@pulumi/aws 6.13.0 → 6.13.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +4 -4
- package/apigateway/basePathMapping.d.ts +3 -3
- package/apigateway/basePathMapping.js +3 -3
- package/apigateway/domainName.d.ts +3 -3
- package/apigateway/domainName.js +3 -3
- package/appsync/function.d.ts +1 -1
- package/appsync/function.js +1 -1
- package/appsync/resolver.d.ts +1 -1
- package/appsync/resolver.js +1 -1
- package/cloudfront/fieldLevelEncryptionProfile.d.ts +1 -1
- package/cloudfront/fieldLevelEncryptionProfile.js +1 -1
- package/cloudfront/function.d.ts +1 -1
- package/cloudfront/function.js +1 -1
- package/cloudfront/keyGroup.d.ts +1 -1
- package/cloudfront/keyGroup.js +1 -1
- package/cloudfront/publicKey.d.ts +1 -1
- package/cloudfront/publicKey.js +1 -1
- package/cognito/identityPool.d.ts +1 -1
- package/cognito/identityPool.js +1 -1
- package/docdb/elasticCluster.d.ts +217 -0
- package/docdb/elasticCluster.js +107 -0
- package/docdb/elasticCluster.js.map +1 -0
- package/docdb/index.d.ts +3 -0
- package/docdb/index.js +6 -1
- package/docdb/index.js.map +1 -1
- package/ecs/taskDefinition.d.ts +4 -4
- package/ecs/taskDefinition.js +4 -4
- package/eks/index.d.ts +3 -0
- package/eks/index.js +6 -1
- package/eks/index.js.map +1 -1
- package/eks/podIdentityAssociation.d.ts +192 -0
- package/eks/podIdentityAssociation.js +129 -0
- package/eks/podIdentityAssociation.js.map +1 -0
- package/elasticsearch/domainSamlOptions.d.ts +1 -1
- package/elasticsearch/domainSamlOptions.js +1 -1
- package/elb/loadBalancerBackendServerPolicy.d.ts +1 -1
- package/elb/loadBalancerBackendServerPolicy.js +1 -1
- package/elb/loadBalancerPolicy.d.ts +1 -1
- package/elb/loadBalancerPolicy.js +1 -1
- package/iam/samlProvider.d.ts +1 -1
- package/iam/samlProvider.js +1 -1
- package/iam/serverCertificate.d.ts +4 -4
- package/iam/serverCertificate.js +4 -4
- package/iam/signingCertificate.d.ts +1 -1
- package/iam/signingCertificate.js +1 -1
- package/iot/authorizer.d.ts +1 -1
- package/iot/authorizer.js +1 -1
- package/iot/certificate.d.ts +2 -2
- package/iot/certificate.js +2 -2
- package/iot/policyAttachment.d.ts +1 -1
- package/iot/policyAttachment.js +1 -1
- package/iot/thingPrincipalAttachment.d.ts +1 -1
- package/iot/thingPrincipalAttachment.js +1 -1
- package/ivs/playbackKeyPair.d.ts +1 -1
- package/ivs/playbackKeyPair.js +1 -1
- package/kms/customKeyStore.d.ts +1 -1
- package/kms/customKeyStore.js +1 -1
- package/lightsail/keyPair.d.ts +1 -1
- package/lightsail/keyPair.js +1 -1
- package/networkfirewall/ruleGroup.d.ts +2 -2
- package/networkfirewall/ruleGroup.js +2 -2
- package/opensearch/domainSamlOptions.d.ts +1 -1
- package/opensearch/domainSamlOptions.js +1 -1
- package/opsworks/application.d.ts +2 -2
- package/opsworks/application.js +2 -2
- package/package.json +1 -1
- package/pinpoint/apnsChannel.d.ts +2 -2
- package/pinpoint/apnsChannel.js +2 -2
- package/pinpoint/apnsSandboxChannel.d.ts +2 -2
- package/pinpoint/apnsSandboxChannel.js +2 -2
- package/pinpoint/apnsVoipChannel.d.ts +2 -2
- package/pinpoint/apnsVoipChannel.js +2 -2
- package/pinpoint/apnsVoipSandboxChannel.d.ts +2 -2
- package/pinpoint/apnsVoipSandboxChannel.js +2 -2
- package/s3/bucket.d.ts +1 -1
- package/s3/bucket.js +1 -1
- package/s3control/accessGrant.d.ts +198 -0
- package/s3control/accessGrant.js +116 -0
- package/s3control/accessGrant.js.map +1 -0
- package/s3control/accessGrantsInstance.d.ts +139 -0
- package/s3control/accessGrantsInstance.js +93 -0
- package/s3control/accessGrantsInstance.js.map +1 -0
- package/s3control/accessGrantsInstanceResourcePolicy.d.ts +28 -0
- package/s3control/accessGrantsInstanceResourcePolicy.js +28 -0
- package/s3control/accessGrantsInstanceResourcePolicy.js.map +1 -1
- package/s3control/accessGrantsLocation.d.ts +146 -0
- package/s3control/accessGrantsLocation.js +99 -0
- package/s3control/accessGrantsLocation.js.map +1 -0
- package/s3control/index.d.ts +9 -0
- package/s3control/index.js +16 -1
- package/s3control/index.js.map +1 -1
- package/sagemaker/humanTaskUI.d.ts +1 -1
- package/sagemaker/humanTaskUI.js +1 -1
- package/transfer/certificate.d.ts +3 -3
- package/transfer/certificate.js +3 -3
- package/types/input.d.ts +21 -0
- package/types/output.d.ts +21 -0
- package/utilities.d.ts +4 -0
- package/utilities.js +33 -1
- package/utilities.js.map +1 -1
- package/worklink/fleet.d.ts +1 -1
- package/worklink/fleet.js +1 -1
- package/worklink/websiteCertificateAuthorityAssociation.d.ts +1 -1
- package/worklink/websiteCertificateAuthorityAssociation.js +1 -1
package/ecs/taskDefinition.d.ts
CHANGED
|
@@ -56,7 +56,7 @@ import * as outputs from "../types/output";
|
|
|
56
56
|
*
|
|
57
57
|
* const service = new aws.ecs.TaskDefinition("service", {
|
|
58
58
|
* family: "service",
|
|
59
|
-
* containerDefinitions: fs.readFileSync("task-definitions/service.json"),
|
|
59
|
+
* containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
|
|
60
60
|
* proxyConfiguration: {
|
|
61
61
|
* type: "APPMESH",
|
|
62
62
|
* containerName: "applicationContainerName",
|
|
@@ -79,7 +79,7 @@ import * as outputs from "../types/output";
|
|
|
79
79
|
*
|
|
80
80
|
* const service = new aws.ecs.TaskDefinition("service", {
|
|
81
81
|
* family: "service",
|
|
82
|
-
* containerDefinitions: fs.readFileSync("task-definitions/service.json"),
|
|
82
|
+
* containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
|
|
83
83
|
* volumes: [{
|
|
84
84
|
* name: "service-storage",
|
|
85
85
|
* dockerVolumeConfiguration: {
|
|
@@ -104,7 +104,7 @@ import * as outputs from "../types/output";
|
|
|
104
104
|
*
|
|
105
105
|
* const service = new aws.ecs.TaskDefinition("service", {
|
|
106
106
|
* family: "service",
|
|
107
|
-
* containerDefinitions: fs.readFileSync("task-definitions/service.json"),
|
|
107
|
+
* containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
|
|
108
108
|
* volumes: [{
|
|
109
109
|
* name: "service-storage",
