@pulumi/aws 6.13.0 → 6.13.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (75) hide show
  1. package/README.md +4 -4
  2. package/apigateway/basePathMapping.d.ts +3 -3
  3. package/apigateway/basePathMapping.js +3 -3
  4. package/apigateway/domainName.d.ts +3 -3
  5. package/apigateway/domainName.js +3 -3
  6. package/appsync/function.d.ts +1 -1
  7. package/appsync/function.js +1 -1
  8. package/appsync/resolver.d.ts +1 -1
  9. package/appsync/resolver.js +1 -1
  10. package/cloudfront/fieldLevelEncryptionProfile.d.ts +1 -1
  11. package/cloudfront/fieldLevelEncryptionProfile.js +1 -1
  12. package/cloudfront/function.d.ts +1 -1
  13. package/cloudfront/function.js +1 -1
  14. package/cloudfront/keyGroup.d.ts +1 -1
  15. package/cloudfront/keyGroup.js +1 -1
  16. package/cloudfront/publicKey.d.ts +1 -1
  17. package/cloudfront/publicKey.js +1 -1
  18. package/cognito/identityPool.d.ts +1 -1
  19. package/cognito/identityPool.js +1 -1
  20. package/ecs/taskDefinition.d.ts +4 -4
  21. package/ecs/taskDefinition.js +4 -4
  22. package/elasticsearch/domainSamlOptions.d.ts +1 -1
  23. package/elasticsearch/domainSamlOptions.js +1 -1
  24. package/elb/loadBalancerBackendServerPolicy.d.ts +1 -1
  25. package/elb/loadBalancerBackendServerPolicy.js +1 -1
  26. package/elb/loadBalancerPolicy.d.ts +1 -1
  27. package/elb/loadBalancerPolicy.js +1 -1
  28. package/iam/samlProvider.d.ts +1 -1
  29. package/iam/samlProvider.js +1 -1
  30. package/iam/serverCertificate.d.ts +4 -4
  31. package/iam/serverCertificate.js +4 -4
  32. package/iam/signingCertificate.d.ts +1 -1
  33. package/iam/signingCertificate.js +1 -1
  34. package/iot/authorizer.d.ts +1 -1
  35. package/iot/authorizer.js +1 -1
  36. package/iot/certificate.d.ts +2 -2
  37. package/iot/certificate.js +2 -2
  38. package/iot/policyAttachment.d.ts +1 -1
  39. package/iot/policyAttachment.js +1 -1
  40. package/iot/thingPrincipalAttachment.d.ts +1 -1
  41. package/iot/thingPrincipalAttachment.js +1 -1
  42. package/ivs/playbackKeyPair.d.ts +1 -1
  43. package/ivs/playbackKeyPair.js +1 -1
  44. package/kms/customKeyStore.d.ts +1 -1
  45. package/kms/customKeyStore.js +1 -1
  46. package/lightsail/keyPair.d.ts +1 -1
  47. package/lightsail/keyPair.js +1 -1
  48. package/networkfirewall/ruleGroup.d.ts +2 -2
  49. package/networkfirewall/ruleGroup.js +2 -2
  50. package/opensearch/domainSamlOptions.d.ts +1 -1
  51. package/opensearch/domainSamlOptions.js +1 -1
  52. package/opsworks/application.d.ts +2 -2
  53. package/opsworks/application.js +2 -2
  54. package/package.json +1 -1
  55. package/pinpoint/apnsChannel.d.ts +2 -2
  56. package/pinpoint/apnsChannel.js +2 -2
  57. package/pinpoint/apnsSandboxChannel.d.ts +2 -2
  58. package/pinpoint/apnsSandboxChannel.js +2 -2
  59. package/pinpoint/apnsVoipChannel.d.ts +2 -2
  60. package/pinpoint/apnsVoipChannel.js +2 -2
  61. package/pinpoint/apnsVoipSandboxChannel.d.ts +2 -2
  62. package/pinpoint/apnsVoipSandboxChannel.js +2 -2
  63. package/s3/bucket.d.ts +1 -1
  64. package/s3/bucket.js +1 -1
  65. package/sagemaker/humanTaskUI.d.ts +1 -1
  66. package/sagemaker/humanTaskUI.js +1 -1
  67. package/transfer/certificate.d.ts +3 -3
  68. package/transfer/certificate.js +3 -3
  69. package/utilities.d.ts +4 -0
  70. package/utilities.js +33 -1
  71. package/utilities.js.map +1 -1
  72. package/worklink/fleet.d.ts +1 -1
  73. package/worklink/fleet.js +1 -1
  74. package/worklink/websiteCertificateAuthorityAssociation.d.ts +1 -1
  75. package/worklink/websiteCertificateAuthorityAssociation.js +1 -1
package/README.md CHANGED
@@ -76,8 +76,9 @@ The following configuration points are available:
76
76
  - `aws:secretKey` - (Optional) This is the AWS secret key. It can also be sourced from the
77
77
  `AWS_SECRET_ACCESS_KEY` environment variable, or via a shared credentials file if `aws:profile` is specified.
78
78
  - `aws:profile` - (Optional) This is the AWS profile name as set in the shared credentials file.
79
- - `aws:sharedCredentialsFile` - (Optional) This is the path to the shared credentials file. If this is not set and
80
- `aws:profile` is specified, `~/.aws/credentials` will be used.
79
+ - `aws:sharedCredentialsFiles` - (Optional) List of paths to the shared credentials file. If not set and a profile
80
+ is used, the default value is [~/.aws/credentials]. A single value can also be set with the
81
+ `AWS_SHARED_CREDENTIALS_FILE` environment variable.
81
82
  - `aws:token` - (Optional) Session token for validating temporary credentials. Typically provided after successful
82
83
  identity federation or Multi-Factor Authentication (MFA) login. With MFA login, this is the session token provided
83
84
  afterward, not the 6 digit MFA code used to get temporary credentials. It can also be sourced from the
@@ -99,11 +100,10 @@ The following configuration points are available:
99
100
  `tags`: Map of assume role session tags.
100
101
  - `aws:insecure` - (Optional) Explicitly allow the provider to perform "insecure" SSL requests. If omitted, the default value is `false`.
101
102
  - `aws:skipCredentialsValidation` - (Optional) Skip the credentials validation via the STS API. Useful for AWS API implementations that do not have STS available or implemented. Default value is `false`. Can be set via the environment variable `AWS_SKIP_CREDENTIALS_VALIDATION`.
102
- - `aws:skipGetEc2Platforms` - (Optional) Skip getting the supported EC2 platforms. Used by users that don't have ec2:DescribeAccountAttributes permissions. Default value is `true`.
103
103
  - `aws:skipRegionValidation` - (Optional) Skip validation of provided region name. Useful for AWS-like implementations that use their own region names or to bypass the validation for regions that aren't publicly available yet. Default value is `true`.
104
104
  - `aws:skipRequestionAccountId` - (Optional) Skip requesting the account ID. Useful for AWS API implementations that do not have the IAM, STS API, or metadata API. Default value is `false`. When specified, the use of ARNs is compromised as there is no accountID available to construct the ARN.
105
105
  - `aws:skipMetadataApiCheck` - (Optional) Skip the AWS Metadata API check. Useful for AWS API implementations that do not have a metadata API endpoint. This provider from authenticating via the Metadata API by default. You may need to use other authentication methods like static credentials, configuration variables, or environment variables. Default is `true`. Can be set via the environment variable `AWS_SKIP_METADATA_API_CHECK`.
106
- - `aws:s3ForcePathStyle` - (Optional) Set this to true to force the request to use path-style addressing, i.e., `http://s3.amazonaws.com/BUCKET/KEY`. By default, the S3 client will use virtual hosted bucket addressing, `http://BUCKET.s3.amazonaws.com/KEY`, when possible. Specific to the Amazon S3 service. Default is `false`.
