pulumi-aiven 6.30.0__py3-none-any.whl → 6.30.0a1733792415__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-aiven might be problematic. Click here for more details.

@@ -30,15 +30,15 @@ class KafkaNativeAclArgs:
30
30
  host: Optional[pulumi.Input[str]] = None):
31
31
  """
32
32
  The set of arguments for constructing a KafkaNativeAcl resource.
33
- :param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
33
+ :param pulumi.Input[str] operation: The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
34
34
  :param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
35
- :param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
36
- :param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
35
+ :param pulumi.Input[str] permission_type: The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
36
+ :param pulumi.Input[str] principal: Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
37
37
  :param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
38
- :param pulumi.Input[str] resource_name: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
39
- :param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
38
+ :param pulumi.Input[str] resource_name: The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
39
+ :param pulumi.Input[str] resource_type: The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
40
40
  :param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
41
- :param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
41
+ :param pulumi.Input[str] host: The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
42
42
  """
43
43
  pulumi.set(__self__, "operation", operation)
44
44
  pulumi.set(__self__, "pattern_type", pattern_type)
@@ -55,7 +55,7 @@ class KafkaNativeAclArgs:
55
55
  @pulumi.getter
56
56
  def operation(self) -> pulumi.Input[str]:
57
57
  """
58
- The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
58
+ The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
59
59
  """
60
60
  return pulumi.get(self, "operation")
61
61
 
@@ -79,7 +79,7 @@ class KafkaNativeAclArgs:
79
79
  @pulumi.getter(name="permissionType")
80
80
  def permission_type(self) -> pulumi.Input[str]:
81
81
  """
82
- Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
82
+ The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
83
83
  """
84
84
  return pulumi.get(self, "permission_type")
85
85
 
@@ -91,7 +91,7 @@ class KafkaNativeAclArgs:
91
91
  @pulumi.getter
92
92
  def principal(self) -> pulumi.Input[str]:
93
93
  """
94
- Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
94
+ Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
95
95
  """
96
96
  return pulumi.get(self, "principal")
97
97
 
@@ -115,7 +115,7 @@ class KafkaNativeAclArgs:
115
115
  @pulumi.getter(name="resourceName")
116
116
  def resource_name(self) -> pulumi.Input[str]:
117
117
  """
118
- The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
118
+ The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
119
119
  """
120
120
  return pulumi.get(self, "resource_name")
121
121
 
@@ -127,7 +127,7 @@ class KafkaNativeAclArgs:
127
127
  @pulumi.getter(name="resourceType")
128
128
  def resource_type(self) -> pulumi.Input[str]:
129
129
  """
130
- The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
130
+ The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
131
131
  """
132
132
  return pulumi.get(self, "resource_type")
133
133
 
@@ -151,7 +151,7 @@ class KafkaNativeAclArgs:
151
151
  @pulumi.getter
152
152
  def host(self) -> Optional[pulumi.Input[str]]:
153
153
  """
154
- The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
154
+ The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
155
155
  """
156
156
  return pulumi.get(self, "host")
157
157
 
@@ -174,14 +174,14 @@ class _KafkaNativeAclState:
174
174
  service_name: Optional[pulumi.Input[str]] = None):
175
175
  """
176
176
  Input properties used for looking up and filtering KafkaNativeAcl resources.
177
- :param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
178
- :param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
177
+ :param pulumi.Input[str] host: The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
178
+ :param pulumi.Input[str] operation: The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
179
179
  :param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
180
- :param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
181
- :param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
180
+ :param pulumi.Input[str] permission_type: The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
181
+ :param pulumi.Input[str] principal: Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
182
182
  :param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
183
- :param pulumi.Input[str] resource_name: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
184
- :param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
183
+ :param pulumi.Input[str] resource_name: The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
184
+ :param pulumi.Input[str] resource_type: The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
185
185
  :param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
186
186
  """
187
187
  if host is not None:
@@ -207,7 +207,7 @@ class _KafkaNativeAclState:
207
207
  @pulumi.getter
208
208
  def host(self) -> Optional[pulumi.Input[str]]:
209
209
  """
210
- The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
210
+ The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
211
211
  """
212
212
  return pulumi.get(self, "host")
213
213
 
