Skip to content

Commit 2f31c17

Browse files
authored
Release/v0.11.1 (#97)
* Event gateway update (#96) * Update openapi.yaml * Update CHANGELOG * Regenerate provider * Bump to v0.11.1
1 parent 9d56329 commit 2f31c17

File tree

17 files changed

+121
-88
lines changed

17 files changed

+121
-88
lines changed

.speakeasy/gen.lock

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
lockVersion: 2.0.0
22
id: e3bbe1e9-fe63-436b-a42c-05e3e3f77633
33
management:
4-
docChecksum: 926fef1a969b0cd720f6d482e43b0ba4
4+
docChecksum: 6feeae5c230f7c9270ea910c1a72991c
55
docVersion: 2.0.0
66
speakeasyVersion: 1.602.0
77
generationVersion: 2.681.1
8-
releaseVersion: 0.11.0
9-
configChecksum: bfdd9b7acdffef9635856c9bd870ea83
8+
releaseVersion: 0.11.1
9+
configChecksum: f4bb002e34a3c9bc9fdeca3131642895
1010
features:
1111
terraform:
1212
additionalDependencies: 0.1.0
@@ -3997,7 +3997,7 @@ examples:
39973997
speakeasy-default-list-mesh-control-planes:
39983998
parameters:
39993999
query:
4000-
page[size]: 10
4000+
page[size]: 100
40014001
page[number]: 1
40024002
responses:
40034003
"200":
@@ -5640,7 +5640,7 @@ examples:
56405640
speakeasy-default-list-portals:
56415641
parameters:
56425642
query:
5643-
page[size]: 10
5643+
page[size]: 100
56445644
page[number]: 1
56455645
responses:
56465646
"200":
@@ -5946,10 +5946,10 @@ examples:
59465946
path:
59475947
gatewayId: "9524ec7d-36d9-465d-a8c5-83a3c9390458"
59485948
requestBody:
5949-
application/json: {"name": "<value>", "description": null, "authentication": {"type": "anonymous"}, "insecure_allow_anonymous_virtual_cluster_auth": false, "bootstrap_servers": ["<value 1>", "<value 2>"], "metadata_update_interval_seconds": 60, "labels": {"env": "test"}}
5949+
application/json: {"name": "<value>", "description": null, "authentication": {"type": "anonymous"}, "insecure_allow_anonymous_virtual_cluster_auth": false, "bootstrap_servers": ["<value 1>", "<value 2>"], "tls": {"enabled": true, "insecure_skip_verify": false, "tls_versions": ["tls12", "tls13"]}, "metadata_update_interval_seconds": 60, "labels": {"env": "test"}}
59505950
responses:
59515951
"201":
5952-
application/json: {"id": "d81f0780-2250-4cde-94d5-cacf7e7ba8b3", "name": "<value>", "description": null, "authentication": {"type": "anonymous"}, "insecure_allow_anonymous_virtual_cluster_auth": false, "bootstrap_servers": ["<value 1>"], "metadata_update_interval_seconds": 60, "labels": {"env": "test"}, "created_at": "2022-11-04T20:10:06.927Z", "updated_at": "2022-11-04T20:10:06.927Z"}
5952+
application/json: {"id": "d81f0780-2250-4cde-94d5-cacf7e7ba8b3", "name": "<value>", "description": null, "authentication": {"type": "anonymous"}, "insecure_allow_anonymous_virtual_cluster_auth": false, "bootstrap_servers": ["<value 1>"], "tls": {"enabled": true, "insecure_skip_verify": false, "tls_versions": ["tls12", "tls13"]}, "metadata_update_interval_seconds": 60, "labels": {"env": "test"}, "created_at": "2022-11-04T20:10:06.927Z", "updated_at": "2022-11-04T20:10:06.927Z"}
59535953
"400":
59545954
application/problem+json: {"status": 994884, "title": "<value>", "instance": "<value>", "detail": "<value>", "invalid_parameters": [{"field": "name", "source": "body", "reason": "is a required field"}]}
59555955
"401":
@@ -5964,7 +5964,7 @@ examples:
59645964
backendClusterId: "5ef7f382-5bc5-4c2e-a215-300f045de3da"
59655965
responses:
59665966
"200":
5967-
application/json: {"id": "5d418534-2831-4847-af7c-28c816066b03", "name": "<value>", "description": null, "authentication": {"type": "sasl_plain", "username": "Kenna_Crooks88", "password": "${env['MY_SECRET']}"}, "insecure_allow_anonymous_virtual_cluster_auth": false, "bootstrap_servers": ["<value 1>", "<value 2>", "<value 3>"], "metadata_update_interval_seconds": 60, "labels": {"env": "test"}, "created_at": "2022-11-04T20:10:06.927Z", "updated_at": "2022-11-04T20:10:06.927Z"}
5967+
application/json: {"id": "5d418534-2831-4847-af7c-28c816066b03", "name": "<value>", "description": null, "authentication": {"type": "sasl_plain", "username": "Kenna_Crooks88", "password": "${env['MY_SECRET']}"}, "insecure_allow_anonymous_virtual_cluster_auth": false, "bootstrap_servers": ["<value 1>", "<value 2>", "<value 3>"], "tls": {"enabled": true, "insecure_skip_verify": false, "tls_versions": ["tls12", "tls13"]}, "metadata_update_interval_seconds": 60, "labels": {"env": "test"}, "created_at": "2022-11-04T20:10:06.927Z", "updated_at": "2022-11-04T20:10:06.927Z"}
59685968
"401":
59695969
application/problem+json: {"status": 401, "title": "Unauthorized", "type": "https://httpstatuses.com/401", "instance": "kong:trace:1234567890", "detail": "Invalid credentials"}
59705970
"403":
@@ -5978,10 +5978,10 @@ examples:
59785978
gatewayId: "9524ec7d-36d9-465d-a8c5-83a3c9390458"
59795979
backendClusterId: "ddaa3274-bd11-4dc5-b580-21603cfec6a6"
59805980
requestBody:
5981-
application/json: {"name": "<value>", "description": null, "authentication": {"type": "sasl_plain", "username": "Yasmin66", "password": "${env['MY_SECRET']}"}, "insecure_allow_anonymous_virtual_cluster_auth": false, "bootstrap_servers": ["<value 1>", "<value 2>", "<value 3>"], "metadata_update_interval_seconds": 60, "labels": {"env": "test"}}
5981+
application/json: {"name": "<value>", "description": null, "authentication": {"type": "sasl_plain", "username": "Yasmin66", "password": "${env['MY_SECRET']}"}, "insecure_allow_anonymous_virtual_cluster_auth": false, "bootstrap_servers": ["<value 1>", "<value 2>", "<value 3>"], "tls": {"enabled": false, "insecure_skip_verify": false, "tls_versions": ["tls12", "tls13"]}, "metadata_update_interval_seconds": 60, "labels": {"env": "test"}}
59825982
responses:
59835983
"200":
5984-
application/json: {"id": "ac884d5a-f703-4de9-a51c-860245e22330", "name": "<value>", "description": null, "authentication": {"type": "anonymous"}, "insecure_allow_anonymous_virtual_cluster_auth": false, "bootstrap_servers": ["<value 1>"], "metadata_update_interval_seconds": 60, "labels": {"env": "test"}, "created_at": "2022-11-04T20:10:06.927Z", "updated_at": "2022-11-04T20:10:06.927Z"}
5984+
application/json: {"id": "ac884d5a-f703-4de9-a51c-860245e22330", "name": "<value>", "description": null, "authentication": {"type": "anonymous"}, "insecure_allow_anonymous_virtual_cluster_auth": false, "bootstrap_servers": ["<value 1>"], "tls": {"enabled": false, "insecure_skip_verify": false, "tls_versions": ["tls12", "tls13"]}, "metadata_update_interval_seconds": 60, "labels": {"env": "test"}, "created_at": "2022-11-04T20:10:06.927Z", "updated_at": "2022-11-04T20:10:06.927Z"}
59855985
"400":
59865986
application/problem+json: {"status": 524449, "title": "<value>", "instance": "<value>", "detail": "<value>", "invalid_parameters": []}
59875987
"401":

