pulumi-aiven 6.30.0a1734412023__py3-none-any.whl → 6.30.0a1734637105__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-aiven might be problematic. Click here for more details.
- pulumi_aiven/__init__.py +30 -0
- pulumi_aiven/_inputs.py +2961 -67
- pulumi_aiven/account_team_project.py +7 -7
- pulumi_aiven/alloydbomni.py +1335 -0
- pulumi_aiven/alloydbomni_database.py +347 -0
- pulumi_aiven/alloydbomni_user.py +433 -0
- pulumi_aiven/clickhouse.py +8 -8
- pulumi_aiven/get_account_team_project.py +1 -1
- pulumi_aiven/get_alloydbomni.py +499 -0
- pulumi_aiven/get_alloydbomni_database.py +168 -0
- pulumi_aiven/get_alloydbomni_user.py +210 -0
- pulumi_aiven/get_clickhouse.py +1 -1
- pulumi_aiven/get_external_identity.py +3 -3
- pulumi_aiven/get_project_user.py +1 -1
- pulumi_aiven/get_service_integration.py +32 -4
- pulumi_aiven/kafka_acl.py +6 -4
- pulumi_aiven/kafka_native_acl.py +98 -44
- pulumi_aiven/organization_group_project.py +7 -7
- pulumi_aiven/organization_permission.py +56 -6
- pulumi_aiven/outputs.py +20185 -16451
- pulumi_aiven/project_user.py +7 -7
- pulumi_aiven/pulumi-plugin.json +1 -1
- pulumi_aiven/service_integration.py +98 -4
- {pulumi_aiven-6.30.0a1734412023.dist-info → pulumi_aiven-6.30.0a1734637105.dist-info}/METADATA +1 -1
- {pulumi_aiven-6.30.0a1734412023.dist-info → pulumi_aiven-6.30.0a1734637105.dist-info}/RECORD +27 -21
- {pulumi_aiven-6.30.0a1734412023.dist-info → pulumi_aiven-6.30.0a1734637105.dist-info}/WHEEL +0 -0
- {pulumi_aiven-6.30.0a1734412023.dist-info → pulumi_aiven-6.30.0a1734637105.dist-info}/top_level.txt +0 -0
pulumi_aiven/kafka_native_acl.py
CHANGED
|
@@ -30,15 +30,15 @@ class KafkaNativeAclArgs:
|
|
|
30
30
|
host: Optional[pulumi.Input[str]] = None):
|
|
31
31
|
"""
|
|
32
32
|
The set of arguments for constructing a KafkaNativeAcl resource.
|
|
33
|
-
:param pulumi.Input[str] operation: The
|
|
33
|
+
:param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
|
|
34
34
|
:param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
|
|
35
|
-
:param pulumi.Input[str] permission_type:
|
|
36
|
-
:param pulumi.Input[str] principal:
|
|
35
|
+
:param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
|
|
36
|
+
:param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
37
37
|
:param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
|
|
38
|
-
:param pulumi.Input[str] resource_name: The
|
|
39
|
-
:param pulumi.Input[str] resource_type: The
|
|
38
|
+
:param pulumi.Input[str] resource_name: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
39
|
+
:param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
|
|
40
40
|
:param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
|
|
41
|
-
:param pulumi.Input[str] host: The
|
|
41
|
+
:param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
42
42
|
"""
|
|
43
43
|
pulumi.set(__self__, "operation", operation)
|
|
44
44
|
pulumi.set(__self__, "pattern_type", pattern_type)
|
|
@@ -55,7 +55,7 @@ class KafkaNativeAclArgs:
|
|
|
55
55
|
@pulumi.getter
|
|
56
56
|
def operation(self) -> pulumi.Input[str]:
|
|
57
57
|
"""
|
|
58
|
-
The
|
|
58
|
+
The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
|
|
59
59
|
"""
|
|
60
60
|
return pulumi.get(self, "operation")
|
|
61
61
|
|
|