@@ -219,7 +219,7 @@ class _KafkaNativeAclState:
219
219
  @pulumi.getter
220
220
  def operation(self) -> Optional[pulumi.Input[str]]:
221
221
  """
222
- The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
222
+ The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
223
223
  """
224
224
  return pulumi.get(self, "operation")
225
225
 
@@ -243,7 +243,7 @@ class _KafkaNativeAclState:
243
243
  @pulumi.getter(name="permissionType")
244
244
  def permission_type(self) -> Optional[pulumi.Input[str]]:
245
245
  """
246
- Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
246
+ The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
247
247
  """
248
248
  return pulumi.get(self, "permission_type")
249
249
 
@@ -255,7 +255,7 @@ class _KafkaNativeAclState:
255
255
  @pulumi.getter
256
256
  def principal(self) -> Optional[pulumi.Input[str]]:
257
257
  """
258
- Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
258
+ Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
259
259
  """
260
260
  return pulumi.get(self, "principal")
261
261
 
@@ -279,7 +279,7 @@ class _KafkaNativeAclState:
279
279
  @pulumi.getter(name="resourceName")
280
280
  def resource_name(self) -> Optional[pulumi.Input[str]]:
281
281
  """
282
- The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
282
+ The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
283
283
  """
284
284
  return pulumi.get(self, "resource_name")
285
285
 
@@ -291,7 +291,7 @@ class _KafkaNativeAclState:
291
291
  @pulumi.getter(name="resourceType")
292
292
  def resource_type(self) -> Optional[pulumi.Input[str]]:
293
293
  """
294
- The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
294
+ The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
295
295
  """
296
296
  return pulumi.get(self, "resource_type")
297
297
 
@@ -328,45 +328,18 @@ class KafkaNativeAcl(pulumi.CustomResource):
328
328
  service_name: Optional[pulumi.Input[str]] = None,
329
329
  __props__=None):
330
330
  """
331
- Creates and manages Kafka-native [access control lists](https://aiven.io/docs/products/kafka/concepts/acl) (ACLs) for an Aiven for Apache Kafka® service. ACLs control access to Kafka topics, consumer groups,
332
- clusters, and Schema Registry.
333
-
334
- Kafka-native ACLs provide advanced resource-level access control with fine-grained permissions, including `ALLOW` and `DENY` rules. For simplified topic-level control you can use Aiven ACLs.
335
-
336
- ## Example Usage
337
-
338
- ```python
339
- import pulumi
340
- import pulumi_aiven as aiven
341
-
342
- example_acl = aiven.KafkaNativeAcl("example_acl",
343
- project=example_project["project"],
344
- service_name=example_kafka["serviceName"],
345
- resource_type="Topic",
346
- resource_name_="example-topic",
347
- principal="User:example-user",
348
- operation="Read",
349
- pattern_type="LITERAL",
350
- permission_type="ALLOW",
351
- host="198.51.100.0")
352
- ```
353
-
354
- ## Import
355
-
356
- ```sh
357
- $ pulumi import aiven:index/kafkaNativeAcl:KafkaNativeAcl example_acl PROJECT/SERVICE_NAME/ID
358
- ```
331
+ Manages native acls in [kafka service](https://aiven.io/docs/products/kafka/concepts/acl).
359
332
 
