chore(update): update schemas (2024-11-14) #1899
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
aiven_influxdb
resource fieldinfluxdb_user_config.private_access.user_backup
: Allow clients to connectto user_backup with a DNS name that always resolves to the service's private IP addresses
aiven_influxdb
resource fieldinfluxdb_user_config.privatelink_access.user_backup
: Enable user_backup.aiven_influxdb
resource fieldinfluxdb_user_config.public_access.user_backup
: Allow clients to connectto user_backup from the public internet for service nodes that are in a project VPC or another type of private network.
aiven_thanos
resource fieldthanos_user_config.receiver_ingesting
: CommonReceive.aiven_thanos
resource fieldthanos_user_config.receiver_routing
: ThanosReceiveRouting.aiven_thanos
resource fieldthanos_user_config.ruler
: ThanosRuler.aiven_thanos
resource fieldthanos_user_config.store
: ThanosStore.aiven_influxdb
datasource fieldinfluxdb_user_config.private_access.user_backup
: Allow clients to connectto user_backup with a DNS name that always resolves to the service's private IP addresses
aiven_influxdb
datasource fieldinfluxdb_user_config.privatelink_access.user_backup
: Enable user_backup.aiven_influxdb
datasource fieldinfluxdb_user_config.public_access.user_backup
: Allow clients to connectto user_backup from the public internet for service nodes that are in a project VPC or another type of private network.
aiven_thanos
datasource fieldthanos_user_config.receiver_ingesting
: CommonReceive.aiven_thanos
datasource fieldthanos_user_config.receiver_routing
: ThanosReceiveRouting.aiven_thanos
datasource fieldthanos_user_config.ruler
: ThanosRuler.aiven_thanos
datasource fieldthanos_user_config.store
: ThanosStore.aiven_account_team_project
resource fieldteam_type
: addorganization:app_users:write
,organization:audit_logs:read
,organization:billing:read
,organization:billing:write
,organization:domains:write
,organization:groups:write
,organization:idps:write
,organization:network:read
,organization:network:write
,organization:permissions:read
,organization:permissions:write
,organization:projects:read
,organization:projects:write
,organization:users:write
,project:services:write
,role:organization:admin
,role:services:maintenance
,role:services:recover
,service:data:write
,service:secrets:read
,service:users:write
, removeservices:maintenance
aiven_opensearch
resource fieldopensearch_user_config.azure_migration.indices
: optional→true
false
aiven_opensearch
resource fieldopensearch_user_config.gcs_migration.indices
: optional→true
false
aiven_opensearch
resource fieldopensearch_user_config.s3_migration.indices
: optional→true
false
aiven_organization_permission
resource fieldpermissions.permissions
: addorganization:app_users:write
,organization:audit_logs:read
,organization:billing:read
,organization:billing:write
,organization:domains:write
,organization:groups:write
,organization:idps:write
,organization:network:read
,organization:network:write
,organization:permissions:read
,organization:permissions:write
,organization:projects:read
,organization:projects:write
,organization:users:write
,project:services:write
,role:organization:admin
,role:services:maintenance
,role:services:recover
,service:data:write
,service:secrets:read
,service:users:write
, removeservices:maintenance
aiven_organization_permission
resource fieldresource_type
: addorganization_unit
,organization
aiven_project_user
resource fieldmember_type
: addorganization:app_users:write
,organization:audit_logs:read
,organization:billing:read
,organization:billing:write
,organization:domains:write
,organization:groups:write
,organization:idps:write
,organization:network:read
,organization:network:write
,organization:permissions:read
,organization:permissions:write
,organization:projects:read
,organization:projects:write
,organization:users:write
,project:services:write
,role:organization:admin
,role:services:maintenance
,role:services:recover
,service:data:write
,service:secrets:read
,service:users:write
, removeservices:maintenance
aiven_account_team_project
datasource fieldteam_type
: addorganization:app_users:write
,organization:audit_logs:read
,organization:billing:read
,organization:billing:write
,organization:domains:write
,organization:groups:write
,organization:idps:write
,organization:network:read
,organization:network:write
,organization:permissions:read
,organization:permissions:write
,organization:projects:read
,organization:projects:write
,organization:users:write
,project:services:write
,role:organization:admin
,role:services:maintenance
,role:services:recover
,service:data:write
,service:secrets:read
,service:users:write
, removeservices:maintenance
aiven_opensearch
datasource fieldopensearch_user_config.azure_migration.indices
: optional→true
false
aiven_opensearch
datasource fieldopensearch_user_config.gcs_migration.indices
: optional→true
false
aiven_opensearch
datasource fieldopensearch_user_config.s3_migration.indices
: optional→true
false
aiven_project_user
datasource fieldmember_type
: addorganization:app_users:write
,organization:audit_logs:read
,organization:billing:read
,organization:billing:write
,organization:domains:write
,organization:groups:write
,organization:idps:write
,organization:network:read
,organization:network:write
,organization:permissions:read
,organization:permissions:write
,organization:projects:read
,organization:projects:write
,organization:users:write
,project:services:write
,role:organization:admin
,role:services:maintenance
,role:services:recover
,service:data:write
,service:secrets:read
,service:users:write
, removeservices:maintenance