pulumi-aiven 6.30.0a1734412023__py3-none-any.whl → 6.30.0a1734637105__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-aiven might be problematic. Click here for more details.

@@ -30,15 +30,15 @@ class KafkaNativeAclArgs:
30
30
  host: Optional[pulumi.Input[str]] = None):
31
31
  """
32
32
  The set of arguments for constructing a KafkaNativeAcl resource.
33
- :param pulumi.Input[str] operation: The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
33
+ :param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
34
34
  :param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
35
- :param pulumi.Input[str] permission_type: The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
36
- :param pulumi.Input[str] principal: Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
35
+ :param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
36
+ :param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
37
37
  :param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
38
- :param pulumi.Input[str] resource_name: The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
39
- :param pulumi.Input[str] resource_type: The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
38
+ :param pulumi.Input[str] resource_name: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
39
+ :param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
40
40
  :param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
41
- :param pulumi.Input[str] host: The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
41
+ :param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
42
42
  """
43
43
  pulumi.set(__self__, "operation", operation)
44
44
  pulumi.set(__self__, "pattern_type", pattern_type)
@@ -55,7 +55,7 @@ class KafkaNativeAclArgs:
55
55
  @pulumi.getter
56
56
  def operation(self) -> pulumi.Input[str]:
57
57
  """
58
- The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
58
+ The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
59
59
  """
60
60
  return pulumi.get(self, "operation")
61
61
 
@@ -79,7 +79,7 @@ class KafkaNativeAclArgs:
79
79
  @pulumi.getter(name="permissionType")
80
80
  def permission_type(self) -> pulumi.Input[str]:
81
81
  """
82
- The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
82
+ Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
83
83
  """
84
84
  return pulumi.get(self, "permission_type")
85
85
 
@@ -91,7 +91,7 @@ class KafkaNativeAclArgs:
91
91
  @pulumi.getter
92
92
  def principal(self) -> pulumi.Input[str]:
93
93
  """
94
- Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
94
+ Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
95
95
  """
96
96
  return pulumi.get(self, "principal")
97
97
 
@@ -115,7 +115,7 @@ class KafkaNativeAclArgs:
115
115
  @pulumi.getter(name="resourceName")
116
116
  def resource_name(self) -> pulumi.Input[str]:
117
117
  """
118
- The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
118
+ The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
119
119
  """
120
120
  return pulumi.get(self, "resource_name")
121
121
 
@@ -127,7 +127,7 @@ class KafkaNativeAclArgs:
127
127
  @pulumi.getter(name="resourceType")
128
128
  def resource_type(self) -> pulumi.Input[str]:
129
129
  """
130
- The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
130
+ The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
131
131
  """
132
132
  return pulumi.get(self, "resource_type")
133
133
 
@@ -151,7 +151,7 @@ class KafkaNativeAclArgs:
151
151
  @pulumi.getter
152
152
  def host(self) -> Optional[pulumi.Input[str]]:
153
153
  """
154
- The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
154
+ The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
155
155
  """
156
156
  return pulumi.get(self, "host")
157
157
 
@@ -174,14 +174,14 @@ class _KafkaNativeAclState:
174
174
  service_name: Optional[pulumi.Input[str]] = None):
175
175
  """
176
176
  Input properties used for looking up and filtering KafkaNativeAcl resources.
177
- :param pulumi.Input[str] host: The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
178
- :param pulumi.Input[str] operation: The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
177
+ :param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
178
+ :param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
179
179
  :param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
180
- :param pulumi.Input[str] permission_type: The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
181
- :param pulumi.Input[str] principal: Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
180
+ :param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
181
+ :param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
182
182
  :param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
183
- :param pulumi.Input[str] resource_name: The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
184
- :param pulumi.Input[str] resource_type: The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
183
+ :param pulumi.Input[str] resource_name: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
184
+ :param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
185
185
  :param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
186
186
  """
187
187
  if host is not None:
@@ -207,7 +207,7 @@ class _KafkaNativeAclState:
207
207
  @pulumi.getter
208
208
  def host(self) -> Optional[pulumi.Input[str]]:
209
209
  """
210
- The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
210
+ The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
211
211
  """
212
212
  return pulumi.get(self, "host")
213
213
 
@@ -219,7 +219,7 @@ class _KafkaNativeAclState:
219
219
  @pulumi.getter
220
220
  def operation(self) -> Optional[pulumi.Input[str]]:
221
221
  """
222
- The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
222
+ The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
223
223
  """
224
224
  return pulumi.get(self, "operation")
225
225
 