@@ -79,7 +79,7 @@ class KafkaNativeAclArgs:
|
|
|
79
79
|
@pulumi.getter(name="permissionType")
|
|
80
80
|
def permission_type(self) -> pulumi.Input[str]:
|
|
81
81
|
"""
|
|
82
|
-
|
|
82
|
+
Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
|
|
83
83
|
"""
|
|
84
84
|
return pulumi.get(self, "permission_type")
|
|
85
85
|
|
|
@@ -91,7 +91,7 @@ class KafkaNativeAclArgs:
|
|
|
91
91
|
@pulumi.getter
|
|
92
92
|
def principal(self) -> pulumi.Input[str]:
|
|
93
93
|
"""
|
|
94
|
-
|
|
94
|
+
Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
95
95
|
"""
|
|
96
96
|
return pulumi.get(self, "principal")
|
|
97
97
|
|
|
@@ -115,7 +115,7 @@ class KafkaNativeAclArgs:
|
|
|
115
115
|
@pulumi.getter(name="resourceName")
|
|
116
116
|
def resource_name(self) -> pulumi.Input[str]:
|
|
117
117
|
"""
|
|
118
|
-
The
|
|
118
|
+
The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
119
119
|
"""
|
|
120
120
|
return pulumi.get(self, "resource_name")
|
|
121
121
|
|
|
@@ -127,7 +127,7 @@ class KafkaNativeAclArgs:
|
|
|
127
127
|
@pulumi.getter(name="resourceType")
|
|
128
128
|
def resource_type(self) -> pulumi.Input[str]:
|
|
129
129
|
"""
|
|
130
|
-
The
|
|
130
|
+
The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
|
|
131
131
|
"""
|
|
132
132
|
return pulumi.get(self, "resource_type")
|
|
133
133
|
|
|
@@ -151,7 +151,7 @@ class KafkaNativeAclArgs:
|
|
|
151
151
|
@pulumi.getter
|
|
152
152
|
def host(self) -> Optional[pulumi.Input[str]]:
|
|
153
153
|
"""
|
|
154
|
-
The
|
|
154
|
+
The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
155
155
|
"""
|
|
156
156
|
return pulumi.get(self, "host")
|
|
157
157
|
|
|
@@ -174,14 +174,14 @@ class _KafkaNativeAclState:
|
|
|
174
174
|
service_name: Optional[pulumi.Input[str]] = None):
|
|
175
175
|
"""
|
|
176
176
|
Input properties used for looking up and filtering KafkaNativeAcl resources.
|
|
177
|
-
:param pulumi.Input[str] host: The
|
|
178
|
-
:param pulumi.Input[str] operation: The
|
|
177
|
+
:param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
178
|
+
:param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
|
|
179
179
|
:param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
|
|
180
|
-
:param pulumi.Input[str] permission_type:
|
|
181
|
-
:param pulumi.Input[str] principal:
|
|
180
|
+
:param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
|
|
181
|
+
:param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
182
182
|
:param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
|
|
183
|
-
:param pulumi.Input[str] resource_name: The
|
|
184
|
-
:param pulumi.Input[str] resource_type: The
|
|
183
|
+
:param pulumi.Input[str] resource_name: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
184
|
+
:param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
|
|
185
185
|
:param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
|
|
186
186
|
"""
|
|
187
187
|
if host is not None:
|
|
@@ -207,7 +207,7 @@ class _KafkaNativeAclState:
|
|
|
207
207
|
@pulumi.getter
|
|
208
208
|
def host(self) -> Optional[pulumi.Input[str]]:
|
|
209
209
|
"""
|
|
210
|
-
The
|
|
210
|
+
The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
211
211
|
"""
|
|
212
212
|
return pulumi.get(self, "host")
|
|
213
213
|
|
|
@@ -219,7 +219,7 @@ class _KafkaNativeAclState:
|
|
|
219
219
|
@pulumi.getter
|
|
220
220
|
def operation(self) -> Optional[pulumi.Input[str]]:
|
|
221
221
|
"""
|
|
222
|
-
The
|
|
222
|
+
The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
|
|
223
223
|
"""
|
|
224
224
|
return pulumi.get(self, "operation")
|
|
225
225
|
|
|
@@ -243,7 +243,7 @@ class _KafkaNativeAclState:
|
|
|
243
243
|
@pulumi.getter(name="permissionType")
|
|
244
244
|
def permission_type(self) -> Optional[pulumi.Input[str]]:
|
|
245
245
|
"""
|
|
246
|
-
|
|
246
|
+
Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
|
|
247
247
|
"""
|
|
248
248
|
return pulumi.get(self, "permission_type")
|
|
249
249
|
|
|
@@ -255,7 +255,7 @@ class _KafkaNativeAclState:
|
|
|
255
255
|
@pulumi.getter
|
|
256
256
|
def principal(self) -> Optional[pulumi.Input[str]]:
|
|
257
257
|
"""
|
|
258
|
-
|
|
258
|
+
Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
259
259
|
"""
|
|
260
260
|
return pulumi.get(self, "principal")
|
|
261
261
|
|
|
@@ -279,7 +279,7 @@ class _KafkaNativeAclState:
|
|
|
279
279
|
@pulumi.getter(name="resourceName")
|
|
280
280
|
def resource_name(self) -> Optional[pulumi.Input[str]]:
|
|
281
281
|
"""
|
|
282
|
-
The
|
|
282
|
+
The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
283
283
|
"""
|
|
284
284
|
return pulumi.get(self, "resource_name")
|
|
285
285
|
|
|
@@ -291,7 +291,7 @@ class _KafkaNativeAclState:
|
|
|
291
291
|
@pulumi.getter(name="resourceType")
|
|
292
292
|
def resource_type(self) -> Optional[pulumi.Input[str]]:
|
|
293
293
|
"""
|
|
294
|
-
The
|
|
294
|
+
The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
|
|
295
295
|
"""
|
|
296
296
|
return pulumi.get(self, "resource_type")
|
|
297
297
|
|
|
@@ -328,18 +328,45 @@ class KafkaNativeAcl(pulumi.CustomResource):
|
|
|
328
328
|
service_name: Optional[pulumi.Input[str]] = None,
|
|
329
329
|
__props__=None):
|
|
330
330
|
"""
|
|
331
|
-
|
|
331
|
+
Creates and manages Kafka-native [access control lists](https://aiven.io/docs/products/kafka/concepts/acl) (ACLs) for an Aiven for Apache Kafka® service. ACLs control access to Kafka topics, consumer groups,
|
|
332
|
+
clusters, and Schema Registry.
|
|
333
|
+
|
|
334
|
+
Kafka-native ACLs provide advanced resource-level access control with fine-grained permissions, including `ALLOW` and `DENY` rules. For simplified topic-level control you can use Aiven ACLs.
|
|
335
|
+
|
|
336
|
+
## Example Usage
|
|
337
|
+
|
|
338
|
+
```python
|
|
339
|
+
import pulumi
|
|
340
|
+
import pulumi_aiven as aiven
|
|
341
|
+
|
|
342
|
+
example_acl = aiven.KafkaNativeAcl("example_acl",
|
|
343
|
+
project=example_project["project"],
|
|
344
|
+
service_name=example_kafka["serviceName"],
|
|
345
|
+
resource_type="Topic",
|
|
346
|
+
resource_name_="example-topic",
|
|
347
|
+
principal="User:example-user",
|
|
348
|
+
operation="Read",
|
|
349
|
+
pattern_type="LITERAL",
|
|
350
|
+
permission_type="ALLOW",
|
|
351
|
+
host="198.51.100.0")
|
|
352
|
+
```
|
|
353
|
+
|
|
354
|
+
## Import
|
|
355
|
+
|
|
356
|
+
```sh
|
|
357
|
+
$ pulumi import aiven:index/kafkaNativeAcl:KafkaNativeAcl example_acl PROJECT/SERVICE_NAME/ID
|
|
358
|
+
```
|
|
332
359
|
|
|
333
360
|
:param str resource_name: The name of the resource.