360
333
  :param str resource_name: The name of the resource.
361
334
  :param pulumi.ResourceOptions opts: Options for the resource.
362
- :param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
363
- :param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
335
+ :param pulumi.Input[str] host: The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
336
+ :param pulumi.Input[str] operation: The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
364
337
  :param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
365
- :param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
366
- :param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
338
+ :param pulumi.Input[str] permission_type: The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
339
+ :param pulumi.Input[str] principal: Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
367
340
  :param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
368
- :param pulumi.Input[str] resource_name_: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
369
- :param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
341
+ :param pulumi.Input[str] resource_name_: The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
342
+ :param pulumi.Input[str] resource_type: The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
370
343
  :param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
371
344
  """
372
345
  ...
@@ -376,34 +349,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
376
349
  args: KafkaNativeAclArgs,
377
350
  opts: Optional[pulumi.ResourceOptions] = None):
378
351
  """
379
- Creates and manages Kafka-native [access control lists](https://aiven.io/docs/products/kafka/concepts/acl) (ACLs) for an Aiven for Apache Kafka® service. ACLs control access to Kafka topics, consumer groups,
380
- clusters, and Schema Registry.
381
-
382
- Kafka-native ACLs provide advanced resource-level access control with fine-grained permissions, including `ALLOW` and `DENY` rules. For simplified topic-level control you can use Aiven ACLs.
383
-
384
- ## Example Usage
385
-
386
- ```python
387
- import pulumi
388
- import pulumi_aiven as aiven
389
-
390
- example_acl = aiven.KafkaNativeAcl("example_acl",
391
- project=example_project["project"],
392
- service_name=example_kafka["serviceName"],
393
- resource_type="Topic",
394
- resource_name_="example-topic",
395
- principal="User:example-user",
396
- operation="Read",
397
- pattern_type="LITERAL",
398
- permission_type="ALLOW",
399
- host="198.51.100.0")
400
- ```
401
-
402
- ## Import
403
-
404
- ```sh
405
- $ pulumi import aiven:index/kafkaNativeAcl:KafkaNativeAcl example_acl PROJECT/SERVICE_NAME/ID
406
- ```
352
+ Manages native acls in [kafka service](https://aiven.io/docs/products/kafka/concepts/acl).
407
353
 
408
354
  :param str resource_name: The name of the resource.
409
355
  :param KafkaNativeAclArgs args: The arguments to use to populate this resource's properties.
@@ -489,14 +435,14 @@ class KafkaNativeAcl(pulumi.CustomResource):
489
435
  :param str resource_name: The unique name of the resulting resource.
490
436
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
491
437
  :param pulumi.ResourceOptions opts: Options for the resource.
492
- :param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
493
- :param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
438
+ :param pulumi.Input[str] host: The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
439
+ :param pulumi.Input[str] operation: The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
494
440
  :param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
495
- :param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
496
- :param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
441
+ :param pulumi.Input[str] permission_type: The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
442
+ :param pulumi.Input[str] principal: Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
497
443
  :param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
498
- :param pulumi.Input[str] resource_name_: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
499
- :param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
444
+ :param pulumi.Input[str] resource_name_: The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
445
+ :param pulumi.Input[str] resource_type: The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
500
446
  :param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
501
447
  """
502
448
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -518,7 +464,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
518
464
  @pulumi.getter
519
465
  def host(self) -> pulumi.Output[Optional[str]]:
520
466
  """
521
- The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
467
+ The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
522
468
  """
523
469
  return pulumi.get(self, "host")
524
470
 
@@ -526,7 +472,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
526
472
  @pulumi.getter
527
473
  def operation(self) -> pulumi.Output[str]:
528
474
  """
529
- The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
475
+ The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
530
476
  """
531
477
  return pulumi.get(self, "operation")
532
478
 
@@ -542,7 +488,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
542
488
  @pulumi.getter(name="permissionType")
543
489
  def permission_type(self) -> pulumi.Output[str]:
544
490
  """
545
- Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
491
+ The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
546
492
  """
547
493
  return pulumi.get(self, "permission_type")
548
494
 
@@ -550,7 +496,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
550
496
  @pulumi.getter
551
497
  def principal(self) -> pulumi.Output[str]:
552
498
  """
553
- Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
499
+ Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
554
500
  """
555
501
  return pulumi.get(self, "principal")
556
502
 