106
+ - `aws:s3UsePathStyle` - (Optional) Set this to true to force the request to use path-style addressing, i.e., `http://s3.amazonaws.com/BUCKET/KEY`. By default, the S3 client will use virtual hosted bucket addressing, `http://BUCKET.s3.amazonaws.com/KEY`, when possible. Specific to the Amazon S3 service. Default is `false`.
107
107
 
108
108
  ### Authenticating pulumi-aws via EC2 Instance Metadata?
109
109
 
@@ -20,9 +20,9 @@ import { RestApi } from "./index";
20
20
  * const exampleDomainName = new aws.apigateway.DomainName("exampleDomainName", {
21
21
  * domainName: "example.com",
22
22
  * certificateName: "example-api",
23
- * certificateBody: fs.readFileSync(`${path.module}/example.com/example.crt`),
24
- * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`),
25
- * certificatePrivateKey: fs.readFileSync(`${path.module}/example.com/example.key`),
23
+ * certificateBody: fs.readFileSync(`${path.module}/example.com/example.crt`, "utf8"),
24
+ * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`, "utf8"),
25
+ * certificatePrivateKey: fs.readFileSync(`${path.module}/example.com/example.key`, "utf8"),
26
26
  * });
27
27
  * const exampleBasePathMapping = new aws.apigateway.BasePathMapping("exampleBasePathMapping", {
28
28
  * restApi: aws_api_gateway_rest_api.example.id,
@@ -25,9 +25,9 @@ const utilities = require("../utilities");
25
25
  * const exampleDomainName = new aws.apigateway.DomainName("exampleDomainName", {
26
26
  * domainName: "example.com",
27
27
  * certificateName: "example-api",
28
- * certificateBody: fs.readFileSync(`${path.module}/example.com/example.crt`),
29
- * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`),
30
- * certificatePrivateKey: fs.readFileSync(`${path.module}/example.com/example.key`),
28
+ * certificateBody: fs.readFileSync(`${path.module}/example.com/example.crt`, "utf8"),
29
+ * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`, "utf8"),
30
+ * certificatePrivateKey: fs.readFileSync(`${path.module}/example.com/example.key`, "utf8"),
31
31
  * });
32
32
  * const exampleBasePathMapping = new aws.apigateway.BasePathMapping("exampleBasePathMapping", {
33
33
  * restApi: aws_api_gateway_rest_api.example.id,
@@ -63,9 +63,9 @@ import * as outputs from "../types/output";
63
63
  * const exampleDomainName = new aws.apigateway.DomainName("exampleDomainName", {
64
64
  * domainName: "api.example.com",
65
65
  * certificateName: "example-api",
66
- * certificateBody: fs.readFileSync(`${path.module}/example.com/example.crt`),
67
- * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`),
68
- * certificatePrivateKey: fs.readFileSync(`${path.module}/example.com/example.key`),
66
+ * certificateBody: fs.readFileSync(`${path.module}/example.com/example.crt`, "utf8"),
67
+ * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`, "utf8"),
68
+ * certificatePrivateKey: fs.readFileSync(`${path.module}/example.com/example.key`, "utf8"),
69
69
  * });
70
70
  * // Example DNS record using Route53.
71
71
  * // Route53 is not specifically required; any DNS host can be used.
@@ -67,9 +67,9 @@ const utilities = require("../utilities");
67
67
  * const exampleDomainName = new aws.apigateway.DomainName("exampleDomainName", {
68
68
  * domainName: "api.example.com",
69
69
  * certificateName: "example-api",
70
- * certificateBody: fs.readFileSync(`${path.module}/example.com/example.crt`),
71
- * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`),
72
- * certificatePrivateKey: fs.readFileSync(`${path.module}/example.com/example.key`),
70
+ * certificateBody: fs.readFileSync(`${path.module}/example.com/example.crt`, "utf8"),
71
+ * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`, "utf8"),
72
+ * certificatePrivateKey: fs.readFileSync(`${path.module}/example.com/example.key`, "utf8"),
73
73
  * });
74
74
  * // Example DNS record using Route53.
75
75
  * // Route53 is not specifically required; any DNS host can be used.
@@ -71,7 +71,7 @@ import * as outputs from "../types/output";
71
71
  * apiId: aws_appsync_graphql_api.example.id,
72
72
  * dataSource: aws_appsync_datasource.example.name,
73
73
  * name: "example",
74
- * code: fs.readFileSync("some-code-dir"),
74
+ * code: fs.readFileSync("some-code-dir", "utf8"),
75
75
  * runtime: {
76
76
  * name: "APPSYNC_JS",
77
77
  * runtimeVersion: "1.0.0",
@@ -75,7 +75,7 @@ const utilities = require("../utilities");
75
75
  * apiId: aws_appsync_graphql_api.example.id,
76
76
  * dataSource: aws_appsync_datasource.example.name,
77
77
  * name: "example",
78
- * code: fs.readFileSync("some-code-dir"),
78
+ * code: fs.readFileSync("some-code-dir", "utf8"),
79
79
  * runtime: {
80
80
  * name: "APPSYNC_JS",
81
81
  * runtimeVersion: "1.0.0",
@@ -97,7 +97,7 @@ import * as outputs from "../types/output";
97
97
  * apiId: aws_appsync_graphql_api.test.id,
98
98
  * field: "pipelineTest",
99
99
  * kind: "PIPELINE",
100
- * code: fs.readFileSync("some-code-dir"),
100
+ * code: fs.readFileSync("some-code-dir", "utf8"),
101
101
  * runtime: {
102
102
  * name: "APPSYNC_JS",
103
103
  * runtimeVersion: "1.0.0",
@@ -101,7 +101,7 @@ const utilities = require("../utilities");
101
101
  * apiId: aws_appsync_graphql_api.test.id,
102
102
  * field: "pipelineTest",
103
103
  * kind: "PIPELINE",
104
- * code: fs.readFileSync("some-code-dir"),
104
+ * code: fs.readFileSync("some-code-dir", "utf8"),
105
105
  * runtime: {
106
106
  * name: "APPSYNC_JS",
107
107
  * runtimeVersion: "1.0.0",
@@ -13,7 +13,7 @@ import * as outputs from "../types/output";
13
13
  *
14
14
  * const example = new aws.cloudfront.PublicKey("example", {
15
15
  * comment: "test public key",
16
- * encodedKey: fs.readFileSync("public_key.pem"),
16
+ * encodedKey: fs.readFileSync("public_key.pem", "utf8"),
17
17
  * });
18
18
  * const test = new aws.cloudfront.FieldLevelEncryptionProfile("test", {
19
19
  * comment: "test comment",
@@ -17,7 +17,7 @@ const utilities = require("../utilities");
17
17
  *
18
18
  * const example = new aws.cloudfront.PublicKey("example", {
19
19
  * comment: "test public key",
20
- * encodedKey: fs.readFileSync("public_key.pem"),
20
+ * encodedKey: fs.readFileSync("public_key.pem", "utf8"),
21
21
  * });
22
22
  * const test = new aws.cloudfront.FieldLevelEncryptionProfile("test", {
23
23
  * comment: "test comment",
