@pulumi/aws 6.70.0 → 6.70.1-alpha.1741108905
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/acm/certificate.d.ts +4 -4
- package/acm/certificate.js +4 -4
- package/acmpca/certificate.d.ts +4 -4
- package/acmpca/certificate.js +4 -4
- package/eks/addon.d.ts +0 -46
- package/eks/addon.js +0 -46
- package/eks/addon.js.map +1 -1
- package/iot/caCertificate.d.ts +10 -10
- package/iot/caCertificate.js +10 -10
- package/iot/getRegistrationCode.d.ts +10 -10
- package/iot/getRegistrationCode.js +10 -10
- package/package.json +2 -2
- package/transfer/sshKey.d.ts +3 -3
- package/transfer/sshKey.js +3 -3
package/acm/certificate.d.ts
CHANGED
|
@@ -65,14 +65,14 @@ import * as outputs from "../types/output";
|
|
|
65
65
|
* import * as aws from "@pulumi/aws";
|
|
66
66
|
* import * as tls from "@pulumi/tls";
|
|
67
67
|
*
|
|
68
|
-
* const example = new tls.PrivateKey("example", {algorithm: "RSA"});
|
|
69
|
-
* const exampleSelfSignedCert = new tls.SelfSignedCert("example", {
|
|
68
|
+
* const example = new tls.index.PrivateKey("example", {algorithm: "RSA"});
|
|
69
|
+
* const exampleSelfSignedCert = new tls.index.SelfSignedCert("example", {
|
|
70
70
|
* keyAlgorithm: "RSA",
|
|
71
71
|
* privateKeyPem: example.privateKeyPem,
|
|
72
|
-
* subject: {
|
|
72
|
+
* subject: [{
|
|
73
73
|
* commonName: "example.com",
|
|
74
74
|
* organization: "ACME Examples, Inc",
|
|
75
|
-
* },
|
|
75
|
+
* }],
|
|
76
76
|
* validityPeriodHours: 12,
|
|
77
77
|
* allowedUses: [
|
|
78
78
|
* "key_encipherment",
|
package/acm/certificate.js
CHANGED
|
@@ -69,14 +69,14 @@ const utilities = require("../utilities");
|
|
|
69
69
|
* import * as aws from "@pulumi/aws";
|
|
70
70
|
* import * as tls from "@pulumi/tls";
|
|
71
71
|
*
|
|
72
|
-
* const example = new tls.PrivateKey("example", {algorithm: "RSA"});
|
|
73
|
-
* const exampleSelfSignedCert = new tls.SelfSignedCert("example", {
|
|
72
|
+
* const example = new tls.index.PrivateKey("example", {algorithm: "RSA"});
|
|
73
|
+
* const exampleSelfSignedCert = new tls.index.SelfSignedCert("example", {
|
|
74
74
|
* keyAlgorithm: "RSA",
|
|
75
75
|
* privateKeyPem: example.privateKeyPem,
|
|
76
|
-
* subject: {
|
|
76
|
+
* subject: [{
|
|
77
77
|
* commonName: "example.com",
|
|
78
78
|
* organization: "ACME Examples, Inc",
|
|
79
|
-
* },
|
|
79
|
+
* }],
|
|
80
80
|
* validityPeriodHours: 12,
|
|
81
81
|
* allowedUses: [
|
|
82
82
|
* "key_encipherment",
|
package/acmpca/certificate.d.ts
CHANGED
|
@@ -28,12 +28,12 @@ import * as outputs from "../types/output";
|
|
|
28
28
|
* },
|
|
29
29
|
* permanentDeletionTimeInDays: 7,
|
|
30
30
|
* });
|
|
31
|
-
* const key = new tls.PrivateKey("key", {algorithm: "RSA"});
|
|
32
|
-
* const csr = new tls.CertRequest("csr", {
|
|
31
|
+
* const key = new tls.index.PrivateKey("key", {algorithm: "RSA"});
|
|
32
|
+
* const csr = new tls.index.CertRequest("csr", {
|
|
33
33
|
* privateKeyPem: key.privateKeyPem,
|
|
34
|
-
* subject: {
|
|
34
|
+
* subject: [{
|
|
35
35
|
* commonName: "example",
|
|
36
|
-
* },
|
|
36
|
+
* }],
|
|
37
37
|
* });
|
|
38
38
|
* const example = new aws.acmpca.Certificate("example", {