CHANGELOG.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
# Changelog
22

3+
## 0.11.1
4+
> Released on 2025/10/10
5+
6+
### Features
7+
* Add support for `tls` in `konnect_event_gateway_backend_cluster`
8+
39
## 0.11.0
410
> Released on 2025/10/09
511

docs/index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ terraform {
1717
required_providers {
1818
konnect-beta = {
1919
source = "kong/konnect-beta"
20-
version = "0.11.0"
20+
version = "0.11.1"
2121
}
2222
}
2323
}

docs/resources/event_gateway_backend_cluster.md

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -35,6 +35,7 @@ resource "konnect_event_gateway_backend_cluster" "my_eventgatewaybackendcluster"
3535
name = "...my_name..."
3636
tls = {
3737
ca_bundle = "...my_ca_bundle..."
38+
enabled = false
3839
insecure_skip_verify = false
3940
tls_versions = [
4041
"tls12"
@@ -52,6 +53,7 @@ resource "konnect_event_gateway_backend_cluster" "my_eventgatewaybackendcluster"
5253
- `bootstrap_servers` (List of String) A list of cluster bootstrap servers in the format address:port.
5354
- `gateway_id` (String) The UUID of your Gateway.
5455
- `name` (String) The unique name of the backend cluster.
56+
- `tls` (Attributes) (see [below for nested schema](#nestedatt--tls))
5557

5658
### Optional
5759

@@ -63,7 +65,6 @@ Default: false
6365

6466
Keys must be of length 1-63 characters, and cannot start with "kong", "konnect", "mesh", "kic", or "_".
6567
- `metadata_update_interval_seconds` (Number) The interval at which metadata is updated in seconds. Default: 60
66-
- `tls` (Attributes) (see [below for nested schema](#nestedatt--tls))
6768

6869
### Read-Only
6970

@@ -107,6 +108,10 @@ Optional:
107108
<a id="nestedatt--tls"></a>
108109
### Nested Schema for `tls`
109110

111+
Required:
112+
113+
- `enabled` (Boolean) If true, TLS is enabled for connections to this backend cluster. If false, TLS is explicitly disabled.
114+
110115
Optional:
111116

112117
- `ca_bundle` (String) A template string expression containing a reference to a secret or a literal value

examples/provider/provider.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@ terraform {
22
required_providers {
33
konnect-beta = {
44
source = "kong/konnect-beta"
5-
version = "0.11.0"
5+
version = "0.11.1"
66
}
77
}
88
}

examples/resources/konnect_event_gateway_backend_cluster/resource.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@ resource "konnect_event_gateway_backend_cluster" "my_eventgatewaybackendcluster"
2020
name = "...my_name..."
2121
tls = {
2222
ca_bundle = "...my_ca_bundle..."
23+
enabled = false
2324
insecure_skip_verify = false
2425
tls_versions = [
2526
"tls12"

gen.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ generation:
2424
go:
2525
version: 1.24.1
2626
terraform:
27-
version: 0.11.0
27+
version: 0.11.1
2828
additionalDataSources: []
2929
additionalDependencies:
3030
github.com/Kong/shared-speakeasy/customtypes: v0.2.3

go.mod

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -2,6 +2,8 @@ module github.com/kong/terraform-provider-konnect-beta
22

33
go 1.24.1
44

5+
toolchain go1.24.2
6+
57
require (
68
github.com/Kong/shared-speakeasy/customtypes v0.2.3
79
github.com/Kong/shared-speakeasy/hooks/mesh_defaults v0.0.4

internal/provider/eventgatewaybackendcluster_resource.go

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ type EventGatewayBackendClusterResourceModel struct {
5353
Labels map[string]types.String `tfsdk:"labels"`
5454
MetadataUpdateIntervalSeconds types.Int64 `tfsdk:"metadata_update_interval_seconds"`
5555
Name types.String `tfsdk:"name"`
56-
TLS *tfTypes.BackendClusterTLS `tfsdk:"tls"`
56+
TLS tfTypes.BackendClusterTLS `tfsdk:"tls"`
5757
UpdatedAt types.String `tfsdk:"updated_at"`
5858
}
5959