@@ -243,7 +243,7 @@ class _KafkaNativeAclState:
243
243
  @pulumi.getter(name="permissionType")
244
244
  def permission_type(self) -> Optional[pulumi.Input[str]]:
245
245
  """
246
- The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
246
+ Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
247
247
  """
248
248
  return pulumi.get(self, "permission_type")
249
249
 
@@ -255,7 +255,7 @@ class _KafkaNativeAclState:
255
255
  @pulumi.getter
256
256
  def principal(self) -> Optional[pulumi.Input[str]]:
257
257
  """
258
- Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
258
+ Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
259
259
  """
260
260
  return pulumi.get(self, "principal")
261
261
 
@@ -279,7 +279,7 @@ class _KafkaNativeAclState:
279
279
  @pulumi.getter(name="resourceName")
280
280
  def resource_name(self) -> Optional[pulumi.Input[str]]:
281
281
  """
282
- The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
282
+ The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
283
283
  """
284
284
  return pulumi.get(self, "resource_name")
285
285
 
@@ -291,7 +291,7 @@ class _KafkaNativeAclState:
291
291
  @pulumi.getter(name="resourceType")
292
292
  def resource_type(self) -> Optional[pulumi.Input[str]]:
293
293
  """
294
- The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
294
+ The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
295
295
  """
296
296
  return pulumi.get(self, "resource_type")
297
297
 
@@ -328,18 +328,45 @@ class KafkaNativeAcl(pulumi.CustomResource):
328
328
  service_name: Optional[pulumi.Input[str]] = None,
329
329
  __props__=None):
330
330
  """
331
- Manages native acls in [kafka service](https://aiven.io/docs/products/kafka/concepts/acl).
331
+ Creates and manages Kafka-native [access control lists](https://aiven.io/docs/products/kafka/concepts/acl) (ACLs) for an Aiven for Apache Kafka® service. ACLs control access to Kafka topics, consumer groups,
332
+ clusters, and Schema Registry.
333
+
334
+ Kafka-native ACLs provide advanced resource-level access control with fine-grained permissions, including `ALLOW` and `DENY` rules. For simplified topic-level control you can use Aiven ACLs.
335
+
336
+ ## Example Usage
337
+
338
+ ```python
339
+ import pulumi
340
+ import pulumi_aiven as aiven
341
+
342
+ example_acl = aiven.KafkaNativeAcl("example_acl",
343
+ project=example_project["project"],
344
+ service_name=example_kafka["serviceName"],
345
+ resource_type="Topic",
346
+ resource_name_="example-topic",
347
+ principal="User:example-user",
348
+ operation="Read",
349
+ pattern_type="LITERAL",
350
+ permission_type="ALLOW",
351
+ host="198.51.100.0")
352
+ ```
353
+
354
+ ## Import
355
+
356
+ ```sh
357
+ $ pulumi import aiven:index/kafkaNativeAcl:KafkaNativeAcl example_acl PROJECT/SERVICE_NAME/ID
358
+ ```
332
359
 
333
360
  :param str resource_name: The name of the resource.
334
361
  :param pulumi.ResourceOptions opts: Options for the resource.
335
- :param pulumi.Input[str] host: The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
336
- :param pulumi.Input[str] operation: The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
362
+ :param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
363
+ :param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
337
364
  :param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
338
- :param pulumi.Input[str] permission_type: The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
339
- :param pulumi.Input[str] principal: Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
365
+ :param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
366
+ :param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
340
367
  :param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
341
- :param pulumi.Input[str] resource_name_: The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
342
- :param pulumi.Input[str] resource_type: The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
368
+ :param pulumi.Input[str] resource_name_: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
369
+ :param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
343
370
  :param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
344
371
  """
345
372
  ...
@@ -349,7 +376,34 @@ class KafkaNativeAcl(pulumi.CustomResource):
349
376
  args: KafkaNativeAclArgs,
350
377
  opts: Optional[pulumi.ResourceOptions] = None):
351
378
  """
352
- Manages native acls in [kafka service](https://aiven.io/docs/products/kafka/concepts/acl).
379
+ Creates and manages Kafka-native [access control lists](https://aiven.io/docs/products/kafka/concepts/acl) (ACLs) for an Aiven for Apache Kafka® service. ACLs control access to Kafka topics, consumer groups,
380
+ clusters, and Schema Registry.
381
+
382
+ Kafka-native ACLs provide advanced resource-level access control with fine-grained permissions, including `ALLOW` and `DENY` rules. For simplified topic-level control you can use Aiven ACLs.
383
+
384
+ ## Example Usage
385
+
386
+ ```python
387
+ import pulumi
388
+ import pulumi_aiven as aiven
389
+
390
+ example_acl = aiven.KafkaNativeAcl("example_acl",
391
+ project=example_project["project"],
392
+ service_name=example_kafka["serviceName"],
393
+ resource_type="Topic",
394
+ resource_name_="example-topic",
395
+ principal="User:example-user",
396
+ operation="Read",
397
+ pattern_type="LITERAL",
398
+ permission_type="ALLOW",
399
+ host="198.51.100.0")
400
+ ```
401
+
402
+ ## Import
403
+
404
+ ```sh
405
+ $ pulumi import aiven:index/kafkaNativeAcl:KafkaNativeAcl example_acl PROJECT/SERVICE_NAME/ID
406
+ ```
353
407
 
