@pulumi/aws 6.13.0 → 6.13.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +4 -4
- package/apigateway/basePathMapping.d.ts +3 -3
- package/apigateway/basePathMapping.js +3 -3
- package/apigateway/domainName.d.ts +3 -3
- package/apigateway/domainName.js +3 -3
- package/appsync/function.d.ts +1 -1
- package/appsync/function.js +1 -1
- package/appsync/resolver.d.ts +1 -1
- package/appsync/resolver.js +1 -1
- package/cloudfront/fieldLevelEncryptionProfile.d.ts +1 -1
- package/cloudfront/fieldLevelEncryptionProfile.js +1 -1
- package/cloudfront/function.d.ts +1 -1
- package/cloudfront/function.js +1 -1
- package/cloudfront/keyGroup.d.ts +1 -1
- package/cloudfront/keyGroup.js +1 -1
- package/cloudfront/publicKey.d.ts +1 -1
- package/cloudfront/publicKey.js +1 -1
- package/cognito/identityPool.d.ts +1 -1
- package/cognito/identityPool.js +1 -1
- package/docdb/elasticCluster.d.ts +217 -0
- package/docdb/elasticCluster.js +107 -0
- package/docdb/elasticCluster.js.map +1 -0
- package/docdb/index.d.ts +3 -0
- package/docdb/index.js +6 -1
- package/docdb/index.js.map +1 -1
- package/ecs/taskDefinition.d.ts +4 -4
- package/ecs/taskDefinition.js +4 -4
- package/eks/index.d.ts +3 -0
- package/eks/index.js +6 -1
- package/eks/index.js.map +1 -1
- package/eks/podIdentityAssociation.d.ts +192 -0
- package/eks/podIdentityAssociation.js +129 -0
- package/eks/podIdentityAssociation.js.map +1 -0
- package/elasticsearch/domainSamlOptions.d.ts +1 -1
- package/elasticsearch/domainSamlOptions.js +1 -1
- package/elb/loadBalancerBackendServerPolicy.d.ts +1 -1
- package/elb/loadBalancerBackendServerPolicy.js +1 -1
- package/elb/loadBalancerPolicy.d.ts +1 -1
- package/elb/loadBalancerPolicy.js +1 -1
- package/iam/samlProvider.d.ts +1 -1
- package/iam/samlProvider.js +1 -1
- package/iam/serverCertificate.d.ts +4 -4
- package/iam/serverCertificate.js +4 -4
- package/iam/signingCertificate.d.ts +1 -1
- package/iam/signingCertificate.js +1 -1
- package/iot/authorizer.d.ts +1 -1
- package/iot/authorizer.js +1 -1
- package/iot/certificate.d.ts +2 -2
- package/iot/certificate.js +2 -2
- package/iot/policyAttachment.d.ts +1 -1
- package/iot/policyAttachment.js +1 -1
- package/iot/thingPrincipalAttachment.d.ts +1 -1
- package/iot/thingPrincipalAttachment.js +1 -1
- package/ivs/playbackKeyPair.d.ts +1 -1
- package/ivs/playbackKeyPair.js +1 -1
- package/kms/customKeyStore.d.ts +1 -1
- package/kms/customKeyStore.js +1 -1
- package/lightsail/keyPair.d.ts +1 -1
- package/lightsail/keyPair.js +1 -1
- package/networkfirewall/ruleGroup.d.ts +2 -2
- package/networkfirewall/ruleGroup.js +2 -2
- package/opensearch/domainSamlOptions.d.ts +1 -1
- package/opensearch/domainSamlOptions.js +1 -1
- package/opsworks/application.d.ts +2 -2
- package/opsworks/application.js +2 -2
- package/package.json +1 -1
- package/pinpoint/apnsChannel.d.ts +2 -2
- package/pinpoint/apnsChannel.js +2 -2
- package/pinpoint/apnsSandboxChannel.d.ts +2 -2
- package/pinpoint/apnsSandboxChannel.js +2 -2
- package/pinpoint/apnsVoipChannel.d.ts +2 -2
- package/pinpoint/apnsVoipChannel.js +2 -2
- package/pinpoint/apnsVoipSandboxChannel.d.ts +2 -2
- package/pinpoint/apnsVoipSandboxChannel.js +2 -2
- package/s3/bucket.d.ts +1 -1
- package/s3/bucket.js +1 -1
- package/s3control/accessGrant.d.ts +198 -0
- package/s3control/accessGrant.js +116 -0
- package/s3control/accessGrant.js.map +1 -0
- package/s3control/accessGrantsInstance.d.ts +139 -0
- package/s3control/accessGrantsInstance.js +93 -0
- package/s3control/accessGrantsInstance.js.map +1 -0
- package/s3control/accessGrantsInstanceResourcePolicy.d.ts +28 -0
- package/s3control/accessGrantsInstanceResourcePolicy.js +28 -0
- package/s3control/accessGrantsInstanceResourcePolicy.js.map +1 -1
- package/s3control/accessGrantsLocation.d.ts +146 -0
- package/s3control/accessGrantsLocation.js +99 -0
- package/s3control/accessGrantsLocation.js.map +1 -0
- package/s3control/index.d.ts +9 -0
- package/s3control/index.js +16 -1
- package/s3control/index.js.map +1 -1
- package/sagemaker/humanTaskUI.d.ts +1 -1
- package/sagemaker/humanTaskUI.js +1 -1
- package/transfer/certificate.d.ts +3 -3
- package/transfer/certificate.js +3 -3
- package/types/input.d.ts +21 -0
- package/types/output.d.ts +21 -0
- package/utilities.d.ts +4 -0