|
|
334
361
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
335
|
-
:param pulumi.Input[str] host: The
|
|
336
|
-
:param pulumi.Input[str] operation: The
|
|
362
|
+
:param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
363
|
+
:param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
|
|
337
364
|
:param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
|
|
338
|
-
:param pulumi.Input[str] permission_type:
|
|
339
|
-
:param pulumi.Input[str] principal:
|
|
365
|
+
:param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
|
|
366
|
+
:param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
340
367
|
:param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
|
|
341
|
-
:param pulumi.Input[str] resource_name_: The
|
|
342
|
-
:param pulumi.Input[str] resource_type: The
|
|
368
|
+
:param pulumi.Input[str] resource_name_: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
369
|
+
:param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
|
|
343
370
|
:param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
|
|
344
371
|
"""
|
|
345
372
|
...
|
|
@@ -349,7 +376,34 @@ class KafkaNativeAcl(pulumi.CustomResource):
|
|
|
349
376
|
args: KafkaNativeAclArgs,
|
|
350
377
|
opts: Optional[pulumi.ResourceOptions] = None):
|
|
351
378
|
"""
|
|
352
|
-
|
|
379
|
+
Creates and manages Kafka-native [access control lists](https://aiven.io/docs/products/kafka/concepts/acl) (ACLs) for an Aiven for Apache Kafka® service. ACLs control access to Kafka topics, consumer groups,
|
|
380
|
+
clusters, and Schema Registry.
|
|
381
|
+
|
|
382
|
+
Kafka-native ACLs provide advanced resource-level access control with fine-grained permissions, including `ALLOW` and `DENY` rules. For simplified topic-level control you can use Aiven ACLs.
|
|
383
|
+
|
|
384
|
+
## Example Usage
|
|
385
|
+
|
|
386
|
+
```python
|
|
387
|
+
import pulumi
|
|
388
|
+
import pulumi_aiven as aiven
|
|
389
|
+
|
|
390
|
+
example_acl = aiven.KafkaNativeAcl("example_acl",
|
|
391
|
+
project=example_project["project"],
|
|
392
|
+
service_name=example_kafka["serviceName"],
|
|
393
|
+
resource_type="Topic",
|
|
394
|
+
resource_name_="example-topic",
|
|
395
|
+
principal="User:example-user",
|
|
396
|
+
operation="Read",
|
|
397
|
+
pattern_type="LITERAL",
|
|
398
|
+
permission_type="ALLOW",
|
|
399
|
+
host="198.51.100.0")
|
|
400
|
+
```
|
|
401
|
+
|
|
402
|
+
## Import
|
|
403
|
+
|
|
404
|
+
```sh
|
|
405
|
+
$ pulumi import aiven:index/kafkaNativeAcl:KafkaNativeAcl example_acl PROJECT/SERVICE_NAME/ID
|
|
406
|
+
```
|
|
353
407
|
|
|
354
408
|
:param str resource_name: The name of the resource.
|
|
355
409
|
:param KafkaNativeAclArgs args: The arguments to use to populate this resource's properties.
|
|
@@ -435,14 +489,14 @@ class KafkaNativeAcl(pulumi.CustomResource):
|
|
|
435
489
|
:param str resource_name: The unique name of the resulting resource.