|
|
110
110
|
* efsVolumeConfiguration: {
|
|
@@ -136,7 +136,7 @@ import * as outputs from "../types/output";
|
|
|
136
136
|
* });
|
|
137
137
|
* const service = new aws.ecs.TaskDefinition("service", {
|
|
138
138
|
* family: "service",
|
|
139
|
-
* containerDefinitions: fs.readFileSync("task-definitions/service.json"),
|
|
139
|
+
* containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
|
|
140
140
|
* volumes: [{
|
|
141
141
|
* name: "service-storage",
|
|
142
142
|
* fsxWindowsFileServerVolumeConfiguration: {
|
package/ecs/taskDefinition.js
CHANGED
|
@@ -60,7 +60,7 @@ const utilities = require("../utilities");
|
|
|
60
60
|
*
|
|
61
61
|
* const service = new aws.ecs.TaskDefinition("service", {
|
|
62
62
|
* family: "service",
|
|
63
|
-
* containerDefinitions: fs.readFileSync("task-definitions/service.json"),
|
|
63
|
+
* containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
|
|
64
64
|
* proxyConfiguration: {
|
|
65
65
|
* type: "APPMESH",
|
|
66
66
|
* containerName: "applicationContainerName",
|
|
@@ -83,7 +83,7 @@ const utilities = require("../utilities");
|
|
|
83
83
|
*
|
|
84
84
|
* const service = new aws.ecs.TaskDefinition("service", {
|
|
85
85
|
* family: "service",
|
|
86
|
-
* containerDefinitions: fs.readFileSync("task-definitions/service.json"),
|
|
86
|
+
* containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
|
|
87
87
|
* volumes: [{
|
|
88
88
|
* name: "service-storage",
|
|
89
89
|
* dockerVolumeConfiguration: {
|
|
@@ -108,7 +108,7 @@ const utilities = require("../utilities");
|
|
|
108
108
|
*
|
|
109
109
|
* const service = new aws.ecs.TaskDefinition("service", {
|
|
110
110
|
* family: "service",
|
|
111
|
-
* containerDefinitions: fs.readFileSync("task-definitions/service.json"),
|
|
111
|
+
* containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
|
|
112
112
|
* volumes: [{
|
|
113
113
|
* name: "service-storage",
|
|
114
114
|
* efsVolumeConfiguration: {
|
|
@@ -140,7 +140,7 @@ const utilities = require("../utilities");
|
|
|
140
140
|
* });
|
|
141
141
|
* const service = new aws.ecs.TaskDefinition("service", {
|
|
142
142
|
* family: "service",
|
|
143
|
-
* containerDefinitions: fs.readFileSync("task-definitions/service.json"),
|
|
143
|
+
* containerDefinitions: fs.readFileSync("task-definitions/service.json", "utf8"),
|
|
144
144
|
* volumes: [{
|
|
145
145
|
* name: "service-storage",
|
|
146
146
|
* fsxWindowsFileServerVolumeConfiguration: {
|
package/eks/index.d.ts
CHANGED
|
@@ -34,3 +34,6 @@ export declare const IdentityProviderConfig: typeof import("./identityProviderCo
|
|
|
34
34
|
export { NodeGroupArgs, NodeGroupState } from "./nodeGroup";
|
|
35
35
|
export type NodeGroup = import("./nodeGroup").NodeGroup;
|
|
36
36
|
export declare const NodeGroup: typeof import("./nodeGroup").NodeGroup;
|
|
37
|
+
export { PodIdentityAssociationArgs, PodIdentityAssociationState } from "./podIdentityAssociation";
|
|
38
|
+
export type PodIdentityAssociation = import("./podIdentityAssociation").PodIdentityAssociation;
|
|
39
|
+
export declare const PodIdentityAssociation: typeof import("./podIdentityAssociation").PodIdentityAssociation;
|
package/eks/index.js
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
3
|
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
4
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
-
exports.NodeGroup = exports.IdentityProviderConfig = exports.getNodeGroupsOutput = exports.getNodeGroups = exports.getNodeGroupOutput = exports.getNodeGroup = exports.getClustersOutput = exports.getClusters = exports.getClusterAuthOutput = exports.getClusterAuth = exports.getClusterOutput = exports.getCluster = exports.getAddonVersionOutput = exports.getAddonVersion = exports.getAddonOutput = exports.getAddon = exports.FargateProfile = exports.Cluster = exports.Addon = void 0;
|
|
5
|
+
exports.PodIdentityAssociation = exports.NodeGroup = exports.IdentityProviderConfig = exports.getNodeGroupsOutput = exports.getNodeGroups = exports.getNodeGroupOutput = exports.getNodeGroup = exports.getClustersOutput = exports.getClusters = exports.getClusterAuthOutput = exports.getClusterAuth = exports.getClusterOutput = exports.getCluster = exports.getAddonVersionOutput = exports.getAddonVersion = exports.getAddonOutput = exports.getAddon = exports.FargateProfile = exports.Cluster = exports.Addon = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
exports.Addon = null;
|
|
@@ -36,6 +36,8 @@ exports.IdentityProviderConfig = null;
|
|
|
36
36
|
utilities.lazyLoad(exports, ["IdentityProviderConfig"], () => require("./identityProviderConfig"));
|
|
37
37
|
exports.NodeGroup = null;
|
|
38
38
|
utilities.lazyLoad(exports, ["NodeGroup"], () => require("./nodeGroup"));
|
|
39
|
+
exports.PodIdentityAssociation = null;
|
|
40
|
+
utilities.lazyLoad(exports, ["PodIdentityAssociation"], () => require("./podIdentityAssociation"));
|
|
39
41
|
const _module = {
|
|
40
42
|
version: utilities.getVersion(),
|
|
41
43
|
construct: (name, type, urn) => {
|
|
@@ -50,6 +52,8 @@ const _module = {
|
|
|
50
52
|
return new exports.IdentityProviderConfig(name, undefined, { urn });
|
|
51
53
|
case "aws:eks/nodeGroup:NodeGroup":
|
|
52
54
|
return new exports.NodeGroup(name, undefined, { urn });
|
|
55
|
+
case "aws:eks/podIdentityAssociation:PodIdentityAssociation":
|
|
56
|
+
return new exports.PodIdentityAssociation(name, undefined, { urn });
|
|
53
57
|
default:
|
|
54
58
|
throw new Error(`unknown resource type ${type}`);
|
|
55
59
|
}
|
|
@@ -60,4 +64,5 @@ pulumi.runtime.registerResourceModule("aws", "eks/cluster", _module);
|
|
|
60
64
|
pulumi.runtime.registerResourceModule("aws", "eks/fargateProfile", _module);
|
|
61
65
|
pulumi.runtime.registerResourceModule("aws", "eks/identityProviderConfig", _module);
|
|
62
66
|
pulumi.runtime.registerResourceModule("aws", "eks/nodeGroup", _module);
|
|
67
|
+