354
408
  :param str resource_name: The name of the resource.
355
409
  :param KafkaNativeAclArgs args: The arguments to use to populate this resource's properties.
@@ -435,14 +489,14 @@ class KafkaNativeAcl(pulumi.CustomResource):
435
489
  :param str resource_name: The unique name of the resulting resource.
436
490
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
437
491
  :param pulumi.ResourceOptions opts: Options for the resource.
438
- :param pulumi.Input[str] host: The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
439
- :param pulumi.Input[str] operation: The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
492
+ :param pulumi.Input[str] host: The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
493
+ :param pulumi.Input[str] operation: The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
440
494
  :param pulumi.Input[str] pattern_type: Resource pattern used to match specified resources. The possible values are `LITERAL` and `PREFIXED`. Changing this property forces recreation of the resource.
441
- :param pulumi.Input[str] permission_type: The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
442
- :param pulumi.Input[str] principal: Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
495
+ :param pulumi.Input[str] permission_type: Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
496
+ :param pulumi.Input[str] principal: Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
443
497
  :param pulumi.Input[str] project: The name of the project this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
444
- :param pulumi.Input[str] resource_name_: The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
445
- :param pulumi.Input[str] resource_type: The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
498
+ :param pulumi.Input[str] resource_name_: The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
499
+ :param pulumi.Input[str] resource_type: The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
446
500
  :param pulumi.Input[str] service_name: The name of the service that this resource belongs to. To set up proper dependencies please refer to this variable as a reference. Changing this property forces recreation of the resource.
447
501
  """
448
502
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
@@ -464,7 +518,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
464
518
  @pulumi.getter
465
519
  def host(self) -> pulumi.Output[Optional[str]]:
466
520
  """
467
- The host or `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
521
+ The IP address from which a principal is allowed or denied access to the resource. Use `*` for all hosts. Maximum length: `256`. Changing this property forces recreation of the resource.
468
522
  """
469
523
  return pulumi.get(self, "host")
470
524
 
@@ -472,7 +526,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
472
526
  @pulumi.getter
473
527
  def operation(self) -> pulumi.Output[str]:
474
528
  """
475
- The operation. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
529
+ The action that a principal is allowed or denied on the Kafka resource. The possible values are `All`, `Alter`, `AlterConfigs`, `ClusterAction`, `Create`, `CreateTokens`, `Delete`, `Describe`, `DescribeConfigs`, `DescribeTokens`, `IdempotentWrite`, `Read` and `Write`. Changing this property forces recreation of the resource.
476
530
  """
477
531
  return pulumi.get(self, "operation")
478
532
 
@@ -488,7 +542,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
488
542
  @pulumi.getter(name="permissionType")
489
543
  def permission_type(self) -> pulumi.Output[str]:
490
544
  """
491
- The permission type. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
545
+ Specifies whether the action is explicitly allowed or denied for the principal on the specified resource. The possible values are `ALLOW` and `DENY`. Changing this property forces recreation of the resource.
492
546
  """
493
547
  return pulumi.get(self, "permission_type")
494
548
 
@@ -496,7 +550,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
496
550
  @pulumi.getter
497
551
  def principal(self) -> pulumi.Output[str]:
498
552
  """
499
- Principal is in type:name' format. Maximum length: `256`. Changing this property forces recreation of the resource.
553
+ Identities in `user:name` format that the permissions apply to. The `name` supports wildcards. Maximum length: `256`. Changing this property forces recreation of the resource.
500
554
  """
501
555
  return pulumi.get(self, "principal")
502
556
 
@@ -512,7 +566,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
512
566
  @pulumi.getter(name="resourceName")
513
567
  def resource_name(self) -> pulumi.Output[str]:
514
568
  """
515
- The kafka resource name. Maximum length: `256`. Changing this property forces recreation of the resource.
569
+ The name of the Kafka resource the permission applies to, such as the topic name or group ID. Maximum length: `256`. Changing this property forces recreation of the resource.
516
570
  """
517
571
  return pulumi.get(self, "resource_name")
518
572
 