@@ -18,7 +18,7 @@ import * as pulumi from "@pulumi/pulumi";
18
18
  * runtime: "cloudfront-js-1.0",
19
19
  * comment: "my function",
20
20
  * publish: true,
21
- * code: fs.readFileSync(`${path.module}/function.js`),
21
+ * code: fs.readFileSync(`${path.module}/function.js`, "utf8"),
22
22
  * });
23
23
  * ```
24
24
  *
@@ -24,7 +24,7 @@ const utilities = require("../utilities");
24
24
  * runtime: "cloudfront-js-1.0",
25
25
  * comment: "my function",
26
26
  * publish: true,
27
- * code: fs.readFileSync(`${path.module}/function.js`),
27
+ * code: fs.readFileSync(`${path.module}/function.js`, "utf8"),
28
28
  * });
29
29
  * ```
30
30
  *
@@ -11,7 +11,7 @@ import * as pulumi from "@pulumi/pulumi";
11
11
  *
12
12
  * const examplePublicKey = new aws.cloudfront.PublicKey("examplePublicKey", {
13
13
  * comment: "example public key",
14
- * encodedKey: fs.readFileSync("public_key.pem"),
14
+ * encodedKey: fs.readFileSync("public_key.pem", "utf8"),
15
15
  * });
16
16
  * const exampleKeyGroup = new aws.cloudfront.KeyGroup("exampleKeyGroup", {
17
17
  * comment: "example key group",
@@ -17,7 +17,7 @@ const utilities = require("../utilities");
17
17
  *
18
18
  * const examplePublicKey = new aws.cloudfront.PublicKey("examplePublicKey", {
19
19
  * comment: "example public key",
20
- * encodedKey: fs.readFileSync("public_key.pem"),
20
+ * encodedKey: fs.readFileSync("public_key.pem", "utf8"),
21
21
  * });
22
22
  * const exampleKeyGroup = new aws.cloudfront.KeyGroup("exampleKeyGroup", {
23
23
  * comment: "example key group",
@@ -11,7 +11,7 @@ import * as pulumi from "@pulumi/pulumi";
11
11
  *
12
12
  * const example = new aws.cloudfront.PublicKey("example", {
13
13
  * comment: "test public key",
14
- * encodedKey: fs.readFileSync("public_key.pem"),
14
+ * encodedKey: fs.readFileSync("public_key.pem", "utf8"),
15
15
  * });
16
16
  * ```
17
17
  *
@@ -17,7 +17,7 @@ const utilities = require("../utilities");
17
17
  *
18
18
  * const example = new aws.cloudfront.PublicKey("example", {
19
19
  * comment: "test public key",
20
- * encodedKey: fs.readFileSync("public_key.pem"),
20
+ * encodedKey: fs.readFileSync("public_key.pem", "utf8"),
21
21
  * });
22
22
  * ```
23
23
  *
@@ -11,7 +11,7 @@ import * as outputs from "../types/output";
11
11
  * import * as aws from "@pulumi/aws";
12
12
  * import * as fs from "fs";
13
13
  *
14
- * const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml")});
14
+ * const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml", "utf8")});
15
15
  * const main = new aws.cognito.IdentityPool("main", {
16
16
  * identityPoolName: "identity pool",
17
17
  * allowUnauthenticatedIdentities: false,
@@ -15,7 +15,7 @@ const utilities = require("../utilities");
15
15
  * import * as aws from "@pulumi/aws";
16
16
  * import * as fs from "fs";
17
17
  *
18
- * const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml")});
18
+ * const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml", "utf8")});
19
19
  * const main = new aws.cognito.IdentityPool("main", {
20
20
  * identityPoolName: "identity pool",
21
21
  * allowUnauthenticatedIdentities: false,
@@ -56,7 +56,7 @@ import * as outputs from "../types/output";
56
56
  *
57
57
  * const service = new aws.ecs.TaskDefinition("service", {
58
58
  * family: "service",
59
- * containerDefinitions: fs.readFileSync("task-definitions/service.json"),
59
+ * containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
60
60
  * proxyConfiguration: {
61
61
  * type: "APPMESH",
62
62
  * containerName: "applicationContainerName",
@@ -79,7 +79,7 @@ import * as outputs from "../types/output";
79
79
  *
80
80
  * const service = new aws.ecs.TaskDefinition("service", {
81
81
  * family: "service",
82
- * containerDefinitions: fs.readFileSync("task-definitions/service.json"),
82
+ * containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
83
83
  * volumes: [{
84
84
  * name: "service-storage",
85
85
  * dockerVolumeConfiguration: {
@@ -104,7 +104,7 @@ import * as outputs from "../types/output";
104
104
  *
105
105
  * const service = new aws.ecs.TaskDefinition("service", {
106
106
  * family: "service",
107
- * containerDefinitions: fs.readFileSync("task-definitions/service.json"),
107
+ * containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
108
108
  * volumes: [{
109
109
  * name: "service-storage",
110
110
  * efsVolumeConfiguration: {
@@ -136,7 +136,7 @@ import * as outputs from "../types/output";
136
136
  * });
137
137
  * const service = new aws.ecs.TaskDefinition("service", {
138
138
  * family: "service",
139
- * containerDefinitions: fs.readFileSync("task-definitions/service.json"),
139
+ * containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
140
140
  * volumes: [{
141
141
  * name: "service-storage",
142
142
  * fsxWindowsFileServerVolumeConfiguration: {
@@ -60,7 +60,7 @@ const utilities = require("../utilities");
60
60
  *
61
61
  * const service = new aws.ecs.TaskDefinition("service", {
62
62
  * family: "service",
63
- * containerDefinitions: fs.readFileSync("task-definitions/service.json"),
63
+ * containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
64
64
  * proxyConfiguration: {
65
65
  * type: "APPMESH",
66
66
  * containerName: "applicationContainerName",
@@ -83,7 +83,7 @@ const utilities = require("../utilities");
83
83
  *
84
84
  * const service = new aws.ecs.TaskDefinition("service", {
85
85
  * family: "service",
86
- * containerDefinitions: fs.readFileSync("task-definitions/service.json"),
86
+ * containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
87
87
  * volumes: [{
88
88
  * name: "service-storage",
89
89
  * dockerVolumeConfiguration: {
@@ -108,7 +108,7 @@ const utilities = require("../utilities");
108
108
  *
109
109
  * const service = new aws.ecs.TaskDefinition("service", {
110
110
  * family: "service",
111
- * containerDefinitions: fs.readFileSync("task-definitions/service.json"),
111
+ * containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
112
112
  * volumes: [{
113
113
  * name: "service-storage",
114
114
  * efsVolumeConfiguration: {
@@ -140,7 +140,7 @@ const utilities = require("../utilities");
140
140
  * });
141
141
  * const service = new aws.ecs.TaskDefinition("service", {
142
142
  * family: "service",
143
- * containerDefinitions: fs.readFileSync("task-definitions/service.json"),