pulumi.runtime.registerResourceModule("aws", "eks/podIdentityAssociation", _module);
|
|
63
68
|
//# sourceMappingURL=index.js.map
|
package/eks/index.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../eks/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,KAAK,GAAmC,IAAW,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAIpD,QAAA,OAAO,GAAuC,IAAW,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAIxD,QAAA,cAAc,GAAqD,IAAW,CAAC;AAC5F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAGtE,QAAA,QAAQ,GAAyC,IAAW,CAAC;AAC7D,QAAA,cAAc,GAA+C,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,UAAU,EAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC;AAG3E,QAAA,eAAe,GAAuD,IAAW,CAAC;AAClF,QAAA,qBAAqB,GAA6D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,EAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAGhG,QAAA,UAAU,GAA6C,IAAW,CAAC;AACnE,QAAA,gBAAgB,GAAmD,IAAW,CAAC;AAC5F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,YAAY,EAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;AAGjF,QAAA,cAAc,GAAqD,IAAW,CAAC;AAC/E,QAAA,oBAAoB,GAA2D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,EAAC,sBAAsB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAG7F,QAAA,WAAW,GAA+C,IAAW,CAAC;AACtE,QAAA,iBAAiB,GAAqD,IAAW,CAAC;AAC/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,EAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAGpF,QAAA,YAAY,GAAiD,IAAW,CAAC;AACzE,QAAA,kBAAkB,GAAuD,IAAW,CAAC;AAClG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,EAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAGvF,QAAA,aAAa,GAAmD,IAAW,CAAC;AAC5E,QAAA,mBAAmB,GAAyD,IAAW,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,EAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAI1F,QAAA,sBAAsB,GAAqE,IAAW,CAAC;AACpH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,wBAAwB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,0BAA0B,CAAC,CAAC,CAAC;AAItF,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;
|
|
1
|
+
{"version":3,"file":"index.js","sourceRoot":"","sources":["../../eks/index.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAK7B,QAAA,KAAK,GAAmC,IAAW,CAAC;AACjE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,OAAO,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,SAAS,CAAC,CAAC,CAAC;AAIpD,QAAA,OAAO,GAAuC,IAAW,CAAC;AACvE,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,SAAS,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,WAAW,CAAC,CAAC,CAAC;AAIxD,QAAA,cAAc,GAAqD,IAAW,CAAC;AAC5F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAGtE,QAAA,QAAQ,GAAyC,IAAW,CAAC;AAC7D,QAAA,cAAc,GAA+C,IAAW,CAAC;AACtF,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,UAAU,EAAC,gBAAgB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,YAAY,CAAC,CAAC,CAAC;AAG3E,QAAA,eAAe,GAAuD,IAAW,CAAC;AAClF,QAAA,qBAAqB,GAA6D,IAAW,CAAC;AAC3G,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,iBAAiB,EAAC,uBAAuB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,mBAAmB,CAAC,CAAC,CAAC;AAGhG,QAAA,UAAU,GAA6C,IAAW,CAAC;AACnE,QAAA,gBAAgB,GAAmD,IAAW,CAAC;AAC5F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,YAAY,EAAC,kBAAkB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,cAAc,CAAC,CAAC,CAAC;AAGjF,QAAA,cAAc,GAAqD,IAAW,CAAC;AAC/E,QAAA,oBAAoB,GAA2D,IAAW,CAAC;AACxG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,gBAAgB,EAAC,sBAAsB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,kBAAkB,CAAC,CAAC,CAAC;AAG7F,QAAA,WAAW,GAA+C,IAAW,CAAC;AACtE,QAAA,iBAAiB,GAAqD,IAAW,CAAC;AAC/F,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,aAAa,EAAC,mBAAmB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,eAAe,CAAC,CAAC,CAAC;AAGpF,QAAA,YAAY,GAAiD,IAAW,CAAC;AACzE,QAAA,kBAAkB,GAAuD,IAAW,CAAC;AAClG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,cAAc,EAAC,oBAAoB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,gBAAgB,CAAC,CAAC,CAAC;AAGvF,QAAA,aAAa,GAAmD,IAAW,CAAC;AAC5E,QAAA,mBAAmB,GAAyD,IAAW,CAAC;AACrG,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,eAAe,EAAC,qBAAqB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,iBAAiB,CAAC,CAAC,CAAC;AAI1F,QAAA,sBAAsB,GAAqE,IAAW,CAAC;AACpH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,wBAAwB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,0BAA0B,CAAC,CAAC,CAAC;AAItF,QAAA,SAAS,GAA2C,IAAW,CAAC;AAC7E,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,WAAW,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,aAAa,CAAC,CAAC,CAAC;AAI5D,QAAA,sBAAsB,GAAqE,IAAW,CAAC;AACpH,SAAS,CAAC,QAAQ,CAAC,OAAO,EAAE,CAAC,wBAAwB,CAAC,EAAE,GAAG,EAAE,CAAC,OAAO,CAAC,0BAA0B,CAAC,CAAC,CAAC;AAGnG,MAAM,OAAO,GAAG;IACZ,OAAO,EAAE,SAAS,CAAC,UAAU,EAAE;IAC/B,SAAS,EAAE,CAAC,IAAY,EAAE,IAAY,EAAE,GAAW,EAAmB,EAAE;QACpE,QAAQ,IAAI,EAAE;YACV,KAAK,qBAAqB;gBACtB,OAAO,IAAI,aAAK,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACnD,KAAK,yBAAyB;gBAC1B,OAAO,IAAI,eAAO,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACrD,KAAK,uCAAuC;gBACxC,OAAO,IAAI,sBAAc,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YAC5D,KAAK,uDAAuD;gBACxD,OAAO,IAAI,8BAAsB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpE,KAAK,6BAA6B;gBAC9B,OAAO,IAAI,iBAAS,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACvD,KAAK,uDAAuD;gBACxD,OAAO,IAAI,8BAAsB,CAAC,IAAI,EAAO,SAAS,EAAE,EAAE,GAAG,EAAE,CAAC,CAAA;YACpE;gBACI,MAAM,IAAI,KAAK,CAAC,yBAAyB,IAAI,EAAE,CAAC,CAAC;SACxD;IACL,CAAC;CACJ,CAAC;AACF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,WAAW,EAAE,OAAO,CAAC,CAAA;AAClE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,aAAa,EAAE,OAAO,CAAC,CAAA;AACpE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,oBAAoB,EAAE,OAAO,CAAC,CAAA;AAC3E,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA;AACnF,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,eAAe,EAAE,OAAO,CAAC,CAAA;AACtE,MAAM,CAAC,OAAO,CAAC,sBAAsB,CAAC,KAAK,EAAE,4BAA4B,EAAE,OAAO,CAAC,CAAA"}
|
|
@@ -0,0 +1,192 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* Resource for managing an AWS EKS (Elastic Kubernetes) Pod Identity Association.