- package/utilities.js +33 -1
- package/utilities.js.map +1 -1
- package/worklink/fleet.d.ts +1 -1
- package/worklink/fleet.js +1 -1
- package/worklink/websiteCertificateAuthorityAssociation.d.ts +1 -1
- package/worklink/websiteCertificateAuthorityAssociation.js +1 -1
package/iot/certificate.js
CHANGED
|
@@ -17,7 +17,7 @@ const utilities = require("../utilities");
|
|
|
17
17
|
* import * as fs from "fs";
|
|
18
18
|
*
|
|
19
19
|
* const cert = new aws.iot.Certificate("cert", {
|
|
20
|
-
* csr: fs.readFileSync("/my/csr.pem"),
|
|
20
|
+
* csr: fs.readFileSync("/my/csr.pem", "utf8"),
|
|
21
21
|
* active: true,
|
|
22
22
|
* });
|
|
23
23
|
* ```
|
|
@@ -37,7 +37,7 @@ const utilities = require("../utilities");
|
|
|
37
37
|
* import * as fs from "fs";
|
|
38
38
|
*
|
|
39
39
|
* const cert = new aws.iot.Certificate("cert", {
|
|
40
|
-
* certificatePem: fs.readFileSync("/my/cert.pem"),
|
|
40
|
+
* certificatePem: fs.readFileSync("/my/cert.pem", "utf8"),
|
|
41
41
|
* active: true,
|
|
42
42
|
* });
|
|
43
43
|
* ```
|
|
@@ -20,7 +20,7 @@ import { Policy } from "./index";
|
|
|
20
20
|
* });
|
|
21
21
|
* const pubsubPolicy = new aws.iot.Policy("pubsubPolicy", {policy: pubsubPolicyDocument.then(pubsubPolicyDocument => pubsubPolicyDocument.json)});
|
|
22
22
|
* const cert = new aws.iot.Certificate("cert", {
|
|
23
|
-
* csr: fs.readFileSync("csr.pem"),
|
|
23
|
+
* csr: fs.readFileSync("csr.pem", "utf8"),
|
|
24
24
|
* active: true,
|
|
25
25
|
* });
|
|
26
26
|
* const att = new aws.iot.PolicyAttachment("att", {
|
package/iot/policyAttachment.js
CHANGED
|
@@ -24,7 +24,7 @@ const utilities = require("../utilities");
|
|
|
24
24
|
* });
|
|
25
25
|
* const pubsubPolicy = new aws.iot.Policy("pubsubPolicy", {policy: pubsubPolicyDocument.then(pubsubPolicyDocument => pubsubPolicyDocument.json)});
|
|
26
26
|
* const cert = new aws.iot.Certificate("cert", {
|
|
27
|
-
* csr: fs.readFileSync("csr.pem"),
|
|
27
|
+
* csr: fs.readFileSync("csr.pem", "utf8"),
|
|
28
28
|
* active: true,
|
|
29
29
|
* });
|
|
30
30
|
* const att = new aws.iot.PolicyAttachment("att", {
|
|
@@ -12,7 +12,7 @@ import { ARN } from "..";
|
|
|
12
12
|
*
|
|
13
13
|
* const example = new aws.iot.Thing("example", {});
|
|
14
14
|
* const cert = new aws.iot.Certificate("cert", {
|
|
15
|
-
* csr: fs.readFileSync("csr.pem"),
|
|
15
|
+
* csr: fs.readFileSync("csr.pem", "utf8"),
|
|
16
16
|
* active: true,
|
|
17
17
|
* });
|
|
18
18
|
* const att = new aws.iot.ThingPrincipalAttachment("att", {
|
|
@@ -17,7 +17,7 @@ const utilities = require("../utilities");
|
|
|
17
17
|
*
|
|
18
18
|
* const example = new aws.iot.Thing("example", {});
|
|
19
19
|
* const cert = new aws.iot.Certificate("cert", {
|
|
20
|
-
* csr: fs.readFileSync("csr.pem"),
|
|
20
|
+
* csr: fs.readFileSync("csr.pem", "utf8"),
|
|
21
21
|
* active: true,
|
|
22
22
|
* });
|
|
23
23
|
* const att = new aws.iot.ThingPrincipalAttachment("att", {
|
package/ivs/playbackKeyPair.d.ts
CHANGED
|
@@ -10,7 +10,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
10
10
|
* import * as aws from "@pulumi/aws";
|
|
11
11
|
* import * as fs from "fs";
|
|
12
12
|
*
|
|
13
|
-
* const example = new aws.ivs.PlaybackKeyPair("example", {publicKey: fs.readFileSync("./public-key.pem")});
|
|
13
|
+
* const example = new aws.ivs.PlaybackKeyPair("example", {publicKey: fs.readFileSync("./public-key.pem", "utf8")});
|
|
14
14
|
* ```
|
|
15
15
|
*
|
|
16
16
|
* ## Import
|
package/ivs/playbackKeyPair.js
CHANGED
|
@@ -16,7 +16,7 @@ const utilities = require("../utilities");
|
|
|
16
16
|
* import * as aws from "@pulumi/aws";
|
|
17
17
|
* import * as fs from "fs";
|
|
18
18
|
*
|
|
19
|
-
* const example = new aws.ivs.PlaybackKeyPair("example", {publicKey: fs.readFileSync("./public-key.pem")});
|
|
19
|
+
* const example = new aws.ivs.PlaybackKeyPair("example", {publicKey: fs.readFileSync("./public-key.pem", "utf8")});
|
|
20
20
|
* ```
|
|
21
21
|
*
|
|
22
22
|
* ## Import
|
package/kms/customKeyStore.d.ts
CHANGED
|
@@ -14,7 +14,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
14
14
|
* cloudHsmClusterId: _var.cloud_hsm_cluster_id,
|
|
15
15
|
* customKeyStoreName: "kms-custom-key-store-test",
|
|
16
16
|
* keyStorePassword: "noplaintextpasswords1",