143
+ * containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
144
144
  * volumes: [{
145
145
  * name: "service-storage",
146
146
  * fsxWindowsFileServerVolumeConfiguration: {
@@ -30,7 +30,7 @@ import * as outputs from "../types/output";
30
30
  * enabled: true,
31
31
  * idp: {
32
32
  * entityId: "https://example.com",
33
- * metadataContent: fs.readFileSync("./saml-metadata.xml"),
33
+ * metadataContent: fs.readFileSync("./saml-metadata.xml", "utf8"),
34
34
  * },
35
35
  * },
36
36
  * });
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
34
34
  * enabled: true,
35
35
  * idp: {
36
36
  * entityId: "https://example.com",
37
- * metadataContent: fs.readFileSync("./saml-metadata.xml"),
37
+ * metadataContent: fs.readFileSync("./saml-metadata.xml", "utf8"),
38
38
  * },
39
39
  * },
40
40
  * });
@@ -28,7 +28,7 @@ import * as pulumi from "@pulumi/pulumi";
28
28
  * policyTypeName: "PublicKeyPolicyType",
29
29
  * policyAttributes: [{
30
30
  * name: "PublicKey",
31
- * value: fs.readFileSync("wu-tang-pubkey"),
31
+ * value: fs.readFileSync("wu-tang-pubkey", "utf8"),
32
32
  * }],
33
33
  * });
34
34
  * const wu_tang_root_ca_backend_auth_policy = new aws.elb.LoadBalancerPolicy("wu-tang-root-ca-backend-auth-policy", {
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
34
34
  * policyTypeName: "PublicKeyPolicyType",
35
35
  * policyAttributes: [{
36
36
  * name: "PublicKey",
37
- * value: fs.readFileSync("wu-tang-pubkey"),
37
+ * value: fs.readFileSync("wu-tang-pubkey", "utf8"),
38
38
  * }],
39
39
  * });
40
40
  * const wu_tang_root_ca_backend_auth_policy = new aws.elb.LoadBalancerPolicy("wu-tang-root-ca-backend-auth-policy", {
@@ -30,7 +30,7 @@ import * as outputs from "../types/output";
30
30
  * policyTypeName: "PublicKeyPolicyType",
31
31
  * policyAttributes: [{
32
32
  * name: "PublicKey",
33
- * value: fs.readFileSync("wu-tang-pubkey"),
33
+ * value: fs.readFileSync("wu-tang-pubkey", "utf8"),
34
34
  * }],
35
35
  * });
36
36
  * const wu_tang_root_ca_backend_auth_policy = new aws.elb.LoadBalancerPolicy("wu-tang-root-ca-backend-auth-policy", {
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
34
34
  * policyTypeName: "PublicKeyPolicyType",
35
35
  * policyAttributes: [{
36
36
  * name: "PublicKey",
37
- * value: fs.readFileSync("wu-tang-pubkey"),
37
+ * value: fs.readFileSync("wu-tang-pubkey", "utf8"),
38
38
  * }],
39
39
  * });
40
40
  * const wu_tang_root_ca_backend_auth_policy = new aws.elb.LoadBalancerPolicy("wu-tang-root-ca-backend-auth-policy", {
@@ -9,7 +9,7 @@ import * as pulumi from "@pulumi/pulumi";
9
9
  * import * as aws from "@pulumi/aws";
10
10
  * import * as fs from "fs";
11
11
  *
12
- * const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml")});
12
+ * const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml", "utf8")});
13
13
  * ```
14
14
  *
15
15
  * ## Import
@@ -15,7 +15,7 @@ const utilities = require("../utilities");
15
15
  * import * as aws from "@pulumi/aws";
16
16
  * import * as fs from "fs";
17
17
  *
18
- * const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml")});
18
+ * const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml", "utf8")});
19
19
  * ```
20
20
  *
21
21
  * ## Import
@@ -21,8 +21,8 @@ import * as pulumi from "@pulumi/pulumi";
21
21
  * import * as fs from "fs";
22
22
  *
23
23
  * const testCert = new aws.iam.ServerCertificate("testCert", {
24
- * certificateBody: fs.readFileSync("self-ca-cert.pem"),
25
- * privateKey: fs.readFileSync("test-key.pem"),
24
+ * certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
25
+ * privateKey: fs.readFileSync("test-key.pem", "utf8"),
26
26
  * });
27
27
  * ```
28
28
  *
@@ -62,8 +62,8 @@ import * as pulumi from "@pulumi/pulumi";
62
62
  *
63
63
  * const testCert = new aws.iam.ServerCertificate("testCert", {
64
64
  * namePrefix: "example-cert",
65
- * certificateBody: fs.readFileSync("self-ca-cert.pem"),
66
- * privateKey: fs.readFileSync("test-key.pem"),
65
+ * certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
66
+ * privateKey: fs.readFileSync("test-key.pem", "utf8"),
67
67
  * });
68
68
  * const ourapp = new aws.elb.LoadBalancer("ourapp", {
69
69
  * availabilityZones: ["us-west-2a"],
@@ -27,8 +27,8 @@ const utilities = require("../utilities");
27
27
  * import * as fs from "fs";
28
28
  *
29
29
  * const testCert = new aws.iam.ServerCertificate("testCert", {
30
- * certificateBody: fs.readFileSync("self-ca-cert.pem"),
31
- * privateKey: fs.readFileSync("test-key.pem"),
30
+ * certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
31
+ * privateKey: fs.readFileSync("test-key.pem", "utf8"),
32
32
  * });
33
33
  * ```
34
34
  *
@@ -68,8 +68,8 @@ const utilities = require("../utilities");
68
68
  *
69
69
  * const testCert = new aws.iam.ServerCertificate("testCert", {
70
70
  * namePrefix: "example-cert",
71
- * certificateBody: fs.readFileSync("self-ca-cert.pem"),
72
- * privateKey: fs.readFileSync("test-key.pem"),
71
+ * certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
72
+ * privateKey: fs.readFileSync("test-key.pem", "utf8"),
73
73
  * });
74
74
  * const ourapp = new aws.elb.LoadBalancer("ourapp", {
75
75
  * availabilityZones: ["us-west-2a"],
@@ -14,7 +14,7 @@ import * as pulumi from "@pulumi/pulumi";
14
14
  *
15
15
  * const testCert = new aws.iam.SigningCertificate("testCert", {
16
16
  * username: "some_test_cert",
17
- * certificateBody: fs.readFileSync("self-ca-cert.pem"),
17
+ * certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
18
18
  * });
19
19
  * ```
20
20
  *
@@ -20,7 +20,7 @@ const utilities = require("../utilities");
20
20
  *
21
21
  * const testCert = new aws.iam.SigningCertificate("testCert", {
22
22
  * username: "some_test_cert",
23
- * certificateBody: fs.readFileSync("self-ca-cert.pem"),
23
+ * certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
24
24
  * });
25
25
  * ```
26
26
  *
@@ -15,7 +15,7 @@ import * as pulumi from "@pulumi/pulumi";
15
15
  * status: "ACTIVE",
16
16
  * tokenKeyName: "Token-Header",
17
17
  * tokenSigningPublicKeys: {
18
- * Key1: fs.readFileSync("test-fixtures/iot-authorizer-signing-key.pem"),
18
+ * Key1: fs.readFileSync("test-fixtures/iot-authorizer-signing-key.pem", "utf8"),
19
19
  * },
20
20
  * });
21
21
  * ```
