = new aws.ec2.Vpc("vpc", {cidrBlock: "192.168.0.0/22"});
321
- * const azs = aws.getAvailabilityZones({
322
- * state: "available",
323
- * });
324
- * const subnetAz1 = new aws.ec2.Subnet("subnet_az1", {
325
- * availabilityZone: azs.then(azs => azs.names?.[0]),
326
- * cidrBlock: "192.168.0.0/24",
327
- * vpcId: vpc.id,
328
- * });
329
- * const subnetAz2 = new aws.ec2.Subnet("subnet_az2", {
330
- * availabilityZone: azs.then(azs => azs.names?.[1]),
331
- * cidrBlock: "192.168.1.0/24",
332
- * vpcId: vpc.id,
333
- * });
334
- * const sg = new aws.ec2.SecurityGroup("sg", {vpcId: vpc.id});
335
- * const exampleConfiguration = new aws.msk.Configuration("example", {
336
- * name: `${mskClusterName}-msk-configuration`,
337
- * serverProperties: `auto.create.topics.enable=false
338
- * default.replication.factor=3
339
- * min.insync.replicas=2
340
- * num.io.threads=8
341
- * num.network.threads=5
342
- * num.partitions=1
343
- * num.replica.fetchers=2
344
- * replica.lag.time.max.ms=30000
345
- * socket.receive.buffer.bytes=102400
346
- * socket.request.max.bytes=104857600
347
- * socket.send.buffer.bytes=102400
348
- * unclean.leader.election.enable=true
349
- * allow.everyone.if.no.acl.found=false
350
- * `,
351
- * });
352
- * const example = new aws.msk.Cluster("example", {
353
- * clusterName: mskClusterName,
354
- * kafkaVersion: "3.6.0",
355
- * numberOfBrokerNodes: 2,
356
- * brokerNodeGroupInfo: {
357
- * instanceType: "kafka.m5.large",
358
- * clientSubnets: [
359
- * subnetAz1.id,
360
- * subnetAz2.id,
361
- * ],
362
- * securityGroups: [sg.id],
363
- * connectivityInfo: {
364
- * vpcConnectivity: {
365
- * clientAuthentication: {
366
- * sasl: {
367
- * scram: true,
368
- * },
369
- * },
370
- * },
371
- * },
372
- * },
373
- * clientAuthentication: {
374
- * sasl: {
375
- * scram: true,
376
- * },
377
- * },
378
- * configurationInfo: {
379
- * arn: exampleConfiguration.arn,
380
- * revision: exampleConfiguration.latestRevision,
381
- * },
382
- * });
383
- * const exampleClusterPolicy = new aws.msk.ClusterPolicy("example", {
384
- * clusterArn: example.arn,
385
- * policy: pulumi.jsonStringify({
386
- * Version: "2012-10-17",
387
- * Statement: [{
388
- * Effect: "Allow",
389
- * Principal: {
390
- * AWS: `arn:aws:iam::${awsAccountId}:root`,
391
- * },
392
- * Action: [
393
- * "kafka:CreateVpcConnection",
394
- * "kafka:GetBootstrapBrokers",
395
- * "kafka:DescribeCluster",
396
- * "kafka:DescribeClusterV2",
397
- * ],
398
- * Resource: example.arn,
399
- * }],
400
- * }),
401
- * });
402
- * const exampleMskSingleScramSecretAssociation = new aws.index.MskSingleScramSecretAssociation("example", {
403
- * clusterArn: example.arn,
404
- * secretArn: awsSecretArn,
405
- * });
406
- * const test = new mongodbatlas.StreamPrivatelinkEndpoint("test", {
407
- * projectId: projectId,
408
- * providerName: "AWS",
409
- * vendor: "MSK",
410
- * arn: example.arn,
411
- * });
412
- * const singularDatasource = test.id.apply(id => mongodbatlas.getStreamPrivatelinkEndpointOutput({
413
- * projectId: projectId,
414
- * id: id,
415
- * }));
416
- * export const privatelinkEndpointId = singularDatasource.apply(singularDatasource => singularDatasource.id);
417
- * ```
418
- *
419
209
  * ### AWS S3 Privatelink
420
210
  * ```typescript
421
211
  * import * as pulumi from "@pulumi/pulumi";
@@ -423,22 +213,22 @@ exports.getStreamPrivatelinkEndpoints = getStreamPrivatelinkEndpoints;
423
213
  * import * as mongodbatlas from "@pulumi/mongodbatlas";
424
214
  *
425
215
  * // S3 bucket for stream data
426
- * const streamBucket = new aws.s3.BucketV2("stream_bucket", {
216
+ * const streamBucket = new aws.index.S3Bucket("stream_bucket", {
427
217
  * bucket: s3BucketName,
428
218
  * forceDestroy: true,
429
219
  * });
430
- * const streamBucketVersioning = new aws.s3.BucketVersioningV2("stream_bucket_versioning", {
220
+ * const streamBucketVersioning = new aws.index.S3BucketVersioning("stream_bucket_versioning", {
431
221
  * bucket: streamBucket.id,
432
- * versioningConfiguration: {
222
+ * versioningConfiguration: [{
433
223
  * status: "Enabled",
434
- * },
224
+ * }],
435
225
  * });
436