|
|
17
|
-
* trustAnchorCertificate: fs.readFileSync("anchor-certificate.crt"),
|
|
17
|
+
* trustAnchorCertificate: fs.readFileSync("anchor-certificate.crt", "utf8"),
|
|
18
18
|
* });
|
|
19
19
|
* ```
|
|
20
20
|
*
|
package/kms/customKeyStore.js
CHANGED
|
@@ -20,7 +20,7 @@ const utilities = require("../utilities");
|
|
|
20
20
|
* cloudHsmClusterId: _var.cloud_hsm_cluster_id,
|
|
21
21
|
* customKeyStoreName: "kms-custom-key-store-test",
|
|
22
22
|
* keyStorePassword: "noplaintextpasswords1",
|
|
23
|
-
* trustAnchorCertificate: fs.readFileSync("anchor-certificate.crt"),
|
|
23
|
+
* trustAnchorCertificate: fs.readFileSync("anchor-certificate.crt", "utf8"),
|
|
24
24
|
* });
|
|
25
25
|
* ```
|
|
26
26
|
*
|
package/lightsail/keyPair.d.ts
CHANGED
|
@@ -31,7 +31,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
31
31
|
* import * as aws from "@pulumi/aws";
|
|
32
32
|
* import * as fs from "fs";
|
|
33
33
|
*
|
|
34
|
-
* const lgKeyPair = new aws.lightsail.KeyPair("lgKeyPair", {publicKey: fs.readFileSync("~/.ssh/id_rsa.pub")});
|
|
34
|
+
* const lgKeyPair = new aws.lightsail.KeyPair("lgKeyPair", {publicKey: fs.readFileSync("~/.ssh/id_rsa.pub", "utf8")});
|
|
35
35
|
* ```
|
|
36
36
|
*
|
|
37
37
|
* ## Import
|
package/lightsail/keyPair.js
CHANGED
|
@@ -37,7 +37,7 @@ const utilities = require("../utilities");
|
|
|
37
37
|
* import * as aws from "@pulumi/aws";
|
|
38
38
|
* import * as fs from "fs";
|
|
39
39
|
*
|
|
40
|
-
* const lgKeyPair = new aws.lightsail.KeyPair("lgKeyPair", {publicKey: fs.readFileSync("~/.ssh/id_rsa.pub")});
|
|
40
|
+
* const lgKeyPair = new aws.lightsail.KeyPair("lgKeyPair", {publicKey: fs.readFileSync("~/.ssh/id_rsa.pub", "utf8")});
|
|
41
41
|
* ```
|
|
42
42
|
*
|
|
43
43
|
* ## Import
|
|
@@ -39,7 +39,7 @@ import * as outputs from "../types/output";
|
|
|
39
39
|
* const example = new aws.networkfirewall.RuleGroup("example", {
|
|
40
40
|
* capacity: 100,
|
|
41
41
|
* type: "STATEFUL",
|
|
42
|
-
* rules: fs.readFileSync("example.rules"),
|
|
42
|
+
* rules: fs.readFileSync("example.rules", "utf8"),
|
|
43
43
|
* tags: {
|
|
44
44
|
* Tag1: "Value1",
|
|
45
45
|
* Tag2: "Value2",
|
|
@@ -87,7 +87,7 @@ import * as outputs from "../types/output";
|
|
|
87
87
|
* }],
|
|
88
88
|
* },
|
|
89
89
|
* rulesSource: {
|
|
90
|
-
* rulesString: fs.readFileSync("suricata_rules_file"),
|
|
90
|
+
* rulesString: fs.readFileSync("suricata_rules_file", "utf8"),
|
|
91
91
|
* },
|
|
92
92
|
* },
|
|
93
93
|
* tags: {
|
|
@@ -43,7 +43,7 @@ const utilities = require("../utilities");
|
|
|
43
43
|
* const example = new aws.networkfirewall.RuleGroup("example", {
|
|
44
44
|
* capacity: 100,
|
|
45
45
|
* type: "STATEFUL",
|
|
46
|
-
* rules: fs.readFileSync("example.rules"),
|
|
46
|
+
* rules: fs.readFileSync("example.rules", "utf8"),
|
|
47
47
|
* tags: {
|
|
48
48
|
* Tag1: "Value1",
|
|
49
49
|
* Tag2: "Value2",
|
|
@@ -91,7 +91,7 @@ const utilities = require("../utilities");
|
|
|
91
91
|
* }],
|
|
92
92
|
* },
|
|
93
93
|
* rulesSource: {
|
|
94
|
-
* rulesString: fs.readFileSync("suricata_rules_file"),
|
|
94
|
+
* rulesString: fs.readFileSync("suricata_rules_file", "utf8"),
|
|
95
95
|
* },
|
|
96
96
|
* },
|
|
97
97
|
* tags: {
|
|
@@ -30,7 +30,7 @@ import * as outputs from "../types/output";
|
|
|
30
30
|
* enabled: true,
|
|
31
31
|
* idp: {
|
|
32
32
|
* entityId: "https://example.com",
|
|
33
|
-
* metadataContent: fs.readFileSync("./saml-metadata.xml"),
|
|
33
|
+
* metadataContent: fs.readFileSync("./saml-metadata.xml", "utf8"),
|
|
34
34
|
* },
|
|
35
35
|
* },
|
|
36
36
|
* });
|
|
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
|
|
|
34
34
|
* enabled: true,
|
|
35
35
|
* idp: {
|
|
36
36
|
* entityId: "https://example.com",
|
|
37
|
-
* metadataContent: fs.readFileSync("./saml-metadata.xml"),
|
|
37
|
+
* metadataContent: fs.readFileSync("./saml-metadata.xml", "utf8"),
|
|
38
38
|
* },
|
|
39
39
|
* },
|
|
40
40
|
* });
|
|
@@ -32,8 +32,8 @@ import * as outputs from "../types/output";
|
|
|
32
32
|
* }],
|
|
33
33
|
* enableSsl: true,
|
|
34
34
|
* sslConfigurations: [{
|
|
35
|
-
* privateKey: fs.readFileSync("./foobar.key"),
|
|
36
|
-
* certificate: fs.readFileSync("./foobar.crt"),
|
|
35
|
+