|
|
39
39
|
* certificateAuthorityArn: exampleCertificateAuthority.arn,
|
package/acmpca/certificate.js
CHANGED
|
@@ -32,12 +32,12 @@ const utilities = require("../utilities");
|
|
|
32
32
|
* },
|
|
33
33
|
* permanentDeletionTimeInDays: 7,
|
|
34
34
|
* });
|
|
35
|
-
* const key = new tls.PrivateKey("key", {algorithm: "RSA"});
|
|
36
|
-
* const csr = new tls.CertRequest("csr", {
|
|
35
|
+
* const key = new tls.index.PrivateKey("key", {algorithm: "RSA"});
|
|
36
|
+
* const csr = new tls.index.CertRequest("csr", {
|
|
37
37
|
* privateKeyPem: key.privateKeyPem,
|
|
38
|
-
* subject: {
|
|
38
|
+
* subject: [{
|
|
39
39
|
* commonName: "example",
|
|
40
|
-
* },
|
|
40
|
+
* }],
|
|
41
41
|
* });
|
|
42
42
|
* const example = new aws.acmpca.Certificate("example", {
|
|
43
43
|
* certificateAuthorityArn: exampleCertificateAuthority.arn,
|
package/eks/addon.d.ts
CHANGED
|
@@ -68,52 +68,6 @@ import * as outputs from "../types/output";
|
|
|
68
68
|
* });
|
|
69
69
|
* ```
|
|
70
70
|
*
|
|
71
|
-
* ### Example IAM Role for EKS Addon "vpc-cni" with AWS managed policy
|
|
72
|
-
*
|
|
73
|
-
* ```typescript
|
|
74
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
75
|
-
* import * as aws from "@pulumi/aws";
|
|
76
|
-
* import * as std from "@pulumi/std";
|
|
77
|
-
* import * as tls from "@pulumi/tls";
|
|
78
|
-
*
|
|
79
|
-
* const exampleCluster = new aws.eks.Cluster("example", {});
|
|
80
|
-
* const example = exampleCluster.identities.apply(identities => tls.getCertificateOutput({
|
|
81
|
-
* url: identities[0].oidcs?.[0]?.issuer,
|
|
82
|
-
* }));
|
|
83
|
-
* const exampleOpenIdConnectProvider = new aws.iam.OpenIdConnectProvider("example", {
|
|
84
|
-
* clientIdLists: ["sts.amazonaws.com"],
|
|
85
|
-
* thumbprintLists: [example.apply(example => example.certificates?.[0]?.sha1Fingerprint)],
|
|
86
|
-
* url: exampleCluster.identities.apply(identities => identities[0].oidcs?.[0]?.issuer),
|
|
87
|
-
* });
|
|
88
|
-
* const exampleAssumeRolePolicy = aws.iam.getPolicyDocumentOutput({
|
|
89
|
-
* statements: [{
|
|
90
|
-
* actions: ["sts:AssumeRoleWithWebIdentity"],
|
|
91
|
-
* effect: "Allow",
|
|
92
|
-
* conditions: [{
|
|
93
|
-
* test: "StringEquals",
|
|
94
|
-
* variable: std.replaceOutput({
|
|
95
|
-
* text: exampleOpenIdConnectProvider.url,
|
|
96
|
-
* search: "https://",
|
|
97
|
-
* replace: "",
|
|
98
|
-
* }).apply(invoke => `${invoke.result}:sub`),
|
|
99
|
-
* values: ["system:serviceaccount:kube-system:aws-node"],
|
|
100
|
-
* }],
|
|
101
|
-
* principals: [{
|
|
102
|
-
* identifiers: [exampleOpenIdConnectProvider.arn],
|
|
103
|
-
* type: "Federated",
|
|
104
|
-
* }],
|
|
105
|
-
* }],
|
|
106
|
-
* });
|
|
107
|
-
* const exampleRole = new aws.iam.Role("example", {
|
|
108
|
-
* assumeRolePolicy: exampleAssumeRolePolicy.apply(exampleAssumeRolePolicy => exampleAssumeRolePolicy.json),
|
|
109
|
-
* name: "example-vpc-cni-role",
|
|
110
|
-
* });
|
|
111
|
-
* const exampleRolePolicyAttachment = new aws.iam.RolePolicyAttachment("example", {
|
|
112
|
-
* policyArn: "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
|
|
113
|
-
* role: exampleRole.name,