|
|
436
490
|
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
437
491
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
438
|
-
:param pulumi.Input[str] host: The
|
|
439
|
-
:param pulumi.Input[str] operation: The
|
|
492
|
+
:param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
493
|
+
:param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
|
|
440
494
|
:param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
|
|
441
|
-
:param pulumi.Input[str] permission_type:
|
|
442
|
-
:param pulumi.Input[str] principal:
|
|
495
|
+
:param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
|
|
496
|
+
:param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
443
497
|
:param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
|
|
444
|
-
:param pulumi.Input[str] resource_name_: The
|
|
445
|
-
:param pulumi.Input[str] resource_type: The
|
|
498
|
+
:param pulumi.Input[str] resource_name_: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
499
|
+
:param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
|
|
446
500
|
:param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
|
|
447
501
|
"""
|
|
448
502
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
@@ -464,7 +518,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
|
|
|
464
518
|
@pulumi.getter
|
|
465
519
|
def host(self) -> pulumi.Output[Optional[str]]:
|
|
466
520
|
"""
|
|
467
|
-
The
|
|
521
|
+
The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
468
522
|
"""
|
|
469
523
|
return pulumi.get(self, "host")
|
|
470
524
|
|
|
@@ -472,7 +526,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
|
|
|
472
526
|
@pulumi.getter
|
|
473
527
|
def operation(self) -> pulumi.Output[str]:
|
|
474
528
|
"""
|
|
475
|
-
The
|
|
529
|
+
The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
|
|
476
530
|
"""
|
|
477
531
|
return pulumi.get(self, "operation")
|
|
478
532
|
|
|
@@ -488,7 +542,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
|
|
|
488
542
|
@pulumi.getter(name="permissionType")
|
|
489
543
|
def permission_type(self) -> pulumi.Output[str]:
|
|
490
544
|
"""
|
|
491
|
-
|
|
545
|
+
Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
|
|
492
546
|
"""
|
|
493
547
|
return pulumi.get(self, "permission_type")
|
|
494
548
|
|
|
@@ -496,7 +550,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
|
|
|
496
550
|
@pulumi.getter
|
|
497
551
|
def principal(self) -> pulumi.Output[str]:
|
|
498
552
|
"""
|
|
499
|
-
|
|
553
|
+
Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
500
554
|
"""
|
|
501
555
|
return pulumi.get(self, "principal")
|
|
502
556
|
|
|
@@ -512,7 +566,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
|
|
|
512
566
|
@pulumi.getter(name="resourceName")
|
|
513
567
|
def resource_name(self) -> pulumi.Output[str]:
|
|
514
568
|
"""
|
|
515
|
-
The
|
|
569
|
+
The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
|
|
516
570
|
"""
|
|
517
571
|
return pulumi.get(self, "resource_name")
|
|
518
572
|
|
|
@@ -520,7 +574,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
|
|
|
520
574
|
@pulumi.getter(name="resourceType")
|
|
521
575
|
def resource_type(self) -> pulumi.Output[str]:
|
|
522
576
|
"""
|
|
523
|
-
The
|
|
577
|
+
The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
|
|
524
578
|
"""
|
|
525
579
|
return pulumi.get(self, "resource_type")
|
|
526
580
|
|
|
@@ -29,7 +29,7 @@ class OrganizationGroupProjectArgs:
|
|
|
29
29
|
The set of arguments for constructing a OrganizationGroupProject resource.
|
|
30
30
|
:param pulumi.Input[str] group_id: The ID of the user group.
|
|
31
31
|
:param pulumi.Input[str] project: The project that the users in the group are members of.
|
|
32
|
-
:param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `
|
|
32
|
+
:param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
|
|
33
33
|
"""
|
|
34
34
|
pulumi.set(__self__, "group_id", group_id)
|
|
35
35
|
pulumi.set(__self__, "project", project)
|
|
@@ -65,7 +65,7 @@ class OrganizationGroupProjectArgs:
|
|
|
65
65
|
@pulumi.getter
|
|
66
66
|
def role(self) -> pulumi.Input[str]:
|
|
67
67
|
"""
|
|
68
|
-
[Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `
|
|
68
|
+
[Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
|
|
69
69
|
"""
|
|
70
70
|
return pulumi.get(self, "role")
|
|
71
71
|
|
|
@@ -94,7 +94,7 @@ class _OrganizationGroupProjectState:
|
|
|
94
94
|
Input properties used for looking up and filtering OrganizationGroupProject resources.
|
|
95
95
|
:param pulumi.Input[str] group_id: The ID of the user group.
|
|
96
96
|
:param pulumi.Input[str] project: The project that the users in the group are members of.