|
|
4
|
+
*
|
|
5
|
+
* Creates an EKS Pod Identity association between a service account in an Amazon EKS cluster and an IAM role with EKS Pod Identity. Use EKS Pod Identity to give temporary IAM credentials to pods and the credentials are rotated automatically.
|
|
6
|
+
*
|
|
7
|
+
* Amazon EKS Pod Identity associations provide the ability to manage credentials for your applications, similar to the way that EC2 instance profiles provide credentials to Amazon EC2 instances.
|
|
8
|
+
*
|
|
9
|
+
* If a pod uses a service account that has an association, Amazon EKS sets environment variables in the containers of the pod. The environment variables configure the Amazon Web Services SDKs, including the Command Line Interface, to use the EKS Pod Identity credentials.
|
|
10
|
+
*
|
|
11
|
+
* Pod Identity is a simpler method than IAM roles for service accounts, as this method doesn’t use OIDC identity providers. Additionally, you can configure a role for Pod Identity once, and reuse it across clusters.
|
|
12
|
+
*
|
|
13
|
+
* ## Example Usage
|
|
14
|
+
* ### Basic Usage
|
|
15
|
+
*
|
|
16
|
+
* ```typescript
|
|
17
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
18
|
+
* import * as aws from "@pulumi/aws";
|
|
19
|
+
*
|
|
20
|
+
* const assumeRole = aws.iam.getPolicyDocument({
|
|
21
|
+
* statements: [{
|
|
22
|
+
* effect: "Allow",
|
|
23
|
+
* principals: [{
|
|
24
|
+
* type: "Service",
|
|
25
|
+
* identifiers: ["pods.eks.amazonaws.com"],
|
|
26
|
+
* }],
|
|
27
|
+
* actions: [
|
|
28
|
+
* "sts:AssumeRole",
|
|
29
|
+
* "sts:TagSession",
|
|
30
|
+
* ],
|
|
31
|
+
* }],
|
|
32
|
+
* });
|
|
33
|
+
* const exampleRole = new aws.iam.Role("exampleRole", {assumeRolePolicy: assumeRole.then(assumeRole => assumeRole.json)});
|
|
34
|
+
* const exampleS3 = new aws.iam.RolePolicyAttachment("exampleS3", {
|
|
35
|
+
* policyArn: "arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess",
|
|
36
|
+
* role: exampleRole.name,
|
|
37
|
+
* });
|
|
38
|
+
* const examplePodIdentityAssociation = new aws.eks.PodIdentityAssociation("examplePodIdentityAssociation", {
|
|
39
|
+
* clusterName: aws_eks_cluster.example.name,
|
|
40
|
+
* namespace: "example",
|
|
41
|
+
* serviceAccount: "example-sa",
|
|
42
|
+
* roleArn: exampleRole.arn,
|
|
43
|
+
* });
|
|
44
|
+
* ```
|
|
45
|
+
*
|
|
46
|
+
* ## Import
|
|
47
|
+
*
|
|
48
|
+
* Using `pulumi import`, import EKS (Elastic Kubernetes) Pod Identity Association using the `cluster_name` and `association_id` separated by a comma (`,`). For example:
|
|
49
|
+
*
|
|
50
|
+
* ```sh
|
|
51
|
+
* $ pulumi import aws:eks/podIdentityAssociation:PodIdentityAssociation example example,a-12345678
|
|
52
|
+
* ```
|
|
53
|
+
*/
|
|
54
|
+
export declare class PodIdentityAssociation extends pulumi.CustomResource {
|
|
55
|
+
/**
|
|
56
|
+
* Get an existing PodIdentityAssociation resource's state with the given name, ID, and optional extra
|
|
57
|
+
* properties used to qualify the lookup.
|
|
58
|
+
*
|
|
59
|
+
* @param name The _unique_ name of the resulting resource.
|
|
60
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
61
|
+
* @param state Any extra arguments used during the lookup.
|
|
62
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
63
|
+
*/
|
|
64
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: PodIdentityAssociationState, opts?: pulumi.CustomResourceOptions): PodIdentityAssociation;
|
|
65
|
+
/**
|
|
66
|
+
* Returns true if the given object is an instance of PodIdentityAssociation. This is designed to work even
|
|
67
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
68
|
+
*/
|
|
69
|
+
static isInstance(obj: any): obj is PodIdentityAssociation;
|
|
70
|
+
/**
|
|
71
|
+
* The Amazon Resource Name (ARN) of the association.
|
|
72
|
+
*/
|
|
73
|
+
readonly associationArn: pulumi.Output<string>;
|
|
74
|
+
/**
|
|
75
|
+
* The ID of the association.
|
|
76
|
+
*/
|
|
77
|
+
readonly associationId: pulumi.Output<string>;
|
|
78
|
+
/**
|
|
79
|
+
* The name of the cluster to create the association in.
|
|
80
|
+
*/
|
|
81
|
+
readonly clusterName: pulumi.Output<string>;
|
|
82
|
+
/**
|
|
83
|
+
* The name of the Kubernetes namespace inside the cluster to create the association in. The service account and the pods that use the service account must be in this namespace.