package/iot/authorizer.js CHANGED
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
21
21
  * status: "ACTIVE",
22
22
  * tokenKeyName: "Token-Header",
23
23
  * tokenSigningPublicKeys: {
24
- * Key1: fs.readFileSync("test-fixtures/iot-authorizer-signing-key.pem"),
24
+ * Key1: fs.readFileSync("test-fixtures/iot-authorizer-signing-key.pem", "utf8"),
25
25
  * },
26
26
  * });
27
27
  * ```
@@ -11,7 +11,7 @@ import * as pulumi from "@pulumi/pulumi";
11
11
  * import * as fs from "fs";
12
12
  *
13
13
  * const cert = new aws.iot.Certificate("cert", {
14
- * csr: fs.readFileSync("/my/csr.pem"),
14
+ * csr: fs.readFileSync("/my/csr.pem", "utf8"),
15
15
  * active: true,
16
16
  * });
17
17
  * ```
@@ -31,7 +31,7 @@ import * as pulumi from "@pulumi/pulumi";
31
31
  * import * as fs from "fs";
32
32
  *
33
33
  * const cert = new aws.iot.Certificate("cert", {
34
- * certificatePem: fs.readFileSync("/my/cert.pem"),
34
+ * certificatePem: fs.readFileSync("/my/cert.pem", "utf8"),
35
35
  * active: true,
36
36
  * });
37
37
  * ```
@@ -17,7 +17,7 @@ const utilities = require("../utilities");
17
17
  * import * as fs from "fs";
18
18
  *
19
19
  * const cert = new aws.iot.Certificate("cert", {
20
- * csr: fs.readFileSync("/my/csr.pem"),
20
+ * csr: fs.readFileSync("/my/csr.pem", "utf8"),
21
21
  * active: true,
22
22
  * });
23
23
  * ```
@@ -37,7 +37,7 @@ const utilities = require("../utilities");
37
37
  * import * as fs from "fs";
38
38
  *
39
39
  * const cert = new aws.iot.Certificate("cert", {
40
- * certificatePem: fs.readFileSync("/my/cert.pem"),
40
+ * certificatePem: fs.readFileSync("/my/cert.pem", "utf8"),
41
41
  * active: true,
42
42
  * });
43
43
  * ```
@@ -20,7 +20,7 @@ import { Policy } from "./index";
20
20
  * });
21
21
  * const pubsubPolicy = new aws.iot.Policy("pubsubPolicy", {policy: pubsubPolicyDocument.then(pubsubPolicyDocument => pubsubPolicyDocument.json)});
22
22
  * const cert = new aws.iot.Certificate("cert", {
23
- * csr: fs.readFileSync("csr.pem"),
23
+ * csr: fs.readFileSync("csr.pem", "utf8"),
24
24
  * active: true,
25
25
  * });
26
26
  * const att = new aws.iot.PolicyAttachment("att", {
@@ -24,7 +24,7 @@ const utilities = require("../utilities");
24
24
  * });
25
25
  * const pubsubPolicy = new aws.iot.Policy("pubsubPolicy", {policy: pubsubPolicyDocument.then(pubsubPolicyDocument => pubsubPolicyDocument.json)});
26
26
  * const cert = new aws.iot.Certificate("cert", {
27
- * csr: fs.readFileSync("csr.pem"),
27
+ * csr: fs.readFileSync("csr.pem", "utf8"),
28
28
  * active: true,
29
29
  * });
30
30
  * const att = new aws.iot.PolicyAttachment("att", {
@@ -12,7 +12,7 @@ import { ARN } from "..";
12
12
  *
13
13
  * const example = new aws.iot.Thing("example", {});
14
14
  * const cert = new aws.iot.Certificate("cert", {
15
- * csr: fs.readFileSync("csr.pem"),
15
+ * csr: fs.readFileSync("csr.pem", "utf8"),
16
16
  * active: true,
17
17
  * });
18
18
  * const att = new aws.iot.ThingPrincipalAttachment("att", {
@@ -17,7 +17,7 @@ const utilities = require("../utilities");
17
17
  *
18
18
  * const example = new aws.iot.Thing("example", {});
19
19
  * const cert = new aws.iot.Certificate("cert", {
20
- * csr: fs.readFileSync("csr.pem"),
20
+ * csr: fs.readFileSync("csr.pem", "utf8"),
21
21
  * active: true,
22
22
  * });
23
23
  * const att = new aws.iot.ThingPrincipalAttachment("att", {
@@ -10,7 +10,7 @@ import * as pulumi from "@pulumi/pulumi";
10
10
  * import * as aws from "@pulumi/aws";
11
11
  * import * as fs from "fs";
12
12
  *
13
- * const example = new aws.ivs.PlaybackKeyPair("example", {publicKey: fs.readFileSync("./public-key.pem")});
13
+ * const example = new aws.ivs.PlaybackKeyPair("example", {publicKey: fs.readFileSync("./public-key.pem", "utf8")});
14
14
  * ```
15
15
  *
16
16
  * ## Import
@@ -16,7 +16,7 @@ const utilities = require("../utilities");
16
16
  * import * as aws from "@pulumi/aws";
17
17
  * import * as fs from "fs";
18
18
  *
19
- * const example = new aws.ivs.PlaybackKeyPair("example", {publicKey: fs.readFileSync("./public-key.pem")});
19
+ * const example = new aws.ivs.PlaybackKeyPair("example", {publicKey: fs.readFileSync("./public-key.pem", "utf8")});
20
20
  * ```
21
21
  *
22
22
  * ## Import
@@ -14,7 +14,7 @@ import * as pulumi from "@pulumi/pulumi";
14
14
  * cloudHsmClusterId: _var.cloud_hsm_cluster_id,
15
15
  * customKeyStoreName: "kms-custom-key-store-test",
16
16
  * keyStorePassword: "noplaintextpasswords1",
17
- * trustAnchorCertificate: fs.readFileSync("anchor-certificate.crt"),
17
+ * trustAnchorCertificate: fs.readFileSync("anchor-certificate.crt", "utf8"),
18
18
  * });
19
19
  * ```
20
20
  *
@@ -20,7 +20,7 @@ const utilities = require("../utilities");
20
20
  * cloudHsmClusterId: _var.cloud_hsm_cluster_id,
21
21
  * customKeyStoreName: "kms-custom-key-store-test",
22
22
  * keyStorePassword: "noplaintextpasswords1",
23
- * trustAnchorCertificate: fs.readFileSync("anchor-certificate.crt"),
23
+ * trustAnchorCertificate: fs.readFileSync("anchor-certificate.crt", "utf8"),
24
24
  * });
25
25
  * ```
26
26
  *
@@ -31,7 +31,7 @@ import * as pulumi from "@pulumi/pulumi";
31
31
  * import * as aws from "@pulumi/aws";
32
32
  * import * as fs from "fs";
33
33
  *
34
- * const lgKeyPair = new aws.lightsail.KeyPair("lgKeyPair", {publicKey: fs.readFileSync("~/.ssh/id_rsa.pub")});
34
+ * const lgKeyPair = new aws.lightsail.KeyPair("lgKeyPair", {publicKey: fs.readFileSync("~/.ssh/id_rsa.pub", "utf8")});
35
35
  * ```
36
36
  *
37
37
  * ## Import
@@ -37,7 +37,7 @@ const utilities = require("../utilities");
37
37
  * import * as aws from "@pulumi/aws";
38
38
  * import * as fs from "fs";
39
39
  *
40
- * const lgKeyPair = new aws.lightsail.KeyPair("lgKeyPair", {publicKey: fs.readFileSync("~/.ssh/id_rsa.pub")});
40
+ * const lgKeyPair = new aws.lightsail.KeyPair("lgKeyPair", {publicKey: fs.readFileSync("~/.ssh/id_rsa.pub", "utf8")});
41
41
  * ```
42
42
  *
43
43
  * ## Import
@@ -39,7 +39,7 @@ import * as outputs from "../types/output";
39
39
  * const example = new aws.networkfirewall.RuleGroup("example", {
40
40
  * capacity: 100,
41
41
  * type: "STATEFUL",
42
- * rules: fs.readFileSync("example.rules"),
42
+ * rules: fs.readFileSync("example.rules", "utf8"),
43
43
  * tags: {
44
44
  * Tag1: "Value1",
45
45
  * Tag2: "Value2",