* privateKey: fs.readFileSync("./foobar.key", "utf8"),
|
|
36
|
+
* certificate: fs.readFileSync("./foobar.crt", "utf8"),
|
|
37
37
|
* }],
|
|
38
38
|
* documentRoot: "public",
|
|
39
39
|
* autoBundleOnDeploy: "true",
|
package/opsworks/application.js
CHANGED
|
@@ -36,8 +36,8 @@ const utilities = require("../utilities");
|
|
|
36
36
|
* }],
|
|
37
37
|
* enableSsl: true,
|
|
38
38
|
* sslConfigurations: [{
|
|
39
|
-
* privateKey: fs.readFileSync("./foobar.key"),
|
|
40
|
-
* certificate: fs.readFileSync("./foobar.crt"),
|
|
39
|
+
* privateKey: fs.readFileSync("./foobar.key", "utf8"),
|
|
40
|
+
* certificate: fs.readFileSync("./foobar.crt", "utf8"),
|
|
41
41
|
* }],
|
|
42
42
|
* documentRoot: "public",
|
|
43
43
|
* autoBundleOnDeploy: "true",
|
package/package.json
CHANGED
|
@@ -13,8 +13,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
* const app = new aws.pinpoint.App("app", {});
|
|
14
14
|
* const apns = new aws.pinpoint.ApnsChannel("apns", {
|
|
15
15
|
* applicationId: app.applicationId,
|
|
16
|
-
* certificate: fs.readFileSync("./certificate.pem"),
|
|
17
|
-
* privateKey: fs.readFileSync("./private_key.key"),
|
|
16
|
+
* certificate: fs.readFileSync("./certificate.pem", "utf8"),
|
|
17
|
+
* privateKey: fs.readFileSync("./private_key.key", "utf8"),
|
|
18
18
|
* });
|
|
19
19
|
* ```
|
|
20
20
|
*
|
package/pinpoint/apnsChannel.js
CHANGED
|
@@ -19,8 +19,8 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* const app = new aws.pinpoint.App("app", {});
|
|
20
20
|
* const apns = new aws.pinpoint.ApnsChannel("apns", {
|
|
21
21
|
* applicationId: app.applicationId,
|
|
22
|
-
* certificate: fs.readFileSync("./certificate.pem"),
|
|
23
|
-
* privateKey: fs.readFileSync("./private_key.key"),
|
|
22
|
+
* certificate: fs.readFileSync("./certificate.pem", "utf8"),
|
|
23
|
+
* privateKey: fs.readFileSync("./private_key.key", "utf8"),
|
|
24
24
|
* });
|
|
25
25
|
* ```
|
|
26
26
|
*
|
|
@@ -13,8 +13,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
* const app = new aws.pinpoint.App("app", {});
|
|
14
14
|
* const apnsSandbox = new aws.pinpoint.ApnsSandboxChannel("apnsSandbox", {
|
|
15
15
|
* applicationId: app.applicationId,
|
|
16
|
-
* certificate: fs.readFileSync("./certificate.pem"),
|
|
17
|
-
* privateKey: fs.readFileSync("./private_key.key"),
|
|
16
|
+
* certificate: fs.readFileSync("./certificate.pem", "utf8"),
|
|
17
|
+
* privateKey: fs.readFileSync("./private_key.key", "utf8"),
|
|
18
18
|
* });
|
|
19
19
|
* ```
|
|
20
20
|
*
|
|
@@ -19,8 +19,8 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* const app = new aws.pinpoint.App("app", {});
|
|
20
20
|
* const apnsSandbox = new aws.pinpoint.ApnsSandboxChannel("apnsSandbox", {
|
|
21
21
|
* applicationId: app.applicationId,
|
|
22
|
-
* certificate: fs.readFileSync("./certificate.pem"),
|
|
23
|
-
* privateKey: fs.readFileSync("./private_key.key"),
|
|
22
|
+
* certificate: fs.readFileSync("./certificate.pem", "utf8"),
|
|
23
|
+
* privateKey: fs.readFileSync("./private_key.key", "utf8"),
|
|
24
24
|
* });
|
|
25
25
|
* ```
|
|
26
26
|
*
|
|
@@ -13,8 +13,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
* const app = new aws.pinpoint.App("app", {});
|
|
14
14
|
* const apnsVoip = new aws.pinpoint.ApnsVoipChannel("apnsVoip", {
|
|
15
15
|
* applicationId: app.applicationId,
|
|
16
|
-
* certificate: fs.readFileSync("./certificate.pem"),
|
|
17
|
-
* privateKey: fs.readFileSync("./private_key.key"),
|
|
16
|
+
* certificate: fs.readFileSync("./certificate.pem", "utf8"),
|
|
17
|
+
* privateKey: fs.readFileSync("./private_key.key", "utf8"),
|
|
18
18
|
* });
|
|
19
19
|
* ```
|
|
20
20
|
*
|
|
@@ -19,8 +19,8 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* const app = new aws.pinpoint.App("app", {});
|
|
20
20
|
* const apnsVoip = new aws.pinpoint.ApnsVoipChannel("apnsVoip", {
|
|
21
21
|
* applicationId: app.applicationId,
|
|
22
|
-
* certificate: fs.readFileSync("./certificate.pem"),
|
|
23
|
-
* privateKey: fs.readFileSync("./private_key.key"),
|
|
22
|
+
* certificate: fs.readFileSync("./certificate.pem", "utf8"),
|
|
23
|
+
* privateKey: fs.readFileSync("./private_key.key", "utf8"),
|
|
24
24
|
* });
|
|
25
25
|
* ```
|
|
26
26
|
*
|
|
@@ -13,8 +13,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