@@ -520,7 +574,7 @@ class KafkaNativeAcl(pulumi.CustomResource):
520
574
  @pulumi.getter(name="resourceType")
521
575
  def resource_type(self) -> pulumi.Output[str]:
522
576
  """
523
- The kafka resource type. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
577
+ The type of Kafka resource. The possible values are `Topic`, `Group`, `Cluster`, `TransactionalId`, `DelegationToken` and `User`. Changing this property forces recreation of the resource.
524
578
  """
525
579
  return pulumi.get(self, "resource_type")
526
580
 
@@ -29,7 +29,7 @@ class OrganizationGroupProjectArgs:
29
29
  The set of arguments for constructing a OrganizationGroupProject resource.
30
30
  :param pulumi.Input[str] group_id: The ID of the user group.
31
31
  :param pulumi.Input[str] project: The project that the users in the group are members of.
32
- :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
32
+ :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
33
33
  """
34
34
  pulumi.set(__self__, "group_id", group_id)
35
35
  pulumi.set(__self__, "project", project)
@@ -65,7 +65,7 @@ class OrganizationGroupProjectArgs:
65
65
  @pulumi.getter
66
66
  def role(self) -> pulumi.Input[str]:
67
67
  """
68
- [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
68
+ [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
69
69
  """
70
70
  return pulumi.get(self, "role")
71
71
 
@@ -94,7 +94,7 @@ class _OrganizationGroupProjectState:
94
94
  Input properties used for looking up and filtering OrganizationGroupProject resources.
95
95
  :param pulumi.Input[str] group_id: The ID of the user group.
96
96
  :param pulumi.Input[str] project: The project that the users in the group are members of.
97
- :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
97
+ :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
98
98
  """
99
99
  if group_id is not None:
100
100
  pulumi.set(__self__, "group_id", group_id)
@@ -133,7 +133,7 @@ class _OrganizationGroupProjectState:
133
133
  @pulumi.getter
134
134
  def role(self) -> Optional[pulumi.Input[str]]:
135
135
  """
136
- [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
136
+ [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
137
137
  """
138
138
  return pulumi.get(self, "role")
139
139
 
@@ -201,7 +201,7 @@ class OrganizationGroupProject(pulumi.CustomResource):
201
201
  :param pulumi.ResourceOptions opts: Options for the resource.
202
202
  :param pulumi.Input[str] group_id: The ID of the user group.
203
203
  :param pulumi.Input[str] project: The project that the users in the group are members of.
204
- :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
204
+ :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
205
205
  """
206
206
  ...
207
207
  @overload
@@ -306,7 +306,7 @@ class OrganizationGroupProject(pulumi.CustomResource):
306
306
  :param pulumi.ResourceOptions opts: Options for the resource.
307
307
  :param pulumi.Input[str] group_id: The ID of the user group.
308
308
  :param pulumi.Input[str] project: The project that the users in the group are members of.
309
- :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
309
+ :param pulumi.Input[str] role: [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
310
310
  """
311
311
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
312
312
 
@@ -338,7 +338,7 @@ class OrganizationGroupProject(pulumi.CustomResource):
338
338
  @pulumi.getter
339
339
  def role(self) -> pulumi.Output[str]:
340
340
  """
341
- [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `role:services:maintenance`, `role:services:recover`, `organization:billing:read`, `organization:billing:write`, `organization:audit_logs:read`, `organization:projects:read`, `organization:projects:write`, `organization:users:write`, `organization:permissions:read`, `organization:permissions:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write`, `organization:network:read`, `organization:network:write`, `role:organization:admin` and `service:users:write`.
341
+ [Project-level role](https://aiven.io/docs/platform/reference/project-member-privileges) assigned to all users in the group. The possible values are `admin`, `operator`, `developer`, `read_only`, `project:integrations:read`, `project:integrations:write`, `project:networking:read`, `project:networking:write`, `project:permissions:read`, `service:configuration:write`, `service:logs:read`, `project:services:read`, `project:services:write`, `project:audit_logs:read`, `service:data:write`, `service:secrets:read`, `service:users:write`, `role:services:maintenance`, `role:services:recover`, `organization:audit_logs:read`, `organization:users:write`, `organization:app_users:write`, `organization:groups:write`, `organization:idps:write`, `organization:domains:write` and `role:organization:admin`.
342
342
  """
343
343
  return pulumi.get(self, "role")
344
344
 