@@ -87,7 +87,7 @@ import * as outputs from "../types/output";
87
87
  * }],
88
88
  * },
89
89
  * rulesSource: {
90
- * rulesString: fs.readFileSync("suricata_rules_file"),
90
+ * rulesString: fs.readFileSync("suricata_rules_file", "utf8"),
91
91
  * },
92
92
  * },
93
93
  * tags: {
@@ -43,7 +43,7 @@ const utilities = require("../utilities");
43
43
  * const example = new aws.networkfirewall.RuleGroup("example", {
44
44
  * capacity: 100,
45
45
  * type: "STATEFUL",
46
- * rules: fs.readFileSync("example.rules"),
46
+ * rules: fs.readFileSync("example.rules", "utf8"),
47
47
  * tags: {
48
48
  * Tag1: "Value1",
49
49
  * Tag2: "Value2",
@@ -91,7 +91,7 @@ const utilities = require("../utilities");
91
91
  * }],
92
92
  * },
93
93
  * rulesSource: {
94
- * rulesString: fs.readFileSync("suricata_rules_file"),
94
+ * rulesString: fs.readFileSync("suricata_rules_file", "utf8"),
95
95
  * },
96
96
  * },
97
97
  * tags: {
@@ -30,7 +30,7 @@ import * as outputs from "../types/output";
30
30
  * enabled: true,
31
31
  * idp: {
32
32
  * entityId: "https://example.com",
33
- * metadataContent: fs.readFileSync("./saml-metadata.xml"),
33
+ * metadataContent: fs.readFileSync("./saml-metadata.xml", "utf8"),
34
34
  * },
35
35
  * },
36
36
  * });
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
34
34
  * enabled: true,
35
35
  * idp: {
36
36
  * entityId: "https://example.com",
37
- * metadataContent: fs.readFileSync("./saml-metadata.xml"),
37
+ * metadataContent: fs.readFileSync("./saml-metadata.xml", "utf8"),
38
38
  * },
39
39
  * },
40
40
  * });
@@ -32,8 +32,8 @@ import * as outputs from "../types/output";
32
32
  * }],
33
33
  * enableSsl: true,
34
34
  * sslConfigurations: [{
35
- * privateKey: fs.readFileSync("./foobar.key"),
36
- * certificate: fs.readFileSync("./foobar.crt"),
35
+ * privateKey: fs.readFileSync("./foobar.key", "utf8"),
36
+ * certificate: fs.readFileSync("./foobar.crt", "utf8"),
37
37
  * }],
38
38
  * documentRoot: "public",
39
39
  * autoBundleOnDeploy: "true",
@@ -36,8 +36,8 @@ const utilities = require("../utilities");
36
36
  * }],
37
37
  * enableSsl: true,
38
38
  * sslConfigurations: [{
39
- * privateKey: fs.readFileSync("./foobar.key"),
40
- * certificate: fs.readFileSync("./foobar.crt"),
39
+ * privateKey: fs.readFileSync("./foobar.key", "utf8"),
40
+ * certificate: fs.readFileSync("./foobar.crt", "utf8"),
41
41
  * }],
42
42
  * documentRoot: "public",
43
43
  * autoBundleOnDeploy: "true",
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/aws",
3
- "version": "v6.13.0",
3
+ "version": "v6.13.1",
4
4
  "description": "A Pulumi package for creating and managing Amazon Web Services (AWS) cloud resources.",
5
5
  "keywords": [
6
6
  "pulumi",
@@ -13,8 +13,8 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  * const app = new aws.pinpoint.App("app", {});
14
14
  * const apns = new aws.pinpoint.ApnsChannel("apns", {
15
15
  * applicationId: app.applicationId,
16
- * certificate: fs.readFileSync("./certificate.pem"),
17
- * privateKey: fs.readFileSync("./private_key.key"),
16
+ * certificate: fs.readFileSync("./certificate.pem", "utf8"),
17
+ * privateKey: fs.readFileSync("./private_key.key", "utf8"),
18
18
  * });
19
19
  * ```
20
20
  *
@@ -19,8 +19,8 @@ const utilities = require("../utilities");
19
19
  * const app = new aws.pinpoint.App("app", {});
20
20
  * const apns = new aws.pinpoint.ApnsChannel("apns", {
21
21
  * applicationId: app.applicationId,
22
- * certificate: fs.readFileSync("./certificate.pem"),
23
- * privateKey: fs.readFileSync("./private_key.key"),
22
+ * certificate: fs.readFileSync("./certificate.pem", "utf8"),
23
+ * privateKey: fs.readFileSync("./private_key.key", "utf8"),
24
24
  * });
25
25
  * ```
26
26
  *
@@ -13,8 +13,8 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  * const app = new aws.pinpoint.App("app", {});
14
14
  * const apnsSandbox = new aws.pinpoint.ApnsSandboxChannel("apnsSandbox", {
15
15
  * applicationId: app.applicationId,
16
- * certificate: fs.readFileSync("./certificate.pem"),
17
- * privateKey: fs.readFileSync("./private_key.key"),
16
+ * certificate: fs.readFileSync("./certificate.pem", "utf8"),
17
+ * privateKey: fs.readFileSync("./private_key.key", "utf8"),
18
18
  * });
19
19
  * ```
20
20
  *
@@ -19,8 +19,8 @@ const utilities = require("../utilities");
19
19
  * const app = new aws.pinpoint.App("app", {});
20
20
  * const apnsSandbox = new aws.pinpoint.ApnsSandboxChannel("apnsSandbox", {
21
21
  * applicationId: app.applicationId,
22
- * certificate: fs.readFileSync("./certificate.pem"),
23
- * privateKey: fs.readFileSync("./private_key.key"),
22
+ * certificate: fs.readFileSync("./certificate.pem", "utf8"),
23
+ * privateKey: fs.readFileSync("./private_key.key", "utf8"),
24
24
  * });
25
25
  * ```
26
26
  *
@@ -13,8 +13,8 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  * const app = new aws.pinpoint.App("app", {});
14
14
  * const apnsVoip = new aws.pinpoint.ApnsVoipChannel("apnsVoip", {
15
15
  * applicationId: app.applicationId,
16
- * certificate: fs.readFileSync("./certificate.pem"),
17
- * privateKey: fs.readFileSync("./private_key.key"),
16
+ * certificate: fs.readFileSync("./certificate.pem", "utf8"),
17
+ * privateKey: fs.readFileSync("./private_key.key", "utf8"),
18
18
  * });
19
19
  * ```
20
20
  *
@@ -19,8 +19,8 @@ const utilities = require("../utilities");
19
19
  * const app = new aws.pinpoint.App("app", {});
20
20
  * const apnsVoip = new aws.pinpoint.ApnsVoipChannel("apnsVoip", {
21
21
  * applicationId: app.applicationId,
22
- * certificate: fs.readFileSync("./certificate.pem"),
23
- * privateKey: fs.readFileSync("./private_key.key"),
22
+ * certificate: fs.readFileSync("./certificate.pem", "utf8"),
23
+ * privateKey: fs.readFileSync("./private_key.key", "utf8"),
24
24
  * });
25
25
  * ```
26
26
  *
@@ -13,8 +13,8 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  * const app = new aws.pinpoint.App("app", {});
14
14
  * const apnsVoipSandbox = new aws.pinpoint.ApnsVoipSandboxChannel("apnsVoipSandbox", {
15
15
  * applicationId: app.applicationId,
16
- * certificate: fs.readFileSync("./certificate.pem"),
17
- * privateKey: fs.readFileSync("./private_key.key"),
16
+ * certificate: fs.readFileSync("./certificate.pem", "utf8"),
17
+ * privateKey: fs.readFileSync("./private_key.key", "utf8"),