@@ -217,14 +217,17 @@ func (r *EventGatewayBackendClusterResource) Schema(ctx context.Context, req res
217217
},
218218
},
219219
"tls": schema.SingleNestedAttribute{
220-
Computed: true,
221-
Optional: true,
220+
Required: true,
222221
Attributes: map[string]schema.Attribute{
223222
"ca_bundle": schema.StringAttribute{
224223
Computed: true,
225224
Optional: true,
226225
Description: `A template string expression containing a reference to a secret or a literal value`,
227226
},
227+
"enabled": schema.BoolAttribute{
228+
Required: true,
229+
Description: `If true, TLS is enabled for connections to this backend cluster. If false, TLS is explicitly disabled.`,
230+
},
228231
"insecure_skip_verify": schema.BoolAttribute{
229232
Computed: true,
230233
Optional: true,

internal/provider/eventgatewaybackendcluster_resource_sdk.go

Lines changed: 54 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -46,16 +46,12 @@ func (r *EventGatewayBackendClusterResourceModel) RefreshFromSharedBackendCluste
4646
}
4747
r.MetadataUpdateIntervalSeconds = types.Int64PointerValue(resp.MetadataUpdateIntervalSeconds)
4848
r.Name = types.StringValue(resp.Name)
49-
if resp.TLS == nil {
50-
r.TLS = nil
51-
} else {
52-
r.TLS = &tfTypes.BackendClusterTLS{}
53-
r.TLS.CaBundle = types.StringPointerValue(resp.TLS.CaBundle)
54-
r.TLS.InsecureSkipVerify = types.BoolPointerValue(resp.TLS.InsecureSkipVerify)
55-
r.TLS.TLSVersions = make([]types.String, 0, len(resp.TLS.TLSVersions))
56-
for _, v := range resp.TLS.TLSVersions {
57-
r.TLS.TLSVersions = append(r.TLS.TLSVersions, types.StringValue(string(v)))
58-
}
49+
r.TLS.CaBundle = types.StringPointerValue(resp.TLS.CaBundle)
50+
r.TLS.Enabled = types.BoolValue(resp.TLS.Enabled)
51+
r.TLS.InsecureSkipVerify = types.BoolPointerValue(resp.TLS.InsecureSkipVerify)
52+
r.TLS.TLSVersions = make([]types.String, 0, len(resp.TLS.TLSVersions))
53+
for _, v := range resp.TLS.TLSVersions {
54+
r.TLS.TLSVersions = append(r.TLS.TLSVersions, types.StringValue(string(v)))
5955
}
6056
r.UpdatedAt = types.StringValue(typeconvert.TimeToString(resp.UpdatedAt))
6157
}
@@ -213,29 +209,30 @@ func (r *EventGatewayBackendClusterResourceModel) ToSharedCreateBackendClusterRe
213209
for _, bootstrapServersItem := range r.BootstrapServers {
214210
bootstrapServers = append(bootstrapServers, bootstrapServersItem.ValueString())
215211
}
216-
var tls *shared.BackendClusterTLS
217-
if r.TLS != nil {
218-
insecureSkipVerify := new(bool)
219-
if !r.TLS.InsecureSkipVerify.IsUnknown() && !r.TLS.InsecureSkipVerify.IsNull() {
220-
*insecureSkipVerify = r.TLS.InsecureSkipVerify.ValueBool()
221-
} else {
222-
insecureSkipVerify = nil
223-
}
224-
caBundle := new(string)
225-
if !r.TLS.CaBundle.IsUnknown() && !r.TLS.CaBundle.IsNull() {
226-
*caBundle = r.TLS.CaBundle.ValueString()
227-
} else {
228-
caBundle = nil
229-
}
230-
tlsVersions := make([]shared.TLSVersions, 0, len(r.TLS.TLSVersions))
231-
for _, tlsVersionsItem := range r.TLS.TLSVersions {
232-
tlsVersions = append(tlsVersions, shared.TLSVersions(tlsVersionsItem.ValueString()))
233-
}
234-
tls = &shared.BackendClusterTLS{
235-
InsecureSkipVerify: insecureSkipVerify,
236-
CaBundle: caBundle,
237-
TLSVersions: tlsVersions,
238-
}
212+