|
|
84
|
+
*/
|
|
85
|
+
readonly namespace: pulumi.Output<string>;
|
|
86
|
+
/**
|
|
87
|
+
* The Amazon Resource Name (ARN) of the IAM role to associate with the service account. The EKS Pod Identity agent manages credentials to assume this role for applications in the containers in the pods that use this service account.
|
|
88
|
+
*/
|
|
89
|
+
readonly roleArn: pulumi.Output<string>;
|
|
90
|
+
/**
|
|
91
|
+
* The name of the Kubernetes service account inside the cluster to associate the IAM credentials with.
|
|
92
|
+
*
|
|
93
|
+
* The following arguments are optional:
|
|
94
|
+
*/
|
|
95
|
+
readonly serviceAccount: pulumi.Output<string>;
|
|
96
|
+
/**
|
|
97
|
+
* Key-value map of resource tags. If configured with a provider `defaultTags` configuration block present, tags with matching keys will overwrite those defined at the provider-level.
|
|
98
|
+
*/
|
|
99
|
+
readonly tags: pulumi.Output<{
|
|
100
|
+
[key: string]: string;
|
|
101
|
+
} | undefined>;
|
|
102
|
+
/**
|
|
103
|
+
* A map of tags assigned to the resource, including those inherited from the provider `defaultTags` configuration block.
|
|
104
|
+
*
|
|
105
|
+
* @deprecated Please use `tags` instead.
|
|
106
|
+
*/
|
|
107
|
+
readonly tagsAll: pulumi.Output<{
|
|
108
|
+
[key: string]: string;
|
|
109
|
+
}>;
|
|
110
|
+
/**
|
|
111
|
+
* Create a PodIdentityAssociation resource with the given unique name, arguments, and options.
|
|
112
|
+
*
|
|
113
|
+
* @param name The _unique_ name of the resource.
|
|
114
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
115
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
116
|
+
*/
|
|
117
|
+
constructor(name: string, args: PodIdentityAssociationArgs, opts?: pulumi.CustomResourceOptions);
|
|
118
|
+
}
|
|
119
|
+
/**
|
|
120
|
+
* Input properties used for looking up and filtering PodIdentityAssociation resources.
|
|
121
|
+
*/
|
|
122
|
+
export interface PodIdentityAssociationState {
|
|
123
|
+
/**
|
|
124
|
+
* The Amazon Resource Name (ARN) of the association.
|
|
125
|
+
*/
|
|
126
|
+
associationArn?: pulumi.Input<string>;
|
|
127
|
+
/**
|
|
128
|
+
* The ID of the association.
|
|
129
|
+
*/
|
|
130
|
+
associationId?: pulumi.Input<string>;
|
|
131
|
+
/**
|
|
132
|
+
* The name of the cluster to create the association in.
|
|
133
|
+
*/
|
|
134
|
+
clusterName?: pulumi.Input<string>;
|
|
135
|
+
/**
|
|
136
|
+
* The name of the Kubernetes namespace inside the cluster to create the association in. The service account and the pods that use the service account must be in this namespace.
|
|
137
|
+
*/
|
|
138
|
+
namespace?: pulumi.Input<string>;
|
|
139
|
+
/**
|
|
140
|
+
* The Amazon Resource Name (ARN) of the IAM role to associate with the service account. The EKS Pod Identity agent manages credentials to assume this role for applications in the containers in the pods that use this service account.
|
|
141
|
+
*/
|
|
142
|
+
roleArn?: pulumi.Input<string>;
|
|
143
|
+
/**
|
|
144
|
+
* The name of the Kubernetes service account inside the cluster to associate the IAM credentials with.
|
|
145
|
+
*
|
|
146
|
+
* The following arguments are optional:
|
|
147
|
+
*/
|
|
148
|
+
serviceAccount?: pulumi.Input<string>;
|
|
149
|
+
/**
|
|
150
|
+
* Key-value map of resource tags. If configured with a provider `defaultTags` configuration block present, tags with matching keys will overwrite those defined at the provider-level.
|
|
151
|
+
*/
|
|
152
|
+
tags?: pulumi.Input<{
|
|
153
|
+
[key: string]: pulumi.Input<string>;
|
|
154
|
+
}>;
|
|
155
|
+
/**
|
|
156
|
+
* A map of tags assigned to the resource, including those inherited from the provider `defaultTags` configuration block.
|
|
157
|
+
*
|
|
158
|
+
* @deprecated Please use `tags` instead.
|
|
159
|
+
*/
|
|
160
|
+
tagsAll?: pulumi.Input<{
|
|
161
|
+
[key: string]: pulumi.Input<string>;
|
|
162
|
+
}>;
|
|
163
|
+
}
|
|
164
|
+
/**
|
|
165
|
+
* The set of arguments for constructing a PodIdentityAssociation resource.
|
|
166
|
+
*/
|
|
167
|
+
export interface PodIdentityAssociationArgs {
|
|
168
|
+
/**
|
|
169
|
+
* The name of the cluster to create the association in.
|
|
170
|
+
*/
|
|
171
|
+
clusterName: pulumi.Input<string>;
|
|
172
|
+
/**
|
|
173
|
+
* The name of the Kubernetes namespace inside the cluster to create the association in. The service account and the pods that use the service account must be in this namespace.
|
|
174
|
+
*/
|
|
175
|
+
namespace: pulumi.Input<string>;
|
|
176
|
+
/**
|
|
177
|
+
* The Amazon Resource Name (ARN) of the IAM role to associate with the service account. The EKS Pod Identity agent manages credentials to assume this role for applications in the containers in the pods that use this service account.
|
|
178
|
+
*/
|
|
179
|
+
roleArn: pulumi.Input<string>;
|
|
180
|
+
/**
|
|
181
|
+
* The name of the Kubernetes service account inside the cluster to associate the IAM credentials with.
|
|
182
|
+
*
|
|
183
|
+
* The following arguments are optional:
|
|
184
|
+
*/
|
|
185
|
+
serviceAccount: pulumi.Input<string>;
|
|
186
|
+
/**
|
|
187
|
+
* Key-value map of resource tags. If configured with a provider `defaultTags` configuration block present, tags with matching keys will overwrite those defined at the provider-level.
|
|
188
|
+
*/
|
|
189
|
+
tags?: pulumi.Input<{
|
|
190
|
+
[key: string]: pulumi.Input<string>;
|
|
191
|
+
}>;
|
|
192
|
+
}
|
|
@@ -0,0 +1,129 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.PodIdentityAssociation = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Resource for managing an AWS EKS (Elastic Kubernetes) Pod Identity Association.