@@ -169,7 +169,7 @@ class OrganizationPermission(pulumi.CustomResource):
169
169
  resource_type: Optional[pulumi.Input[str]] = None,
170
170
  __props__=None):
171
171
  """
172
- Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource.
172
+ Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource. Permissions can be granted at the organization, organizational unit, and project level. Unit-level permissions aren't shown in the Aiven Console.
173
173
 
174
174
  ## Example Usage
175
175
 
@@ -177,7 +177,8 @@ class OrganizationPermission(pulumi.CustomResource):
177
177
  import pulumi
178
178
  import pulumi_aiven as aiven
179
179
 
180
- example_permissions = aiven.OrganizationPermission("example_permissions",
180
+ # Grant access to a specific project
181
+ example_project_permissions = aiven.OrganizationPermission("example_project_permissions",
181
182
  organization_id=main["id"],
182
183
  resource_id=example_project["id"],
183
184
  resource_type="project",
@@ -193,13 +194,37 @@ class OrganizationPermission(pulumi.CustomResource):
193
194
  {
194
195
  "permissions": [
195
196
  "project:integrations:write",
196
- "project:networking:read",
197
197
  "developer",
198
198
  ],
199
199
  "principal_id": example_group["groupId"],
200
200
  "principal_type": "user_group",
201
201
  },
202
202
  ])
203
+ # Organization-level permissions
204
+ example_org_permissions = aiven.OrganizationPermission("example_org_permissions",
205
+ organization_id=main["id"],
206
+ resource_id=main["id"],
207
+ resource_type="organization",
208
+ permissions=[
209
+ {
210
+ "permissions": [
211
+ "organization:app_users:write",
212
+ "project:audit_logs:read",
213
+ ],
214
+ "principal_id": "u123a456b7890c",
215
+ "principal_type": "user",
216
+ },
217
+ {
218
+ "permissions": [
219
+ "organization:users:write",
220
+ "organization:groups:write",
221
+ "organization:domains:write",
222
+ "organization:idps:write",
223
+ ],
224
+ "principal_id": example_group_aiven_organization_user_group["groupId"],
225
+ "principal_type": "user_group",
226
+ },
227
+ ])
203
228
  ```
204
229
 
205
230
  ## Import
@@ -222,7 +247,7 @@ class OrganizationPermission(pulumi.CustomResource):
222
247
  args: OrganizationPermissionArgs,
223
248
  opts: Optional[pulumi.ResourceOptions] = None):
224
249
  """
225
- Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource.
250
+ Grants [roles and permissions](https://aiven.io/docs/platform/concepts/permissions) to a principal for a resource. Permissions can be granted at the organization, organizational unit, and project level. Unit-level permissions aren't shown in the Aiven Console.
226
251
 
227
252
  ## Example Usage
228
253
 
@@ -230,7 +255,8 @@ class OrganizationPermission(pulumi.CustomResource):
230
255
  import pulumi
231
256
  import pulumi_aiven as aiven
232
257
 
233
- example_permissions = aiven.OrganizationPermission("example_permissions",
258
+ # Grant access to a specific project
259
+ example_project_permissions = aiven.OrganizationPermission("example_project_permissions",
234
260
  organization_id=main["id"],
235
261
  resource_id=example_project["id"],
236
262
  resource_type="project",
@@ -246,13 +272,37 @@ class OrganizationPermission(pulumi.CustomResource):
246
272
  {
247
273
  "permissions": [
248
274
  "project:integrations:write",
249
- "project:networking:read",
250
275
  "developer",
251
276
  ],
252
277
  "principal_id": example_group["groupId"],
253
278
  "principal_type": "user_group",
254
279
  },
255
280
  ])
281
+ # Organization-level permissions
282
+ example_org_permissions = aiven.OrganizationPermission("example_org_permissions",
283
+ organization_id=main["id"],
284
+ resource_id=main["id"],
285
+ resource_type="organization",
286
+ permissions=[
287
+ {
288
+ "permissions": [
289
+ "organization:app_users:write",
290
+ "project:audit_logs:read",
291
+ ],
292
+ "principal_id": "u123a456b7890c",
293
+ "principal_type": "user",
294
+ },
295
+ {
296
+ "permissions": [
297
+ "organization:users:write",
298
+ "organization:groups:write",
299
+ "organization:domains:write",
300
+ "organization:idps:write",
301
+ ],
302
+ "principal_id": example_group_aiven_organization_user_group["groupId"],
303
+ "principal_type": "user_group",
304
+ },
305
+ ])
256
306
  ```
257
307
 
258
308
  ## Import