var enabled bool
213+
enabled = r.TLS.Enabled.ValueBool()
214+
215+
insecureSkipVerify := new(bool)
216+
if !r.TLS.InsecureSkipVerify.IsUnknown() && !r.TLS.InsecureSkipVerify.IsNull() {
217+
*insecureSkipVerify = r.TLS.InsecureSkipVerify.ValueBool()
218+
} else {
219+
insecureSkipVerify = nil
220+
}
221+
caBundle := new(string)
222+
if !r.TLS.CaBundle.IsUnknown() && !r.TLS.CaBundle.IsNull() {
223+
*caBundle = r.TLS.CaBundle.ValueString()
224+
} else {
225+
caBundle = nil
226+
}
227+
tlsVersions := make([]shared.TLSVersions, 0, len(r.TLS.TLSVersions))
228+
for _, tlsVersionsItem := range r.TLS.TLSVersions {
229+
tlsVersions = append(tlsVersions, shared.TLSVersions(tlsVersionsItem.ValueString()))
230+
}
231+
tls := shared.BackendClusterTLS{
232+
Enabled: enabled,
233+
InsecureSkipVerify: insecureSkipVerify,
234+
CaBundle: caBundle,
235+
TLSVersions: tlsVersions,
239236
}
240237
metadataUpdateIntervalSeconds := new(int64)
241238
if !r.MetadataUpdateIntervalSeconds.IsUnknown() && !r.MetadataUpdateIntervalSeconds.IsNull() {
@@ -337,29 +334,30 @@ func (r *EventGatewayBackendClusterResourceModel) ToSharedUpdateBackendClusterRe
337334
for _, bootstrapServersItem := range r.BootstrapServers {
338335
bootstrapServers = append(bootstrapServers, bootstrapServersItem.ValueString())
339336
}
340-
var tls *shared.BackendClusterTLS
341-
if r.TLS != nil {
342-
insecureSkipVerify := new(bool)
343-
if !r.TLS.InsecureSkipVerify.IsUnknown() && !r.TLS.InsecureSkipVerify.IsNull() {
344-
*insecureSkipVerify = r.TLS.InsecureSkipVerify.ValueBool()
345-
} else {
346-
insecureSkipVerify = nil
347-
}
348-
caBundle := new(string)
349-
if !r.TLS.CaBundle.IsUnknown() && !r.TLS.CaBundle.IsNull() {
350-
*caBundle = r.TLS.CaBundle.ValueString()
351-
} else {
352-
caBundle = nil
353-
}
354-
tlsVersions := make([]shared.TLSVersions, 0, len(r.TLS.TLSVersions))
355-
for _, tlsVersionsItem := range r.TLS.TLSVersions {
356-
tlsVersions = append(tlsVersions, shared.TLSVersions(tlsVersionsItem.ValueString()))
357-
}
358-
tls = &shared.BackendClusterTLS{
359-
InsecureSkipVerify: insecureSkipVerify,
360-
CaBundle: caBundle,
361-
TLSVersions: tlsVersions,
362-
}
337+
var enabled bool
338+
enabled = r.TLS.Enabled.ValueBool()
339+
340+
insecureSkipVerify := new(bool)
341+
if !r.TLS.InsecureSkipVerify.IsUnknown() && !r.TLS.InsecureSkipVerify.IsNull() {
342+
*insecureSkipVerify = r.TLS.InsecureSkipVerify.ValueBool()
343+
} else {
344+
insecureSkipVerify = nil
345+
}
346+
caBundle := new(string)
347+
if !r.TLS.CaBundle.IsUnknown() && !r.TLS.CaBundle.IsNull() {
348+
*caBundle = r.TLS.CaBundle.ValueString()
349+
} else {
350+
caBundle = nil
351+
}
352+
tlsVersions := make([]shared.TLSVersions, 0, len(r.TLS.TLSVersions))
353+
for _, tlsVersionsItem := range r.TLS.TLSVersions {
354+
tlsVersions = append(tlsVersions, shared.TLSVersions(tlsVersionsItem.ValueString()))
355+
}
356+
tls := shared.BackendClusterTLS{
357+
Enabled: enabled,
358+
InsecureSkipVerify: insecureSkipVerify,
359+
CaBundle: caBundle,
360+
TLSVersions: tlsVersions,
363361
}
364362
metadataUpdateIntervalSeconds := new(int64)
365363
if !r.MetadataUpdateIntervalSeconds.IsUnknown() && !r.MetadataUpdateIntervalSeconds.IsNull() {

0 commit comments

Comments
 (0)