@@ -566,7 +512,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
566
512
  @pulumi.getter(name="resourceName")
567
513
  def resource_name(self) -> pulumi.Output[str]:
568
514
  """
569
- The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
515
+ The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
570
516
  """
571
517
  return pulumi.get(self, "resource_name")
572
518
 
@@ -574,7 +520,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
574
520
  @pulumi.getter(name="resourceType")
575
521
  def resource_type(self) -> pulumi.Output[str]:
576
522
  """
577
- The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
523
+ The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
578
524
  """
579
525
  return pulumi.get(self, "resource_type")
580
526
 
@@ -29,7 +29,7 @@ class OrganizationGroupProjectArgs:
29
29
  The set of arguments for constructing a OrganizationGroupProject resource.
30
30
  :param pulumi.Input[str] group_id: The ID of the user group.
31
31
  :param pulumi.Input[str] project: The project that the users in the group are members of.
32
- :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
32
+ :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
33
33
  """
34
34
  pulumi.set(__self__, "group_id", group_id)
35
35
  pulumi.set(__self__, "project", project)
@@ -65,7 +65,7 @@ class OrganizationGroupProjectArgs:
65
65
  @pulumi.getter
66
66
  def role(self) -> pulumi.Input[str]:
67
67
  """
68
- [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
68
+ [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
69
69
  """
70
70
  return pulumi.get(self, "role")
71
71
 
@@ -94,7 +94,7 @@ class _OrganizationGroupProjectState:
94
94
  Input properties used for looking up and filtering OrganizationGroupProject resources.
95
95
  :param pulumi.Input[str] group_id: The ID of the user group.
96
96
  :param pulumi.Input[str] project: The project that the users in the group are members of.
97
- :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
97
+ :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
98
98
  """
99
99
  if group_id is not None:
100
100
  pulumi.set(__self__, "group_id", group_id)
@@ -133,7 +133,7 @@ class _OrganizationGroupProjectState:
133
133
  @pulumi.getter
134
134
  def role(self) -> Optional[pulumi.Input[str]]:
135
135
  """
136
- [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
136
+ [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
137
137
  """
138
138
  return pulumi.get(self, "role")
139
139
 
@@ -201,7 +201,7 @@ class OrganizationGroupProject(pulumi.CustomResource):
201
201
  :param pulumi.ResourceOptions opts: Options for the resource.
202
202
  :param pulumi.Input[str] group_id: The ID of the user group.
203
203
  :param pulumi.Input[str] project: The project that the users in the group are members of.
204
- :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
204
+ :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
205
205
  """
206
206
  ...
207
207
  @overload
@@ -306,7 +306,7 @@ class OrganizationGroupProject(pulumi.CustomResource):
306
306
  :param pulumi.ResourceOptions opts: Options for the resource.
307
307
  :param pulumi.Input[str] group_id: The ID of the user group.
308
308
  :param pulumi.Input[str] project: The project that the users in the group are members of.
309
- :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
309
+ :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
310
310
  """
311
311
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
312
312
 
@@ -338,7 +338,7 @@ class OrganizationGroupProject(pulumi.CustomResource):
338
338
  @pulumi.getter
339
339
  def role(self) -> pulumi.Output[str]:
340
340
  """
341
- [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
341
+ [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
342
342
  """
343
343
  return pulumi.get(self, "role")
344
344
 
@@ -169,7 +169,7 @@ class OrganizationPermission(pulumi.CustomResource):
169
169
  resource_type: Optional[pulumi.Input[str]] = None,
170
170
  __props__=None):
171
171
  """
172
- Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource. Permissions can be granted at the organization, organizational unit, and project level. Unit-level permissions aren't shown in the Aiven Console.
172
+ Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource.
173
173
 