|
|
97
|
-
:param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `
|
|
97
|
+
:param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
|
|
98
98
|
"""
|
|
99
99
|
if group_id is not None:
|
|
100
100
|
pulumi.set(__self__, "group_id", group_id)
|
|
@@ -133,7 +133,7 @@ class _OrganizationGroupProjectState:
|
|
|
133
133
|
@pulumi.getter
|
|
134
134
|
def role(self) -> Optional[pulumi.Input[str]]:
|
|
135
135
|
"""
|
|
136
|
-
[Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `
|
|
136
|
+
[Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
|
|
137
137
|
"""
|
|
138
138
|
return pulumi.get(self, "role")
|
|
139
139
|
|
|
@@ -201,7 +201,7 @@ class OrganizationGroupProject(pulumi.CustomResource):
|
|
|
201
201
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
202
202
|
:param pulumi.Input[str] group_id: The ID of the user group.
|
|
203
203
|
:param pulumi.Input[str] project: The project that the users in the group are members of.
|
|
204
|
-
:param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `
|
|
204
|
+
:param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
|
|
205
205
|
"""
|
|
206
206
|
...
|
|
207
207
|
@overload
|
|
@@ -306,7 +306,7 @@ class OrganizationGroupProject(pulumi.CustomResource):
|
|
|
306
306
|
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
307
307
|
:param pulumi.Input[str] group_id: The ID of the user group.
|
|
308
308
|
:param pulumi.Input[str] project: The project that the users in the group are members of.
|
|
309
|
-
:param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `
|
|
309
|
+
:param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
|
|
310
310
|
"""
|
|
311
311
|
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
312
312
|
|
|
@@ -338,7 +338,7 @@ class OrganizationGroupProject(pulumi.CustomResource):
|
|
|
338
338
|
@pulumi.getter
|
|
339
339
|
def role(self) -> pulumi.Output[str]:
|
|
340
340
|
"""
|
|
341
|
-
[Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `
|
|
341
|
+
[Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
|
|
342
342
|
"""
|
|
343
343
|
return pulumi.get(self, "role")
|
|
344
344
|
|
|
@@ -169,7 +169,7 @@ class OrganizationPermission(pulumi.CustomResource):
|
|
|
169
169
|
resource_type: Optional[pulumi.Input[str]] = None,
|
|
170
170
|
__props__=None):
|
|
171
171
|
"""
|
|
172
|
-
Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource.
|
|
172
|
+
Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource. Permissions can be granted at the organization, organizational unit, and project level. Unit-level permissions aren't shown in the Aiven Console.
|
|
173
173
|
|
|
174
174
|
## Example Usage
|
|
175
175
|
|
|
@@ -177,7 +177,8 @@ class OrganizationPermission(pulumi.CustomResource):
|
|
|
177
177
|
import pulumi
|
|
178
178
|
import pulumi_aiven as aiven
|
|
179
179
|
|
|
180
|
-
|
|
180
|
+
# Grant access to a specific project
|
|
181
|
+
example_project_permissions = aiven.OrganizationPermission("example_project_permissions",
|
|
181
182
|
organization_id=main["id"],
|
|
182
183
|
resource_id=example_project["id"],
|
|
183
184
|
resource_type="project",
|
|
@@ -193,13 +194,37 @@ class OrganizationPermission(pulumi.CustomResource):
|
|
|
193
194
|
{
|
|
194
195
|
"permissions": [
|
|
195
196
|
"project:integrations:write",
|
|
196
|
-
"project:networking:read",
|
|
197
197
|
"developer",
|
|
198
198
|
],
|
|
199
199
|
"principal_id": example_group["groupId"],