|
|
114
|
-
* });
|
|
115
|
-
* ```
|
|
116
|
-
*
|
|
117
71
|
* ## Import
|
|
118
72
|
*
|
|
119
73
|
* Using `pulumi import`, import EKS add-on using the `cluster_name` and `addon_name` separated by a colon (`:`). For example:
|
package/eks/addon.js
CHANGED
|
@@ -72,52 +72,6 @@ const utilities = require("../utilities");
|
|
|
72
72
|
* });
|
|
73
73
|
* ```
|
|
74
74
|
*
|
|
75
|
-
* ### Example IAM Role for EKS Addon "vpc-cni" with AWS managed policy
|
|
76
|
-
*
|
|
77
|
-
* ```typescript
|
|
78
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
79
|
-
* import * as aws from "@pulumi/aws";
|
|
80
|
-
* import * as std from "@pulumi/std";
|
|
81
|
-
* import * as tls from "@pulumi/tls";
|
|
82
|
-
*
|
|
83
|
-
* const exampleCluster = new aws.eks.Cluster("example", {});
|
|
84
|
-
* const example = exampleCluster.identities.apply(identities => tls.getCertificateOutput({
|
|
85
|
-
* url: identities[0].oidcs?.[0]?.issuer,
|
|
86
|
-
* }));
|
|
87
|
-
* const exampleOpenIdConnectProvider = new aws.iam.OpenIdConnectProvider("example", {
|
|
88
|
-
* clientIdLists: ["sts.amazonaws.com"],
|
|
89
|
-
* thumbprintLists: [example.apply(example => example.certificates?.[0]?.sha1Fingerprint)],
|
|
90
|
-
* url: exampleCluster.identities.apply(identities => identities[0].oidcs?.[0]?.issuer),
|
|
91
|
-
* });
|
|
92
|
-
* const exampleAssumeRolePolicy = aws.iam.getPolicyDocumentOutput({
|
|
93
|
-
* statements: [{
|
|
94
|
-
* actions: ["sts:AssumeRoleWithWebIdentity"],
|
|
95
|
-
* effect: "Allow",
|
|
96
|
-
* conditions: [{
|
|
97
|
-
* test: "StringEquals",
|
|
98
|
-
* variable: std.replaceOutput({
|
|
99
|
-
* text: exampleOpenIdConnectProvider.url,
|
|
100
|
-
* search: "https://",
|
|
101
|
-
* replace: "",
|
|
102
|
-
* }).apply(invoke => `${invoke.result}:sub`),
|
|
103
|
-
* values: ["system:serviceaccount:kube-system:aws-node"],
|
|
104
|
-
* }],
|
|
105
|
-
* principals: [{
|
|
106
|
-
* identifiers: [exampleOpenIdConnectProvider.arn],
|
|
107
|
-
* type: "Federated",
|
|
108
|
-
* }],
|
|
109
|
-
* }],
|
|
110
|
-
* });
|
|
111
|
-
* const exampleRole = new aws.iam.Role("example", {
|
|
112
|
-
* assumeRolePolicy: exampleAssumeRolePolicy.apply(exampleAssumeRolePolicy => exampleAssumeRolePolicy.json),
|
|
113
|
-
* name: "example-vpc-cni-role",
|
|
114
|
-
* });
|
|
115
|
-
* const exampleRolePolicyAttachment = new aws.iam.RolePolicyAttachment("example", {
|
|
116
|
-
* policyArn: "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
|
|
117
|
-
* role: exampleRole.name,
|
|
118
|
-
* });
|
|
119
|
-
* ```
|
|
120
|
-
*
|
|
121
75
|
* ## Import
|
|
122
76
|
*
|
|
123
77
|
* Using `pulumi import`, import EKS add-on using the `cluster_name` and `addon_name` separated by a colon (`:`). For example:
|