18
18
  * });
19
19
  * ```
20
20
  *
@@ -19,8 +19,8 @@ const utilities = require("../utilities");
19
19
  * const app = new aws.pinpoint.App("app", {});
20
20
  * const apnsVoipSandbox = new aws.pinpoint.ApnsVoipSandboxChannel("apnsVoipSandbox", {
21
21
  * applicationId: app.applicationId,
22
- * certificate: fs.readFileSync("./certificate.pem"),
23
- * privateKey: fs.readFileSync("./private_key.key"),
22
+ * certificate: fs.readFileSync("./certificate.pem", "utf8"),
23
+ * privateKey: fs.readFileSync("./private_key.key", "utf8"),
24
24
  * });
25
25
  * ```
26
26
  *
package/s3/bucket.d.ts CHANGED
@@ -32,7 +32,7 @@ import { PolicyDocument } from "../iam";
32
32
  *
33
33
  * const bucket = new aws.s3.Bucket("bucket", {
34
34
  * acl: "public-read",
35
- * policy: fs.readFileSync("policy.json"),
35
+ * policy: fs.readFileSync("policy.json", "utf8"),
36
36
  * website: {
37
37
  * indexDocument: "index.html",
38
38
  * errorDocument: "error.html",
package/s3/bucket.js CHANGED
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
34
34
  *
35
35
  * const bucket = new aws.s3.Bucket("bucket", {
36
36
  * acl: "public-read",
37
- * policy: fs.readFileSync("policy.json"),
37
+ * policy: fs.readFileSync("policy.json", "utf8"),
38
38
  * website: {
39
39
  * indexDocument: "index.html",
40
40
  * errorDocument: "error.html",
@@ -14,7 +14,7 @@ import * as outputs from "../types/output";
14
14
  * const example = new aws.sagemaker.HumanTaskUI("example", {
15
15
  * humanTaskUiName: "example",
16
16
  * uiTemplate: {
17
- * content: fs.readFileSync("sagemaker-human-task-ui-template.html"),
17
+ * content: fs.readFileSync("sagemaker-human-task-ui-template.html", "utf8"),
18
18
  * },
19
19
  * });
20
20
  * ```
@@ -18,7 +18,7 @@ const utilities = require("../utilities");
18
18
  * const example = new aws.sagemaker.HumanTaskUI("example", {
19
19
  * humanTaskUiName: "example",
20
20
  * uiTemplate: {
21
- * content: fs.readFileSync("sagemaker-human-task-ui-template.html"),
21
+ * content: fs.readFileSync("sagemaker-human-task-ui-template.html", "utf8"),
22
22
  * },
23
23
  * });
24
24
  * ```
@@ -11,9 +11,9 @@ import * as pulumi from "@pulumi/pulumi";
11
11
  * import * as fs from "fs";
12
12
  *
13
13
  * const example = new aws.transfer.Certificate("example", {
14
- * certificate: fs.readFileSync(`${path.module}/example.com/example.crt`),
15
- * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`),
16
- * privateKey: fs.readFileSync(`${path.module}/example.com/example.key`),
14
+ * certificate: fs.readFileSync(`${path.module}/example.com/example.crt`, "utf8"),
15
+ * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`, "utf8"),
16
+ * privateKey: fs.readFileSync(`${path.module}/example.com/example.key`, "utf8"),
17
17
  * description: "example",
18
18
  * usage: "SIGNING",
19
19
  * });
@@ -17,9 +17,9 @@ const utilities = require("../utilities");
17
17
  * import * as fs from "fs";
18
18
  *
19
19
  * const example = new aws.transfer.Certificate("example", {
20
- * certificate: fs.readFileSync(`${path.module}/example.com/example.crt`),
21
- * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`),
22
- * privateKey: fs.readFileSync(`${path.module}/example.com/example.key`),
20
+ * certificate: fs.readFileSync(`${path.module}/example.com/example.crt`, "utf8"),
21
+ * certificateChain: fs.readFileSync(`${path.module}/example.com/ca.crt`, "utf8"),
22
+ * privateKey: fs.readFileSync(`${path.module}/example.com/example.key`, "utf8"),
23
23
  * description: "example",
24
24
  * usage: "SIGNING",
25
25
  * });
package/utilities.d.ts CHANGED
@@ -1,4 +1,8 @@
1
+ import * as pulumi from "@pulumi/pulumi";
1
2
  export declare function getEnv(...vars: string[]): string | undefined;
2
3
  export declare function getEnvBoolean(...vars: string[]): boolean | undefined;
3
4
  export declare function getEnvNumber(...vars: string[]): number | undefined;
4
5
  export declare function getVersion(): string;
6
+ export declare function callAsync<T>(tok: string, props: pulumi.Inputs, res?: pulumi.Resource, opts?: {
7
+ property?: string;
8
+ }): Promise<T>;
package/utilities.js CHANGED
@@ -1,8 +1,18 @@
1
1
  "use strict";
2
2
  // *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
3
  // *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+ var __awaiter = (this && this.__awaiter) || function (thisArg, _arguments, P, generator) {
5
+ function adopt(value) { return value instanceof P ? value : new P(function (resolve) { resolve(value); }); }
6
+ return new (P || (P = Promise))(function (resolve, reject) {
7
+ function fulfilled(value) { try { step(generator.next(value)); } catch (e) { reject(e); } }
8
+ function rejected(value) { try { step(generator["throw"](value)); } catch (e) { reject(e); } }
9
+ function step(result) { result.done ? resolve(result.value) : adopt(result.value).then(fulfilled, rejected); }
10
+ step((generator = generator.apply(thisArg, _arguments || [])).next());
11
+ });
12
+ };
4
13
  Object.defineProperty(exports, "__esModule", { value: true });
5
- exports.lazyLoad = exports.resourceOptsDefaults = exports.getVersion = exports.getEnvNumber = exports.getEnvBoolean = exports.getEnv = void 0;
14
+ exports.callAsync = exports.lazyLoad = exports.resourceOptsDefaults = exports.getVersion = exports.getEnvNumber = exports.getEnvBoolean = exports.getEnv = void 0;
15
+ const runtime = require("@pulumi/pulumi/runtime");
6
16
  function getEnv(...vars) {
7
17
  for (const v of vars) {
8
18
  const value = process.env[v];
@@ -66,4 +76,26 @@ function lazyLoad(exports, props, loadModule) {
66
76
  }
67
77
  }
68
78
  exports.lazyLoad = lazyLoad;
79
+ function callAsync(tok, props, res, opts) {
80
+ return __awaiter(this, void 0, void 0, function* () {
81
+ const o = runtime.call(tok, props, res);
82
+ const value = yield o.promise(true /*withUnknowns*/);
83
+ const isKnown = yield o.isKnown;
84
+ const isSecret = yield o.isSecret;
85
+ const problem = !isKnown ? "an unknown value"
86
+ : isSecret ? "a secret value"
87
+ : undefined;
88
+ // Ingoring o.resources silently. They are typically non-empty, r.f() calls include r as a dependency.
89
+ if (problem) {
90
+ throw new Error(`Plain resource method "${tok}" incorrectly returned ${problem}. ` +
91
+ "This is an error in the provider, please report this to the provider developer.");