174
174
  ## Example Usage
175
175
 
@@ -177,8 +177,7 @@ class OrganizationPermission(pulumi.CustomResource):
177
177
  import pulumi
178
178
  import pulumi_aiven as aiven
179
179
 
180
- # Grant access to a specific project
181
- example_project_permissions = aiven.OrganizationPermission("example_project_permissions",
180
+ example_permissions = aiven.OrganizationPermission("example_permissions",
182
181
  organization_id=main["id"],
183
182
  resource_id=example_project["id"],
184
183
  resource_type="project",
@@ -194,37 +193,13 @@ class OrganizationPermission(pulumi.CustomResource):
194
193
  {
195
194
  "permissions": [
196
195
  "project:integrations:write",
196
+ "project:networking:read",
197
197
  "developer",
198
198
  ],
199
199
  "principal_id": example_group["groupId"],
200
200
  "principal_type": "user_group",
201
201
  },
202
202
  ])
203
- # Organization-level permissions
204
- example_org_permissions = aiven.OrganizationPermission("example_org_permissions",
205
- organization_id=main["id"],
206
- resource_id=main["id"],
207
- resource_type="organization",
208
- permissions=[
209
- {
210
- "permissions": [
211
- "organization:app_users:write",
212
- "project:audit_logs:read",
213
- ],
214
- "principal_id": "u123a456b7890c",
215
- "principal_type": "user",
216
- },
217
- {
218
- "permissions": [
219
- "organization:users:write",
220
- "organization:groups:write",
221
- "organization:domains:write",
222
- "organization:idps:write",
223
- ],
224
- "principal_id": example_group_aiven_organization_user_group["groupId"],
225
- "principal_type": "user_group",
226
- },
227
- ])
228
203
  ```
229
204
 
230
205
  ## Import
@@ -247,7 +222,7 @@ class OrganizationPermission(pulumi.CustomResource):
247
222
  args: OrganizationPermissionArgs,
248
223
  opts: Optional[pulumi.ResourceOptions] = None):
249
224
  """
250
- Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource. Permissions can be granted at the organization, organizational unit, and project level. Unit-level permissions aren't shown in the Aiven Console.
225
+ Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource.
251
226
 
252
227
  ## Example Usage
253
228
 
@@ -255,8 +230,7 @@ class OrganizationPermission(pulumi.CustomResource):
255
230
  import pulumi
256
231
  import pulumi_aiven as aiven
257
232
 
258
- # Grant access to a specific project
259
- example_project_permissions = aiven.OrganizationPermission("example_project_permissions",
233
+ example_permissions = aiven.OrganizationPermission("example_permissions",
260
234
  organization_id=main["id"],
261
235
  resource_id=example_project["id"],
262
236
  resource_type="project",
@@ -272,37 +246,13 @@ class OrganizationPermission(pulumi.CustomResource):
272
246
  {
273
247
  "permissions": [
274
248
  "project:integrations:write",
249
+ "project:networking:read",
275
250
  "developer",
276
251
  ],
277
252
  "principal_id": example_group["groupId"],
278
253
  "principal_type": "user_group",
279
254
  },
280
255
  ])
281
- # Organization-level permissions
282
- example_org_permissions = aiven.OrganizationPermission("example_org_permissions",
283
- organization_id=main["id"],
284
- resource_id=main["id"],
285
- resource_type="organization",
286
- permissions=[
287
- {
288
- "permissions": [
289
- "organization:app_users:write",
290
- "project:audit_logs:read",
291
- ],
292
- "principal_id": "u123a456b7890c",
293
- "principal_type": "user",
294
- },
295
- {
296
- "permissions": [
297
- "organization:users:write",
298
- "organization:groups:write",
299
- "organization:domains:write",
300
- "organization:idps:write",
301
- ],
302
- "principal_id": example_group_aiven_organization_user_group["groupId"],
303
- "principal_type": "user_group",
304
- },
305
- ])
306
256
  ```
307
257
 
308
258
  ## Import