* const app = new aws.pinpoint.App("app", {});
|
|
14
14
|
* const apnsVoipSandbox = new aws.pinpoint.ApnsVoipSandboxChannel("apnsVoipSandbox", {
|
|
15
15
|
* applicationId: app.applicationId,
|
|
16
|
-
* certificate: fs.readFileSync("./certificate.pem"),
|
|
17
|
-
* privateKey: fs.readFileSync("./private_key.key"),
|
|
16
|
+
* certificate: fs.readFileSync("./certificate.pem", "utf8"),
|
|
17
|
+
* privateKey: fs.readFileSync("./private_key.key", "utf8"),
|
|
18
18
|
* });
|
|
19
19
|
* ```
|
|
20
20
|
*
|
|
@@ -19,8 +19,8 @@ const utilities = require("../utilities");
|
|
|
19
19
|
* const app = new aws.pinpoint.App("app", {});
|
|
20
20
|
* const apnsVoipSandbox = new aws.pinpoint.ApnsVoipSandboxChannel("apnsVoipSandbox", {
|
|
21
21
|
* applicationId: app.applicationId,
|
|
22
|
-
* certificate: fs.readFileSync("./certificate.pem"),
|
|
23
|
-
* privateKey: fs.readFileSync("./private_key.key"),
|
|
22
|
+
* certificate: fs.readFileSync("./certificate.pem", "utf8"),
|
|
23
|
+
* privateKey: fs.readFileSync("./private_key.key", "utf8"),
|
|
24
24
|
* });
|
|
25
25
|
* ```
|
|
26
26
|
*
|
package/s3/bucket.d.ts
CHANGED
|
@@ -32,7 +32,7 @@ import { PolicyDocument } from "../iam";
|
|
|
32
32
|
*
|
|
33
33
|
* const bucket = new aws.s3.Bucket("bucket", {
|
|
34
34
|
* acl: "public-read",
|
|
35
|
-
* policy: fs.readFileSync("policy.json"),
|
|
35
|
+
* policy: fs.readFileSync("policy.json", "utf8"),
|
|
36
36
|
* website: {
|
|
37
37
|
* indexDocument: "index.html",
|
|
38
38
|
* errorDocument: "error.html",
|
package/s3/bucket.js
CHANGED
|
@@ -34,7 +34,7 @@ const utilities = require("../utilities");
|
|
|
34
34
|
*
|
|
35
35
|
* const bucket = new aws.s3.Bucket("bucket", {
|
|
36
36
|
* acl: "public-read",
|
|
37
|
-
* policy: fs.readFileSync("policy.json"),
|
|
37
|
+
* policy: fs.readFileSync("policy.json", "utf8"),
|
|
38
38
|
* website: {
|
|
39
39
|
* indexDocument: "index.html",
|
|
40
40
|
* errorDocument: "error.html",
|
|
@@ -0,0 +1,198 @@
|
|
|
1
|
+
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
import * as inputs from "../types/input";
|
|
3
|
+
import * as outputs from "../types/output";
|
|
4
|
+
/**
|
|
5
|
+
* Provides a resource to manage an S3 Access Grant.
|
|
6
|
+
* Each access grant has its own ID and gives an IAM user or role or a directory user, or group (the grantee) access to a registered location. You determine the level of access, such as `READ` or `READWRITE`.
|
|
7
|
+
* Before you can create a grant, you must have an S3 Access Grants instance in the same Region as the S3 data.
|
|
8
|
+
*
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as aws from "@pulumi/aws";
|
|
14
|
+
*
|
|
15
|
+
* const exampleAccessGrantsInstance = new aws.s3control.AccessGrantsInstance("exampleAccessGrantsInstance", {});
|
|
16
|
+
* const exampleAccessGrantsLocation = new aws.s3control.AccessGrantsLocation("exampleAccessGrantsLocation", {
|
|
17
|
+
* iamRoleArn: aws_iam_role.example.arn,
|
|
18
|
+
* locationScope: `s3://${aws_s3_bucket.example.bucket}/prefixA*`,
|
|
19
|
+
* }, {
|
|
20
|
+
* dependsOn: [exampleAccessGrantsInstance],
|
|
21
|
+
* });
|
|
22
|
+
* const exampleAccessGrant = new aws.s3control.AccessGrant("exampleAccessGrant", {
|
|
23
|
+
* accessGrantsLocationId: exampleAccessGrantsLocation.accessGrantsLocationId,
|
|
24
|
+
* permission: "READ",
|
|
25
|
+
* accessGrantsLocationConfiguration: {
|
|
26
|
+
* s3SubPrefix: "prefixB*",
|
|
27
|
+
* },
|
|
28
|
+
* grantee: {
|
|
29
|
+
* granteeType: "IAM",
|
|
30
|
+
* granteeIdentifier: aws_iam_user.example.arn,
|
|
31
|
+
* },
|
|
32
|
+
* });
|
|
33
|
+
* ```
|
|
34
|
+
*
|
|
35
|
+
* ## Import
|
|
36
|
+
*
|
|
37
|
+
* Using `pulumi import`, import S3 Access Grants using the `account_id` and `access_grant_id`, separated by a comma (`,`). For example:
|
|
38
|
+
*
|
|
39
|
+
* ```sh
|
|
40
|
+
* $ pulumi import aws:s3control/accessGrant:AccessGrant example 123456789012,04549c5e-2f3c-4a07-824d-2cafe720aa22
|
|
41
|
+
* ```
|
|
42
|
+
*/
|
|
43
|
+
export declare class AccessGrant extends pulumi.CustomResource {
|
|
44
|
+
/**
|
|
45
|
+
* Get an existing AccessGrant resource's state with the given name, ID, and optional extra
|
|
46
|
+
* properties used to qualify the lookup.