package/eks/addon.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"addon.js","sourceRoot":"","sources":["../../eks/addon.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAIzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"addon.js","sourceRoot":"","sources":["../../eks/addon.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAIzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0EG;AACH,MAAa,KAAM,SAAQ,MAAM,CAAC,cAAc;IAC5C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkB,EAAE,IAAmC;QAChH,OAAO,IAAI,KAAK,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC5D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,KAAK,CAAC,YAAY,CAAC;IACtD,CAAC;IAyFD,YAAY,IAAY,EAAE,WAAoC,EAAE,IAAmC;QAC/F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqC,CAAC;YACpD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,KAAK,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,0BAA0B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,uBAAuB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1F,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;aAAM;YACH,MAAM,IAAI,GAAG,WAAoC,CAAC;YAClD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,SAAS,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACtD,MAAM,IAAI,KAAK,CAAC,uCAAuC,CAAC,CAAC;aAC5D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,0BAA0B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,wBAAwB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,uBAAuB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,qBAAqB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,KAAK,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAC1C,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,YAAY,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YACjD,cAAc,CAAC,SAAS,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SACjD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,KAAK,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;;AAjKL,sBAkKC;AApJG,gBAAgB;AACO,kBAAY,GAAG,qBAAqB,CAAC"}
|
package/iot/caCertificate.d.ts
CHANGED
|
@@ -11,13 +11,13 @@ import * as outputs from "../types/output";
|
|
|
11
11
|
* import * as aws from "@pulumi/aws";
|
|
12
12
|
* import * as tls from "@pulumi/tls";
|
|
13
13
|
*
|
|
14
|
-
* const caPrivateKey = new tls.PrivateKey("ca", {algorithm: "RSA"});
|
|
15
|
-
* const ca = new tls.SelfSignedCert("ca", {
|
|
14
|
+
* const caPrivateKey = new tls.index.PrivateKey("ca", {algorithm: "RSA"});
|
|
15
|
+
* const ca = new tls.index.SelfSignedCert("ca", {
|
|
16
16
|
* privateKeyPem: caPrivateKey.privateKeyPem,
|
|
17
|
-
* subject: {
|
|
17
|
+
* subject: [{
|
|
18
18
|
* commonName: "example.com",
|
|
19
19
|
* organization: "ACME Examples, Inc",
|
|
20
|
-
* },
|
|
20
|
+
* }],
|
|
21
21
|
* validityPeriodHours: 12,
|
|
22
22
|
* allowedUses: [
|
|
23
23
|
* "key_encipherment",
|
|
@@ -26,15 +26,15 @@ import * as outputs from "../types/output";
|
|
|
26
26
|
* ],
|
|
27
27
|
* isCaCertificate: true,
|
|
28
28
|
* });
|
|
29
|
-
* const verificationPrivateKey = new tls.PrivateKey("verification", {algorithm: "RSA"});
|
|
29
|
+
* const verificationPrivateKey = new tls.index.PrivateKey("verification", {algorithm: "RSA"});
|
|
30
30
|
* const example = aws.iot.getRegistrationCode({});
|
|
31
|
-
* const verification = new tls.CertRequest("verification", {
|
|
31
|
+
* const verification = new tls.index.CertRequest("verification", {
|
|
32
32
|
* privateKeyPem: verificationPrivateKey.privateKeyPem,
|
|
33
|
-
* subject: {
|
|
34
|
-
* commonName: example.