|
|
10
|
+
*
|
|
11
|
+
* Creates an EKS Pod Identity association between a service account in an Amazon EKS cluster and an IAM role with EKS Pod Identity. Use EKS Pod Identity to give temporary IAM credentials to pods and the credentials are rotated automatically.
|
|
12
|
+
*
|
|
13
|
+
* Amazon EKS Pod Identity associations provide the ability to manage credentials for your applications, similar to the way that EC2 instance profiles provide credentials to Amazon EC2 instances.
|
|
14
|
+
*
|
|
15
|
+
* If a pod uses a service account that has an association, Amazon EKS sets environment variables in the containers of the pod. The environment variables configure the Amazon Web Services SDKs, including the Command Line Interface, to use the EKS Pod Identity credentials.
|
|
16
|
+
*
|
|
17
|
+
* Pod Identity is a simpler method than IAM roles for service accounts, as this method doesn’t use OIDC identity providers. Additionally, you can configure a role for Pod Identity once, and reuse it across clusters.
|
|
18
|
+
*
|
|
19
|
+
* ## Example Usage
|
|
20
|
+
* ### Basic Usage
|
|
21
|
+
*
|
|
22
|
+
* ```typescript
|
|
23
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
24
|
+
* import * as aws from "@pulumi/aws";
|
|
25
|
+
*
|
|
26
|
+
* const assumeRole = aws.iam.getPolicyDocument({
|
|
27
|
+
* statements: [{
|
|
28
|
+
* effect: "Allow",
|
|
29
|
+
* principals: [{
|
|
30
|
+
* type: "Service",
|
|
31
|
+
* identifiers: ["pods.eks.amazonaws.com"],
|
|
32
|
+
* }],
|
|
33
|
+
* actions: [
|
|
34
|
+
* "sts:AssumeRole",
|
|
35
|
+
* "sts:TagSession",
|
|
36
|
+
* ],
|
|
37
|
+
* }],
|
|
38
|
+
* });
|
|
39
|
+
* const exampleRole = new aws.iam.Role("exampleRole", {assumeRolePolicy: assumeRole.then(assumeRole => assumeRole.json)});
|
|
40
|
+
* const exampleS3 = new aws.iam.RolePolicyAttachment("exampleS3", {
|
|
41
|
+
* policyArn: "arn:aws:iam::aws:policy/AmazonS3ReadOnlyAccess",
|
|
42
|
+
* role: exampleRole.name,
|
|
43
|
+
* });
|
|
44
|
+
* const examplePodIdentityAssociation = new aws.eks.PodIdentityAssociation("examplePodIdentityAssociation", {
|
|
45
|
+
* clusterName: aws_eks_cluster.example.name,
|
|
46
|
+
* namespace: "example",
|
|
47
|
+
* serviceAccount: "example-sa",
|
|
48
|
+
* roleArn: exampleRole.arn,
|
|
49
|
+
* });
|
|
50
|
+
* ```
|
|
51
|
+
*
|
|
52
|
+
* ## Import
|
|
53
|
+
*
|
|
54
|
+
* Using `pulumi import`, import EKS (Elastic Kubernetes) Pod Identity Association using the `cluster_name` and `association_id` separated by a comma (`,`). For example:
|
|
55
|
+
*
|
|
56
|
+
* ```sh
|
|
57
|
+
* $ pulumi import aws:eks/podIdentityAssociation:PodIdentityAssociation example example,a-12345678
|
|
58
|
+
* ```
|
|
59
|
+
*/
|
|
60
|
+
class PodIdentityAssociation extends pulumi.CustomResource {
|
|
61
|
+
/**
|
|
62
|
+
* Get an existing PodIdentityAssociation resource's state with the given name, ID, and optional extra
|
|
63
|
+
* properties used to qualify the lookup.
|
|
64
|
+
*
|
|
65
|
+
* @param name The _unique_ name of the resulting resource.
|
|
66
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
67
|
+
* @param state Any extra arguments used during the lookup.
|
|
68
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
69
|
+
*/
|
|
70
|
+
static get(name, id, state, opts) {
|
|
71
|
+
return new PodIdentityAssociation(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
72
|
+
}
|
|
73
|
+
/**
|
|
74
|
+
* Returns true if the given object is an instance of PodIdentityAssociation. This is designed to work even
|
|
75
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
76
|
+
*/
|
|
77
|
+
static isInstance(obj) {
|
|
78
|
+
if (obj === undefined || obj === null) {
|
|
79
|
+
return false;
|
|
80
|
+
}
|
|
81
|
+
return obj['__pulumiType'] === PodIdentityAssociation.__pulumiType;
|
|
82
|
+
}
|
|
83
|
+
constructor(name, argsOrState, opts) {
|
|
84
|
+
let resourceInputs = {};
|
|
85
|
+
opts = opts || {};
|
|
86
|
+
if (opts.id) {
|
|
87
|
+
const state = argsOrState;
|
|
88
|
+
resourceInputs["associationArn"] = state ? state.associationArn : undefined;
|
|
89
|
+
resourceInputs["associationId"] = state ? state.associationId : undefined;
|
|
90
|
+
resourceInputs["clusterName"] = state ? state.clusterName : undefined;
|
|
91
|
+
resourceInputs["namespace"] = state ? state.namespace : undefined;
|
|
92
|
+
resourceInputs["roleArn"] = state ? state.roleArn : undefined;
|
|
93
|
+
resourceInputs["serviceAccount"] = state ? state.serviceAccount : undefined;
|
|
94
|
+
resourceInputs["tags"] = state ? state.tags : undefined;
|
|
95
|
+
resourceInputs["tagsAll"] = state ? state.tagsAll : undefined;
|
|
96
|
+
}
|
|
97
|
+
else {
|
|
98
|
+
const args = argsOrState;
|
|
99
|
+
if ((!args || args.clusterName === undefined) && !opts.urn) {
|
|
100
|
+
throw new Error("Missing required property 'clusterName'");
|
|
101
|
+
}
|
|
102
|
+
if ((!args || args.namespace === undefined) && !opts.urn) {
|
|
103
|
+
throw new Error("Missing required property 'namespace'");
|
|
104
|
+
}
|
|
105
|
+
if ((!args || args.roleArn === undefined) && !opts.urn) {
|
|
106
|
+
throw new Error("Missing required property 'roleArn'");
|
|
107
|
+
}
|
|
108
|
+