|
|
47
|
+
*
|
|
48
|
+
* @param name The _unique_ name of the resulting resource.
|
|
49
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
50
|
+
* @param state Any extra arguments used during the lookup.
|
|
51
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
52
|
+
*/
|
|
53
|
+
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: AccessGrantState, opts?: pulumi.CustomResourceOptions): AccessGrant;
|
|
54
|
+
/**
|
|
55
|
+
* Returns true if the given object is an instance of AccessGrant. This is designed to work even
|
|
56
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
57
|
+
*/
|
|
58
|
+
static isInstance(obj: any): obj is AccessGrant;
|
|
59
|
+
/**
|
|
60
|
+
* Amazon Resource Name (ARN) of the S3 Access Grant.
|
|
61
|
+
*/
|
|
62
|
+
readonly accessGrantArn: pulumi.Output<string>;
|
|
63
|
+
/**
|
|
64
|
+
* Unique ID of the S3 Access Grant.
|
|
65
|
+
*/
|
|
66
|
+
readonly accessGrantId: pulumi.Output<string>;
|
|
67
|
+
/**
|
|
68
|
+
* See Location Configuration below for more details.
|
|
69
|
+
*/
|
|
70
|
+
readonly accessGrantsLocationConfiguration: pulumi.Output<outputs.s3control.AccessGrantAccessGrantsLocationConfiguration | undefined>;
|
|
71
|
+
/**
|
|
72
|
+
* The ID of the S3 Access Grants location to with the access grant is giving access.
|
|
73
|
+
*/
|
|
74
|
+
readonly accessGrantsLocationId: pulumi.Output<string>;
|
|
75
|
+
readonly accountId: pulumi.Output<string>;
|
|
76
|
+
/**
|
|
77
|
+
* The access grant's scope.
|
|
78
|
+
*/
|
|
79
|
+
readonly grantScope: pulumi.Output<string>;
|
|
80
|
+
/**
|
|
81
|
+
* See Grantee below for more details.
|
|
82
|
+
*/
|
|
83
|
+
readonly grantee: pulumi.Output<outputs.s3control.AccessGrantGrantee | undefined>;
|
|
84
|
+
/**
|
|
85
|
+
* The access grant's level of access. Valid values: `READ`, `WRITE`, `READWRITE`.
|
|
86
|
+
*/
|
|
87
|
+
readonly permission: pulumi.Output<string>;
|
|
88
|
+
/**
|
|
89
|
+
* If you are creating an access grant that grants access to only one object, set this to `Object`. Valid values: `Object`.
|
|
90
|
+
*/
|
|
91
|
+
readonly s3PrefixType: pulumi.Output<string | undefined>;
|
|
92
|
+
/**
|
|
93
|
+
* Key-value map of resource tags. If configured with a provider `defaultTags` configuration block present, tags with matching keys will overwrite those defined at the provider-level.
|
|
94
|
+
*/
|
|
95
|
+
readonly tags: pulumi.Output<{
|
|
96
|
+
[key: string]: string;
|
|
97
|
+
} | undefined>;
|
|
98
|
+
/**
|
|
99
|
+
* A map of tags assigned to the resource, including those inherited from the provider `defaultTags` configuration block.
|
|
100
|
+
*
|
|
101
|
+
* @deprecated Please use `tags` instead.
|
|
102
|
+
*/
|
|
103
|
+
readonly tagsAll: pulumi.Output<{
|
|
104
|
+
[key: string]: string;
|
|
105
|
+
}>;
|
|
106
|
+
/**
|
|
107
|
+
* Create a AccessGrant resource with the given unique name, arguments, and options.
|
|
108
|
+
*
|
|
109
|
+
* @param name The _unique_ name of the resource.
|
|
110
|
+
* @param args The arguments to use to populate this resource's properties.
|
|
111
|
+
* @param opts A bag of options that control this resource's behavior.
|
|
112
|
+
*/
|
|
113
|
+
constructor(name: string, args: AccessGrantArgs, opts?: pulumi.CustomResourceOptions);
|
|
114
|
+
}
|
|
115
|
+
/**
|
|
116
|
+
* Input properties used for looking up and filtering AccessGrant resources.
|
|
117
|
+
*/
|
|
118
|
+
export interface AccessGrantState {
|
|
119
|
+
/**
|
|
120
|
+
* Amazon Resource Name (ARN) of the S3 Access Grant.
|
|
121
|
+
*/
|
|
122
|
+
accessGrantArn?: pulumi.Input<string>;
|
|
123
|
+
/**
|
|
124
|
+
* Unique ID of the S3 Access Grant.
|
|
125
|
+
*/
|
|
126
|
+
accessGrantId?: pulumi.Input<string>;
|
|
127
|
+
/**
|
|
128
|
+
* See Location Configuration below for more details.
|
|
129
|
+
*/
|
|
130
|
+
accessGrantsLocationConfiguration?: pulumi.Input<inputs.s3control.AccessGrantAccessGrantsLocationConfiguration>;
|
|
131
|
+
/**
|
|
132
|
+
* The ID of the S3 Access Grants location to with the access grant is giving access.
|
|
133
|
+
*/
|
|
134
|
+
accessGrantsLocationId?: pulumi.Input<string>;
|
|
135
|
+
accountId?: pulumi.Input<string>;
|
|
136
|
+
/**
|
|
137
|
+
* The access grant's scope.
|
|
138
|
+
*/
|
|
139
|
+
grantScope?: pulumi.Input<string>;
|
|
140
|
+
/**
|
|
141
|
+
* See Grantee below for more details.