|
|
200
200
|
"principal_type": "user_group",
|
|
201
201
|
},
|
|
202
202
|
])
|
|
203
|
+
# Organization-level permissions
|
|
204
|
+
example_org_permissions = aiven.OrganizationPermission("example_org_permissions",
|
|
205
|
+
organization_id=main["id"],
|
|
206
|
+
resource_id=main["id"],
|
|
207
|
+
resource_type="organization",
|
|
208
|
+
permissions=[
|
|
209
|
+
{
|
|
210
|
+
"permissions": [
|
|
211
|
+
"organization:app_users:write",
|
|
212
|
+
"project:audit_logs:read",
|
|
213
|
+
],
|
|
214
|
+
"principal_id": "u123a456b7890c",
|
|
215
|
+
"principal_type": "user",
|
|
216
|
+
},
|
|
217
|
+
{
|
|
218
|
+
"permissions": [
|
|
219
|
+
"organization:users:write",
|
|
220
|
+
"organization:groups:write",
|
|
221
|
+
"organization:domains:write",
|
|
222
|
+
"organization:idps:write",
|
|
223
|
+
],
|
|
224
|
+
"principal_id": example_group_aiven_organization_user_group["groupId"],
|
|
225
|
+
"principal_type": "user_group",
|
|
226
|
+
},
|
|
227
|
+
])
|
|
203
228
|
```
|
|
204
229
|
|
|
205
230
|
## Import
|
|
@@ -222,7 +247,7 @@ class OrganizationPermission(pulumi.CustomResource):
|
|
|
222
247
|
args: OrganizationPermissionArgs,
|
|
223
248
|
opts: Optional[pulumi.ResourceOptions] = None):
|
|
224
249
|
"""
|
|
225
|
-
Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource.
|
|
250
|
+
Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource. Permissions can be granted at the organization, organizational unit, and project level. Unit-level permissions aren't shown in the Aiven Console.
|
|
226
251
|
|
|
227
252
|
## Example Usage
|
|
228
253
|
|
|
@@ -230,7 +255,8 @@ class OrganizationPermission(pulumi.CustomResource):
|
|
|
230
255
|
import pulumi
|
|
231
256
|
import pulumi_aiven as aiven
|
|
232
257
|
|
|
233
|
-
|
|
258
|
+
# Grant access to a specific project
|
|
259
|
+
example_project_permissions = aiven.OrganizationPermission("example_project_permissions",
|
|
234
260
|
organization_id=main["id"],
|
|
235
261
|
resource_id=example_project["id"],
|
|
236
262
|
resource_type="project",
|
|
@@ -246,13 +272,37 @@ class OrganizationPermission(pulumi.CustomResource):
|
|
|
246
272
|
{
|
|
247
273
|
"permissions": [
|
|
248
274
|
"project:integrations:write",
|
|
249
|
-
"project:networking:read",
|
|
250
275
|
"developer",
|
|
251
276
|
],
|
|
252
277
|
"principal_id": example_group["groupId"],
|
|
253
278
|
"principal_type": "user_group",
|
|
254
279
|
},
|
|
255
280
|
])
|
|
281
|
+
# Organization-level permissions
|
|
282
|
+
example_org_permissions = aiven.OrganizationPermission("example_org_permissions",
|
|
283
|
+
organization_id=main["id"],
|
|
284
|
+
resource_id=main["id"],
|
|
285
|
+
resource_type="organization",
|
|
286
|
+
permissions=[
|
|
287
|
+
{
|
|
288
|
+
"permissions": [
|
|
289
|
+
"organization:app_users:write",
|
|
290
|
+
"project:audit_logs:read",
|
|
291
|
+
],
|
|
292
|
+
"principal_id": "u123a456b7890c",
|
|
293
|
+
"principal_type": "user",
|
|
294
|
+
},
|
|
295
|
+
{
|
|
296
|
+
"permissions": [
|
|
297
|
+
"organization:users:write",
|
|
298
|
+
"organization:groups:write",
|
|
299
|
+
"organization:domains:write",
|
|
300
|
+
"organization:idps:write",
|
|
301
|
+
],
|
|
302
|
+
"principal_id": example_group_aiven_organization_user_group["groupId"],
|
|
303
|
+
"principal_type": "user_group",
|
|
304
|
+
},
|
|
305
|
+
])
|
|
256
306
|
```
|
|
257
307
|
|
|
258
308
|
## Import
|