if ((!args || args.serviceAccount === undefined) && !opts.urn) {
|
|
109
|
+
throw new Error("Missing required property 'serviceAccount'");
|
|
110
|
+
}
|
|
111
|
+
resourceInputs["clusterName"] = args ? args.clusterName : undefined;
|
|
112
|
+
resourceInputs["namespace"] = args ? args.namespace : undefined;
|
|
113
|
+
resourceInputs["roleArn"] = args ? args.roleArn : undefined;
|
|
114
|
+
resourceInputs["serviceAccount"] = args ? args.serviceAccount : undefined;
|
|
115
|
+
resourceInputs["tags"] = args ? args.tags : undefined;
|
|
116
|
+
resourceInputs["associationArn"] = undefined /*out*/;
|
|
117
|
+
resourceInputs["associationId"] = undefined /*out*/;
|
|
118
|
+
resourceInputs["tagsAll"] = undefined /*out*/;
|
|
119
|
+
}
|
|
120
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
121
|
+
const secretOpts = { additionalSecretOutputs: ["tagsAll"] };
|
|
122
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
123
|
+
super(PodIdentityAssociation.__pulumiType, name, resourceInputs, opts);
|
|
124
|
+
}
|
|
125
|
+
}
|
|
126
|
+
exports.PodIdentityAssociation = PodIdentityAssociation;
|
|
127
|
+
/** @internal */
|
|
128
|
+
PodIdentityAssociation.__pulumiType = 'aws:eks/podIdentityAssociation:PodIdentityAssociation';
|
|
129
|
+
//# sourceMappingURL=podIdentityAssociation.js.map
|
|
@@ -0,0 +1 @@
|
|
|
1
|
+
{"version":3,"file":"podIdentityAssociation.js","sourceRoot":"","sources":["../../eks/podIdentityAssociation.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAmDG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IA+CD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,cAAc,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC3D,MAAM,IAAI,KAAK,CAAC,4CAA4C,CAAC,CAAC;aACjE;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,gBAAgB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACrD,cAAc,CAAC,eAAe,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACpD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,MAAM,UAAU,GAAG,EAAE,uBAAuB,EAAE,CAAC,SAAS,CAAC,EAAE,CAAC;QAC5D,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,IAAI,EAAE,UAAU,CAAC,CAAC;QAC7C,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjHL,wDAkHC;AApGG,gBAAgB;AACO,mCAAY,GAAG,uDAAuD,CAAC"}
|
|
@@ -30,7 +30,7 @@ import * as outputs from "../types/output";
|
|
|
30
30
|
* enabled: true,
|
|
31
31
|
* idp: {
|
|
32
32
|
* entityId: "https://example.com",
|
|
33
|
-
* metadataContent: fs.readFileSync("./saml-metadata.xml"),
|
|
33
|
+
* metadataContent: fs.readFileSync("./saml-metadata.xml", "utf8"),
|
|
34
34
|
* },
|
|
35
35
|
* },
|
|
36
36
|
* });
|
|
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
|
|
|
34
34
|
* enabled: true,
|
|
35
35
|
* idp: {
|
|
36
36
|
* entityId: "https://example.com",
|
|
37
|
-
* metadataContent: fs.readFileSync("./saml-metadata.xml"),
|
|
37
|
+
* metadataContent: fs.readFileSync("./saml-metadata.xml", "utf8"),
|
|
38
38
|
* },
|
|
39
39
|
* },
|
|
40
40
|
* });
|
|
@@ -28,7 +28,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
28
28
|
* policyTypeName: "PublicKeyPolicyType",
|
|
29
29
|
* policyAttributes: [{
|
|
30
30
|
* name: "PublicKey",
|
|
31
|
-
* value: fs.readFileSync("wu-tang-pubkey"),
|
|
31
|
+
* value: fs.readFileSync("wu-tang-pubkey", "utf8"),
|
|
32
32
|
* }],
|
|
33
33
|
* });
|
|
34
34
|
* const wu_tang_root_ca_backend_auth_policy = new aws.elb.LoadBalancerPolicy("wu-tang-root-ca-backend-auth-policy", {
|
|
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
|
|
|
34
34
|
* policyTypeName: "PublicKeyPolicyType",
|
|
35
35
|
* policyAttributes: [{
|
|
36
36
|
* name: "PublicKey",
|
|
37
|
-
* value: fs.readFileSync("wu-tang-pubkey"),
|
|
37
|
+
* value: fs.readFileSync("wu-tang-pubkey", "utf8"),
|
|
38
38
|
* }],
|
|
39
39
|
* });
|
|
40
40
|
* const wu_tang_root_ca_backend_auth_policy = new aws.elb.LoadBalancerPolicy("wu-tang-root-ca-backend-auth-policy", {
|
|
@@ -30,7 +30,7 @@ import * as outputs from "../types/output";
|
|
|
30
30
|
* policyTypeName: "PublicKeyPolicyType",
|
|
31
31
|
* policyAttributes: [{
|
|
32
32
|
* name: "PublicKey",
|
|
33
|
-
* value: fs.readFileSync("wu-tang-pubkey"),
|
|
33
|
+
* value: fs.readFileSync("wu-tang-pubkey", "utf8"),
|
|
34
34
|
* }],
|
|
35
35
|
* });
|
|
36
36
|
* const wu_tang_root_ca_backend_auth_policy = new aws.elb.LoadBalancerPolicy("wu-tang-root-ca-backend-auth-policy", {
|
|
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
|
|
|
34
34
|
* policyTypeName: "PublicKeyPolicyType",
|
|
35
35
|
* policyAttributes: [{
|
|
36
36
|
* name: "PublicKey",
|
|
37
|
-
* value: fs.readFileSync("wu-tang-pubkey"),
|
|
37
|
+
* value: fs.readFileSync("wu-tang-pubkey", "utf8"),
|
|
38
38
|
* }],
|
|
39
39
|
* });
|
|
40
40
|
* const wu_tang_root_ca_backend_auth_policy = new aws.elb.LoadBalancerPolicy("wu-tang-root-ca-backend-auth-policy", {
|
package/iam/samlProvider.d.ts
CHANGED
|
@@ -9,7 +9,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
9
9
|
* import * as aws from "@pulumi/aws";
|
|
10
10
|
* import * as fs from "fs";
|
|
11
11
|
*
|
|
12
|
-
* const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml")});
|
|
12
|
+
* const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml", "utf8")});
|
|
13
13
|
* ```
|
|