|
|
142
|
+
*/
|
|
143
|
+
grantee?: pulumi.Input<inputs.s3control.AccessGrantGrantee>;
|
|
144
|
+
/**
|
|
145
|
+
* The access grant's level of access. Valid values: `READ`, `WRITE`, `READWRITE`.
|
|
146
|
+
*/
|
|
147
|
+
permission?: pulumi.Input<string>;
|
|
148
|
+
/**
|
|
149
|
+
* If you are creating an access grant that grants access to only one object, set this to `Object`. Valid values: `Object`.
|
|
150
|
+
*/
|
|
151
|
+
s3PrefixType?: pulumi.Input<string>;
|
|
152
|
+
/**
|
|
153
|
+
* Key-value map of resource tags. If configured with a provider `defaultTags` configuration block present, tags with matching keys will overwrite those defined at the provider-level.
|
|
154
|
+
*/
|
|
155
|
+
tags?: pulumi.Input<{
|
|
156
|
+
[key: string]: pulumi.Input<string>;
|
|
157
|
+
}>;
|
|
158
|
+
/**
|
|
159
|
+
* A map of tags assigned to the resource, including those inherited from the provider `defaultTags` configuration block.
|
|
160
|
+
*
|
|
161
|
+
* @deprecated Please use `tags` instead.
|
|
162
|
+
*/
|
|
163
|
+
tagsAll?: pulumi.Input<{
|
|
164
|
+
[key: string]: pulumi.Input<string>;
|
|
165
|
+
}>;
|
|
166
|
+
}
|
|
167
|
+
/**
|
|
168
|
+
* The set of arguments for constructing a AccessGrant resource.
|
|
169
|
+
*/
|
|
170
|
+
export interface AccessGrantArgs {
|
|
171
|
+
/**
|
|
172
|
+
* See Location Configuration below for more details.
|
|
173
|
+
*/
|
|
174
|
+
accessGrantsLocationConfiguration?: pulumi.Input<inputs.s3control.AccessGrantAccessGrantsLocationConfiguration>;
|
|
175
|
+
/**
|
|
176
|
+
* The ID of the S3 Access Grants location to with the access grant is giving access.
|
|
177
|
+
*/
|
|
178
|
+
accessGrantsLocationId: pulumi.Input<string>;
|
|
179
|
+
accountId?: pulumi.Input<string>;
|
|
180
|
+
/**
|
|
181
|
+
* See Grantee below for more details.
|
|
182
|
+
*/
|
|
183
|
+
grantee?: pulumi.Input<inputs.s3control.AccessGrantGrantee>;
|
|
184
|
+
/**
|
|
185
|
+
* The access grant's level of access. Valid values: `READ`, `WRITE`, `READWRITE`.
|
|
186
|
+
*/
|
|
187
|
+
permission: pulumi.Input<string>;
|
|
188
|
+
/**
|
|
189
|
+
* If you are creating an access grant that grants access to only one object, set this to `Object`. Valid values: `Object`.
|
|
190
|
+
*/
|
|
191
|
+
s3PrefixType?: pulumi.Input<string>;
|
|
192
|
+
/**
|
|
193
|
+
* Key-value map of resource tags. If configured with a provider `defaultTags` configuration block present, tags with matching keys will overwrite those defined at the provider-level.
|
|
194
|
+
*/
|
|
195
|
+
tags?: pulumi.Input<{
|
|
196
|
+
[key: string]: pulumi.Input<string>;
|
|
197
|
+
}>;
|
|
198
|
+
}
|
|
@@ -0,0 +1,116 @@
|
|
|
1
|
+
"use strict";
|
|
2
|
+
// *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
+
// *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
+
Object.defineProperty(exports, "__esModule", { value: true });
|
|
5
|
+
exports.AccessGrant = void 0;
|
|
6
|
+
const pulumi = require("@pulumi/pulumi");
|
|
7
|
+
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Provides a resource to manage an S3 Access Grant.
|
|
10
|
+
* Each access grant has its own ID and gives an IAM user or role or a directory user, or group (the grantee) access to a registered location. You determine the level of access, such as `READ` or `READWRITE`.
|
|
11
|
+
* Before you can create a grant, you must have an S3 Access Grants instance in the same Region as the S3 data.
|
|
12
|
+
*
|
|
13
|
+
* ## Example Usage
|
|
14
|
+
*
|
|
15
|
+
* ```typescript
|
|
16
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
+
* import * as aws from "@pulumi/aws";
|
|
18
|
+
*
|
|
19
|
+
* const exampleAccessGrantsInstance = new aws.s3control.AccessGrantsInstance("exampleAccessGrantsInstance", {});
|
|
20
|
+
* const exampleAccessGrantsLocation = new aws.s3control.AccessGrantsLocation("exampleAccessGrantsLocation", {
|
|
21
|
+
* iamRoleArn: aws_iam_role.example.arn,
|
|
22
|
+
* locationScope: `s3://${aws_s3_bucket.example.bucket}/prefixA*`,
|
|
23
|
+
* }, {
|
|
24
|
+
* dependsOn: [exampleAccessGrantsInstance],
|
|
25
|
+
* });
|
|
26
|
+
* const exampleAccessGrant = new aws.s3control.AccessGrant("exampleAccessGrant", {
|
|
27
|
+
* accessGrantsLocationId: exampleAccessGrantsLocation.accessGrantsLocationId,
|
|
28
|
+
* permission: "READ",
|
|
29
|
+
* accessGrantsLocationConfiguration: {
|
|
30
|
+
* s3SubPrefix: "prefixB*",
|
|
31
|
+
* },
|
|
32
|
+
* grantee: {
|
|
33
|
+
* granteeType: "IAM",
|
|
34
|
+
* granteeIdentifier: aws_iam_user.example.arn,
|
|
35
|
+
* },
|
|
36
|
+
* });
|
|
37
|
+
* ```
|
|
38
|
+
*
|
|
39
|
+
* ## Import
|
|
40
|
+
*
|
|
41
|
+
* Using `pulumi import`, import S3 Access Grants using the `account_id` and `access_grant_id`, separated by a comma (`,`). For example:
|
|
42
|
+
*
|
|
43
|
+
* ```sh
|
|
44
|
+
* $ pulumi import aws:s3control/accessGrant:AccessGrant example 123456789012,04549c5e-2f3c-4a07-824d-2cafe720aa22
|
|
45
|
+
* ```
|
|
46
|
+
*/
|
|
47
|
+
class AccessGrant extends pulumi.CustomResource {
|
|
48
|
+
/**
|
|
49
|
+
* Get an existing AccessGrant resource's state with the given name, ID, and optional extra
|
|
50
|
+
* properties used to qualify the lookup.