92
+ }
93
+ // Extract a single property if requested.
94
+ if (opts && opts.property) {
95
+ return value[opts.property];
96
+ }
97
+ return value;
98
+ });
99
+ }
100
+ exports.callAsync = callAsync;
69
101
  //# sourceMappingURL=utilities.js.map
package/utilities.js.map CHANGED
@@ -1 +1 @@
1
- {"version":3,"file":"utilities.js","sourceRoot":"","sources":["../utilities.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAGjF,SAAgB,MAAM,CAAC,GAAG,IAAc;IACpC,KAAK,MAAM,CAAC,IAAI,IAAI,EAAE;QAClB,MAAM,KAAK,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;QAC7B,IAAI,KAAK,EAAE;YACP,OAAO,KAAK,CAAC;SAChB;KACJ;IACD,OAAO,SAAS,CAAC;AACrB,CAAC;AARD,wBAQC;AAED,SAAgB,aAAa,CAAC,GAAG,IAAc;IAC3C,MAAM,CAAC,GAAG,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC;IAC1B,IAAI,CAAC,KAAK,SAAS,EAAE;QACjB,uGAAuG;QACvG,yDAAyD;QACzD,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,KAAK,SAAS,EAAE;YAC1E,OAAO,IAAI,CAAC;SACf;QACD,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,KAAK,SAAS,EAAE;YAC7E,OAAO,KAAK,CAAC;SAChB;KACJ;IACD,OAAO,SAAS,CAAC;AACrB,CAAC;AAbD,sCAaC;AAED,SAAgB,YAAY,CAAC,GAAG,IAAc;IAC1C,MAAM,CAAC,GAAG,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC;IAC1B,IAAI,CAAC,KAAK,SAAS,EAAE;QACjB,MAAM,CAAC,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;QACxB,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE;YACX,OAAO,CAAC,CAAC;SACZ;KACJ;IACD,OAAO,SAAS,CAAC;AACrB,CAAC;AATD,oCASC;AAED,SAAgB,UAAU;IACtB,IAAI,OAAO,GAAG,OAAO,CAAC,gBAAgB,CAAC,CAAC,OAAO,CAAC;IAChD,6EAA6E;IAC7E,iCAAiC;IACjC,IAAI,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,EAAE;QAC5B,OAAO,GAAG,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;KAC9B;IACD,OAAO,OAAO,CAAC;AACnB,CAAC;AARD,gCAQC;AAED,gBAAgB;AAChB,SAAgB,oBAAoB;IAChC,OAAO,EAAE,OAAO,EAAE,UAAU,EAAE,EAAE,CAAC;AACrC,CAAC;AAFD,oDAEC;AAED,gBAAgB;AAChB,SAAgB,QAAQ,CAAC,OAAY,EAAE,KAAe,EAAE,UAAe;IACnE,KAAK,IAAI,QAAQ,IAAI,KAAK,EAAE;QACxB,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,EAAE;YACrC,UAAU,EAAE,IAAI;YAChB,GAAG,EAAE;gBACD,OAAO,UAAU,EAAE,CAAC,QAAQ,CAAC,CAAC;YAClC,CAAC;SACJ,CAAC,CAAC;KACN;AACL,CAAC;AATD,4BASC"}
1
+ {"version":3,"file":"utilities.js","sourceRoot":"","sources":["../utilities.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;;;;;;;;;;AAGjF,kDAAkD;AAGlD,SAAgB,MAAM,CAAC,GAAG,IAAc;IACpC,KAAK,MAAM,CAAC,IAAI,IAAI,EAAE;QAClB,MAAM,KAAK,GAAG,OAAO,CAAC,GAAG,CAAC,CAAC,CAAC,CAAC;QAC7B,IAAI,KAAK,EAAE;YACP,OAAO,KAAK,CAAC;SAChB;KACJ;IACD,OAAO,SAAS,CAAC;AACrB,CAAC;AARD,wBAQC;AAED,SAAgB,aAAa,CAAC,GAAG,IAAc;IAC3C,MAAM,CAAC,GAAG,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC;IAC1B,IAAI,CAAC,KAAK,SAAS,EAAE;QACjB,uGAAuG;QACvG,yDAAyD;QACzD,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,MAAM,EAAE,MAAM,EAAE,MAAM,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,KAAK,SAAS,EAAE;YAC1E,OAAO,IAAI,CAAC;SACf;QACD,IAAI,CAAC,GAAG,EAAE,GAAG,EAAE,GAAG,EAAE,OAAO,EAAE,OAAO,EAAE,OAAO,CAAC,CAAC,IAAI,CAAC,CAAC,CAAC,EAAE,CAAC,CAAC,KAAK,CAAC,CAAC,KAAK,SAAS,EAAE;YAC7E,OAAO,KAAK,CAAC;SAChB;KACJ;IACD,OAAO,SAAS,CAAC;AACrB,CAAC;AAbD,sCAaC;AAED,SAAgB,YAAY,CAAC,GAAG,IAAc;IAC1C,MAAM,CAAC,GAAG,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC;IAC1B,IAAI,CAAC,KAAK,SAAS,EAAE;QACjB,MAAM,CAAC,GAAG,UAAU,CAAC,CAAC,CAAC,CAAC;QACxB,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,EAAE;YACX,OAAO,CAAC,CAAC;SACZ;KACJ;IACD,OAAO,SAAS,CAAC;AACrB,CAAC;AATD,oCASC;AAED,SAAgB,UAAU;IACtB,IAAI,OAAO,GAAG,OAAO,CAAC,gBAAgB,CAAC,CAAC,OAAO,CAAC;IAChD,6EAA6E;IAC7E,iCAAiC;IACjC,IAAI,OAAO,CAAC,OAAO,CAAC,GAAG,CAAC,KAAK,CAAC,EAAE;QAC5B,OAAO,GAAG,OAAO,CAAC,KAAK,CAAC,CAAC,CAAC,CAAC;KAC9B;IACD,OAAO,OAAO,CAAC;AACnB,CAAC;AARD,gCAQC;AAED,gBAAgB;AAChB,SAAgB,oBAAoB;IAChC,OAAO,EAAE,OAAO,EAAE,UAAU,EAAE,EAAE,CAAC;AACrC,CAAC;AAFD,oDAEC;AAED,gBAAgB;AAChB,SAAgB,QAAQ,CAAC,OAAY,EAAE,KAAe,EAAE,UAAe;IACnE,KAAK,IAAI,QAAQ,IAAI,KAAK,EAAE;QACxB,MAAM,CAAC,cAAc,CAAC,OAAO,EAAE,QAAQ,EAAE;YACrC,UAAU,EAAE,IAAI;YAChB,GAAG,EAAE;gBACD,OAAO,UAAU,EAAE,CAAC,QAAQ,CAAC,CAAC;YAClC,CAAC;SACJ,CAAC,CAAC;KACN;AACL,CAAC;AATD,4BASC;AAED,SAAsB,SAAS,CAC3B,GAAW,EACX,KAAoB,EACpB,GAAqB,EACrB,IAA0B;;QAE1B,MAAM,CAAC,GAAQ,OAAO,CAAC,IAAI,CAAI,GAAG,EAAE,KAAK,EAAE,GAAG,CAAC,CAAC;QAChD,MAAM,KAAK,GAAG,MAAM,CAAC,CAAC,OAAO,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC;QACrD,MAAM,OAAO,GAAG,MAAM,CAAC,CAAC,OAAO,CAAC;QAChC,MAAM,QAAQ,GAAG,MAAM,CAAC,CAAC,QAAQ,CAAC;QAClC,MAAM,OAAO,GACT,CAAC,OAAO,CAAC,CAAC,CAAC,kBAAkB;YAC7B,CAAC,CAAC,QAAQ,CAAC,CAAC,CAAC,gBAAgB;gBAC7B,CAAC,CAAC,SAAS,CAAC;QAChB,sGAAsG;QACtG,IAAI,OAAO,EAAE;YACT,MAAM,IAAI,KAAK,CAAC,0BAA0B,GAAG,0BAA0B,OAAO,IAAI;gBAC9E,iFAAiF,CAAC,CAAC;SAC1F;QACD,0CAA0C;QAC1C,IAAI,IAAI,IAAI,IAAI,CAAC,QAAQ,EAAE;YACvB,OAAO,KAAK,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC;SAC/B;QACD,OAAO,KAAK,CAAC;IACjB,CAAC;CAAA;AAxBD,8BAwBC"}
@@ -35,7 +35,7 @@ import * as outputs from "../types/output";
35
35
  *
36
36
  * const test = new aws.worklink.Fleet("test", {identityProvider: {
37
37
  * type: "SAML",
38
- * samlMetadata: fs.readFileSync("saml-metadata.xml"),
38
+ * samlMetadata: fs.readFileSync("saml-metadata.xml", "utf8"),
39
39
  * }});
40
40
  * ```
41
41
  *
package/worklink/fleet.js CHANGED
@@ -39,7 +39,7 @@ const utilities = require("../utilities");
39
39
  *
40
40
  * const test = new aws.worklink.Fleet("test", {identityProvider: {
41
41
  * type: "SAML",
42
- * samlMetadata: fs.readFileSync("saml-metadata.xml"),
42
+ * samlMetadata: fs.readFileSync("saml-metadata.xml", "utf8"),
43
43
  * }});
44
44
  * ```
45
45
  *
@@ -10,7 +10,7 @@ import * as pulumi from "@pulumi/pulumi";
10
10
  * const example = new aws.worklink.Fleet("example", {});
11
11
  * const test = new aws.worklink.WebsiteCertificateAuthorityAssociation("test", {
12
12
  * fleetArn: aws_worklink_fleet.test.arn,
13
- * certificate: fs.readFileSync("certificate.pem"),
13
+ * certificate: fs.readFileSync("certificate.pem", "utf8"),
14
14
  * });
15
15
  * ```
16
16
  *
@@ -16,7 +16,7 @@ const utilities = require("../utilities");
16
16
  * const example = new aws.worklink.Fleet("example", {});
17
17
  * const test = new aws.worklink.WebsiteCertificateAuthorityAssociation("test", {
18
18
  * fleetArn: aws_worklink_fleet.test.arn,
19
- * certificate: fs.readFileSync("certificate.pem"),
19
+ * certificate: fs.readFileSync("certificate.pem", "utf8"),
20
20
  * });
21
21
  * ```
22
22
  *