14
14
|
*
|
|
15
15
|
* ## Import
|
package/iam/samlProvider.js
CHANGED
|
@@ -15,7 +15,7 @@ const utilities = require("../utilities");
|
|
|
15
15
|
* import * as aws from "@pulumi/aws";
|
|
16
16
|
* import * as fs from "fs";
|
|
17
17
|
*
|
|
18
|
-
* const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml")});
|
|
18
|
+
* const _default = new aws.iam.SamlProvider("default", {samlMetadataDocument: fs.readFileSync("saml-metadata.xml", "utf8")});
|
|
19
19
|
* ```
|
|
20
20
|
*
|
|
21
21
|
* ## Import
|
|
@@ -21,8 +21,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
21
21
|
* import * as fs from "fs";
|
|
22
22
|
*
|
|
23
23
|
* const testCert = new aws.iam.ServerCertificate("testCert", {
|
|
24
|
-
* certificateBody: fs.readFileSync("self-ca-cert.pem"),
|
|
25
|
-
* privateKey: fs.readFileSync("test-key.pem"),
|
|
24
|
+
* certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
|
|
25
|
+
* privateKey: fs.readFileSync("test-key.pem", "utf8"),
|
|
26
26
|
* });
|
|
27
27
|
* ```
|
|
28
28
|
*
|
|
@@ -62,8 +62,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
62
62
|
*
|
|
63
63
|
* const testCert = new aws.iam.ServerCertificate("testCert", {
|
|
64
64
|
* namePrefix: "example-cert",
|
|
65
|
-
* certificateBody: fs.readFileSync("self-ca-cert.pem"),
|
|
66
|
-
* privateKey: fs.readFileSync("test-key.pem"),
|
|
65
|
+
* certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
|
|
66
|
+
* privateKey: fs.readFileSync("test-key.pem", "utf8"),
|
|
67
67
|
* });
|
|
68
68
|
* const ourapp = new aws.elb.LoadBalancer("ourapp", {
|
|
69
69
|
* availabilityZones: ["us-west-2a"],
|
package/iam/serverCertificate.js
CHANGED
|
@@ -27,8 +27,8 @@ const utilities = require("../utilities");
|
|
|
27
27
|
* import * as fs from "fs";
|
|
28
28
|
*
|
|
29
29
|
* const testCert = new aws.iam.ServerCertificate("testCert", {
|
|
30
|
-
* certificateBody: fs.readFileSync("self-ca-cert.pem"),
|
|
31
|
-
* privateKey: fs.readFileSync("test-key.pem"),
|
|
30
|
+
* certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
|
|
31
|
+
* privateKey: fs.readFileSync("test-key.pem", "utf8"),
|
|
32
32
|
* });
|
|
33
33
|
* ```
|
|
34
34
|
*
|
|
@@ -68,8 +68,8 @@ const utilities = require("../utilities");
|
|
|
68
68
|
*
|
|
69
69
|
* const testCert = new aws.iam.ServerCertificate("testCert", {
|
|
70
70
|
* namePrefix: "example-cert",
|
|
71
|
-
* certificateBody: fs.readFileSync("self-ca-cert.pem"),
|
|
72
|
-
* privateKey: fs.readFileSync("test-key.pem"),
|
|
71
|
+
* certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
|
|
72
|
+
* privateKey: fs.readFileSync("test-key.pem", "utf8"),
|
|
73
73
|
* });
|
|
74
74
|
* const ourapp = new aws.elb.LoadBalancer("ourapp", {
|
|
75
75
|
* availabilityZones: ["us-west-2a"],
|
|
@@ -14,7 +14,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
14
14
|
*
|
|
15
15
|
* const testCert = new aws.iam.SigningCertificate("testCert", {
|
|
16
16
|
* username: "some_test_cert",
|
|
17
|
-
* certificateBody: fs.readFileSync("self-ca-cert.pem"),
|
|
17
|
+
* certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
|
|
18
18
|
* });
|
|
19
19
|
* ```
|
|
20
20
|
*
|
|
@@ -20,7 +20,7 @@ const utilities = require("../utilities");
|
|
|
20
20
|
*
|
|
21
21
|
* const testCert = new aws.iam.SigningCertificate("testCert", {
|
|
22
22
|
* username: "some_test_cert",
|
|
23
|
-
* certificateBody: fs.readFileSync("self-ca-cert.pem"),
|
|
23
|
+
* certificateBody: fs.readFileSync("self-ca-cert.pem", "utf8"),
|
|
24
24
|
* });
|
|
25
25
|
* ```
|
|
26
26
|
*
|
package/iot/authorizer.d.ts
CHANGED
|
@@ -15,7 +15,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
15
15
|
* status: "ACTIVE",
|
|
16
16
|
* tokenKeyName: "Token-Header",
|
|
17
17
|
* tokenSigningPublicKeys: {
|
|
18
|
-
* Key1: fs.readFileSync("test-fixtures/iot-authorizer-signing-key.pem"),
|
|
18
|
+
* Key1: fs.readFileSync("test-fixtures/iot-authorizer-signing-key.pem", "utf8"),
|
|
19
19
|
* },
|
|
20
20
|
* });
|
|
21
21
|
* ```
|
package/iot/authorizer.js
CHANGED
|
@@ -21,7 +21,7 @@ const utilities = require("../utilities");
|
|
|
21
21
|
* status: "ACTIVE",
|
|
22
22
|
* tokenKeyName: "Token-Header",
|
|
23
23
|
* tokenSigningPublicKeys: {
|
|
24
|
-
* Key1: fs.readFileSync("test-fixtures/iot-authorizer-signing-key.pem"),
|
|
24
|
+
* Key1: fs.readFileSync("test-fixtures/iot-authorizer-signing-key.pem", "utf8"),
|
|
25
25
|
* },
|
|
26
26
|
* });
|
|
27
27
|
* ```
|
package/iot/certificate.d.ts
CHANGED
|
@@ -11,7 +11,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
11
11
|
* import * as fs from "fs";
|
|
12
12
|
*
|
|
13
13
|
* const cert = new aws.iot.Certificate("cert", {
|
|
14
|
-
* csr: fs.readFileSync("/my/csr.pem"),
|
|
14
|
+
* csr: fs.readFileSync("/my/csr.pem", "utf8"),
|
|
15
15
|
* active: true,
|
|
16
16
|
* });
|
|
17
17
|
* ```
|
|
@@ -31,7 +31,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
31
31
|
* import * as fs from "fs";
|
|
32
32
|
*
|
|
33
33
|
* const cert = new aws.iot.Certificate("cert", {
|
|
34
|
-
* certificatePem: fs.readFileSync("/my/cert.pem"),
|
|
34
|
+
* certificatePem: fs.readFileSync("/my/cert.pem", "utf8"),
|
|
35
35
|
* active: true,
|
|
36
36
|
* });
|
|
37
37
|
* ```
|