- * const streamBucketEncryption = new aws.s3.BucketServerSideEncryptionConfigurationV2("stream_bucket_encryption", {
226
+ * const streamBucketEncryption = new aws.index.S3BucketServerSideEncryptionConfiguration("stream_bucket_encryption", {
437
227
  * bucket: streamBucket.id,
438
- * rules: [{
439
- * applyServerSideEncryptionByDefault: {
228
+ * rule: [{
229
+ * applyServerSideEncryptionByDefault: [{
440
230
  * sseAlgorithm: "AES256",
441
- * },
231
+ * }],
442
232
  * }],
443
233
  * });
444
234
  * // PrivateLink for S3
@@ -1 +1 @@
1
- {"version":3,"file":"getStreamPrivatelinkEndpoints.js","sourceRoot":"","sources":["../getStreamPrivatelinkEndpoints.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2NG;AACH,SAAgB,6BAA6B,CAAC,IAAuC,EAAE,IAA2B;IAC9G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gFAAgF,EAAE;QAC3G,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AALD,sEAKC;AAoBD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2NG;AACH,SAAgB,mCAAmC,CAAC,IAA6C,EAAE,IAAiC;IAChI,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,gFAAgF,EAAE;QACjH,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AALD,kFAKC"}
1
+ {"version":3,"file":"getStreamPrivatelinkEndpoints.js","sourceRoot":"","sources":["../getStreamPrivatelinkEndpoints.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkHG;AACH,SAAgB,6BAA6B,CAAC,IAAuC,EAAE,IAA2B;IAC9G,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,gFAAgF,EAAE;QAC3G,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AALD,sEAKC;AAoBD;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAkHG;AACH,SAAgB,mCAAmC,CAAC,IAA6C,EAAE,IAAiC;IAChI,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,YAAY,CAAC,gFAAgF,EAAE;QACjH,WAAW,EAAE,IAAI,CAAC,SAAS;KAC9B,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AALD,kFAKC"}
@@ -50,66 +50,12 @@ import * as pulumi from "@pulumi/pulumi";
50
50
  * });
51
51
  * // the following assumes an AWS provider is configured
52
52
  * // Accept the peering connection request
53
- * const peer = new aws.ec2.VpcPeeringConnectionAccepter("peer", {
53
+ * const peer = new aws.index.VpcPeeringConnectionAccepter("peer", {
54
54
  * vpcPeeringConnectionId: testNetworkPeering.connectionId,
55
55
  * autoAccept: true,
56
56
  * });
57
57
  * ```
58
58
  *
59
- * ### Example with GCP
60
- *
61
- * ```typescript
62
- * import * as pulumi from "@pulumi/pulumi";
63
- * import * as gcp from "@pulumi/gcp";
64
- * import * as mongodbatlas from "@pulumi/mongodbatlas";
65
- *
66
- * // Container example provided but not always required,
67
- * // see network_container documentation for details.
68
- * const test = new mongodbatlas.NetworkContainer("test", {
69
- * projectId: projectId,
70
- * atlasCidrBlock: "10.8.0.0/21",
71
- * providerName: "GCP",
72
- * });
73
- * // Create the peering connection request
74
- * const testNetworkPeering = new mongodbatlas.NetworkPeering("test", {
75
- * projectId: projectId,
76
- * containerId: test.containerId,
77
- * providerName: "GCP",
78
- * gcpProjectId: GCP_PROJECT_ID,
79
- * networkName: "default",
80
- * });
81
- * // the following assumes a GCP provider is configured
82
- * const _default = gcp.compute.getNetwork({
83
- * name: "default",
84
- * });
85
- * // Create the GCP peer
86
- * const peering = new gcp.compute.NetworkPeering("peering", {
87
- * name: "peering-gcp-terraform-test",
88
- * network: _default.then(_default => _default.selfLink),
89
- * peerNetwork: pulumi.interpolate`https://www.googleapis.com/compute/v1/projects/${testNetworkPeering.atlasGcpProjectId}/global/networks/${testNetworkPeering.atlasVpcName}`,
90
- * });
91
- * // Create the cluster once the peering connection is completed
92
- * const testAdvancedCluster = new mongodbatlas.AdvancedCluster("test", {
93
- * projectId: projectId,
94
- * name: "terraform-manually-test",
95
- * clusterType: "REPLICASET",
96
- * backupEnabled: true,
97
- * replicationSpecs: [{
98
- * regionConfigs: [{
99
- * priority: 7,
100
- * providerName: "GCP",
101
- * regionName: "US_EAST_4",
102
- * electableSpecs: {
103
- * instanceSize: "M10",
104
- * nodeCount: 3,
105
- * },
106
- * }],
107
- * }],
108
- * }, {
109
- * dependsOn: [peering],
110
- * });
111
- * ```
112
- *
113
59
  * ### Example with Azure
114
60
  *
115
61
  * ```typescript