|
|
51
|
+
*
|
|
52
|
+
* @param name The _unique_ name of the resulting resource.
|
|
53
|
+
* @param id The _unique_ provider ID of the resource to lookup.
|
|
54
|
+
* @param state Any extra arguments used during the lookup.
|
|
55
|
+
* @param opts Optional settings to control the behavior of the CustomResource.
|
|
56
|
+
*/
|
|
57
|
+
static get(name, id, state, opts) {
|
|
58
|
+
return new AccessGrant(name, state, Object.assign(Object.assign({}, opts), { id: id }));
|
|
59
|
+
}
|
|
60
|
+
/**
|
|
61
|
+
* Returns true if the given object is an instance of AccessGrant. This is designed to work even
|
|
62
|
+
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
63
|
+
*/
|
|
64
|
+
static isInstance(obj) {
|
|
65
|
+
if (obj === undefined || obj === null) {
|
|
66
|
+
return false;
|
|
67
|
+
}
|
|
68
|
+
return obj['__pulumiType'] === AccessGrant.__pulumiType;
|
|
69
|
+
}
|
|
70
|
+
constructor(name, argsOrState, opts) {
|
|
71
|
+
let resourceInputs = {};
|
|
72
|
+
opts = opts || {};
|
|
73
|
+
if (opts.id) {
|
|
74
|
+
const state = argsOrState;
|
|
75
|
+
resourceInputs["accessGrantArn"] = state ? state.accessGrantArn : undefined;
|
|
76
|
+
resourceInputs["accessGrantId"] = state ? state.accessGrantId : undefined;
|
|
77
|
+
resourceInputs["accessGrantsLocationConfiguration"] = state ? state.accessGrantsLocationConfiguration : undefined;
|
|
78
|
+
resourceInputs["accessGrantsLocationId"] = state ? state.accessGrantsLocationId : undefined;
|
|
79
|
+
resourceInputs["accountId"] = state ? state.accountId : undefined;
|
|
80
|
+
resourceInputs["grantScope"] = state ? state.grantScope : undefined;
|
|
81
|
+
resourceInputs["grantee"] = state ? state.grantee : undefined;
|
|
82
|
+
resourceInputs["permission"] = state ? state.permission : undefined;
|
|
83
|
+
resourceInputs["s3PrefixType"] = state ? state.s3PrefixType : undefined;
|
|
84
|
+
resourceInputs["tags"] = state ? state.tags : undefined;
|
|
85
|
+
resourceInputs["tagsAll"] = state ? state.tagsAll : undefined;
|
|
86
|
+
}
|
|
87
|
+
else {
|
|
88
|
+
const args = argsOrState;
|
|
89
|
+
if ((!args || args.accessGrantsLocationId === undefined) && !opts.urn) {
|
|
90
|
+
throw new Error("Missing required property 'accessGrantsLocationId'");
|
|
91
|
+
}
|
|
92
|
+
if ((!args || args.permission === undefined) && !opts.urn) {
|
|
93
|
+
throw new Error("Missing required property 'permission'");
|
|
94
|
+
}
|
|
95
|
+
resourceInputs["accessGrantsLocationConfiguration"] = args ? args.accessGrantsLocationConfiguration : undefined;
|
|
96
|
+
resourceInputs["accessGrantsLocationId"] = args ? args.accessGrantsLocationId : undefined;
|
|
97
|
+
resourceInputs["accountId"] = args ? args.accountId : undefined;
|
|
98
|
+
resourceInputs["grantee"] = args ? args.grantee : undefined;
|
|
99
|
+
resourceInputs["permission"] = args ? args.permission : undefined;
|
|
100
|
+
resourceInputs["s3PrefixType"] = args ? args.s3PrefixType : undefined;
|
|
101
|
+
resourceInputs["tags"] = args ? args.tags : undefined;
|
|
102
|
+
resourceInputs["accessGrantArn"] = undefined /*out*/;
|
|
103
|
+
resourceInputs["accessGrantId"] = undefined /*out*/;
|
|
104
|
+
resourceInputs["grantScope"] = undefined /*out*/;
|
|
105
|
+
resourceInputs["tagsAll"] = undefined /*out*/;
|
|
106
|
+
}
|
|
107
|
+
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
|
|
108
|
+
const secretOpts = { additionalSecretOutputs: ["tagsAll"] };
|
|
109
|
+
opts = pulumi.mergeOptions(opts, secretOpts);
|
|
110
|
+
super(AccessGrant.__pulumiType, name, resourceInputs, opts);
|
|
111
|
+
}
|
|
112
|
+
}
|
|
113
|
+
exports.AccessGrant = AccessGrant;
|
|
114
|
+
/** @internal */
|
|
115
|
+
AccessGrant.__pulumiType = 'aws:s3control/accessGrant:AccessGrant';
|
|
116
|
+
//# sourceMappingURL=accessGrant.js.map
|