|
|
35
|
-
* },
|
|
33
|
+
* subject: [{
|
|
34
|
+
* commonName: example.registrationCode,
|
|
35
|
+
* }],
|
|
36
36
|
* });
|
|
37
|
-
* const verificationLocallySignedCert = new tls.LocallySignedCert("verification", {
|
|
37
|
+
* const verificationLocallySignedCert = new tls.index.LocallySignedCert("verification", {
|
|
38
38
|
* certRequestPem: verification.certRequestPem,
|
|
39
39
|
* caPrivateKeyPem: caPrivateKey.privateKeyPem,
|
|
40
40
|
* caCertPem: ca.certPem,
|
package/iot/caCertificate.js
CHANGED
|
@@ -15,13 +15,13 @@ const utilities = require("../utilities");
|
|
|
15
15
|
* import * as aws from "@pulumi/aws";
|
|
16
16
|
* import * as tls from "@pulumi/tls";
|
|
17
17
|
*
|
|
18
|
-
* const caPrivateKey = new tls.PrivateKey("ca", {algorithm: "RSA"});
|
|
19
|
-
* const ca = new tls.SelfSignedCert("ca", {
|
|
18
|
+
* const caPrivateKey = new tls.index.PrivateKey("ca", {algorithm: "RSA"});
|
|
19
|
+
* const ca = new tls.index.SelfSignedCert("ca", {
|
|
20
20
|
* privateKeyPem: caPrivateKey.privateKeyPem,
|
|
21
|
-
* subject: {
|
|
21
|
+
* subject: [{
|
|
22
22
|
* commonName: "example.com",
|
|
23
23
|
* organization: "ACME Examples, Inc",
|
|
24
|
-
* },
|
|
24
|
+
* }],
|
|
25
25
|
* validityPeriodHours: 12,
|
|
26
26
|
* allowedUses: [
|
|
27
27
|
* "key_encipherment",
|
|
@@ -30,15 +30,15 @@ const utilities = require("../utilities");
|
|
|
30
30
|
* ],
|
|
31
31
|
* isCaCertificate: true,
|
|
32
32
|
* });
|
|
33
|
-
* const verificationPrivateKey = new tls.PrivateKey("verification", {algorithm: "RSA"});
|
|
33
|
+
* const verificationPrivateKey = new tls.index.PrivateKey("verification", {algorithm: "RSA"});
|
|
34
34
|
* const example = aws.iot.getRegistrationCode({});
|
|
35
|
-
* const verification = new tls.CertRequest("verification", {
|
|
35
|
+
* const verification = new tls.index.CertRequest("verification", {
|
|
36
36
|
* privateKeyPem: verificationPrivateKey.privateKeyPem,
|
|
37
|
-
* subject: {
|
|
38
|
-
* commonName: example.
|
|
39
|
-
* },
|
|
37
|
+
* subject: [{
|
|
38
|
+
* commonName: example.registrationCode,
|
|
39
|
+
* }],
|
|
40
40
|
* });
|
|
41
|
-
* const verificationLocallySignedCert = new tls.LocallySignedCert("verification", {
|
|
41
|
+
* const verificationLocallySignedCert = new tls.index.LocallySignedCert("verification", {
|
|
42
42
|
* certRequestPem: verification.certRequestPem,
|
|
43
43
|
* caPrivateKeyPem: caPrivateKey.privateKeyPem,
|
|
44
44
|
* caCertPem: ca.certPem,
|
|
@@ -10,13 +10,13 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
10
10
|
* import * as tls from "@pulumi/tls";
|
|
11
11
|
*
|
|
12
12
|
* const example = aws.iot.getRegistrationCode({});
|
|
13
|
-
* const verification = new tls.PrivateKey("verification", {algorithm: "RSA"});
|
|
14
|
-
* const verificationCertRequest = new tls.CertRequest("verification", {
|
|
13
|
+
* const verification = new tls.index.PrivateKey("verification", {algorithm: "RSA"});
|
|
14
|
+
* const verificationCertRequest = new tls.index.CertRequest("verification", {
|
|
15
15
|
* keyAlgorithm: "RSA",
|
|
16
16
|
* privateKeyPem: verification.privateKeyPem,
|
|
17
|
-
* subject: {
|
|
18
|
-
* commonName: example.
|
|
19
|
-
* },
|
|
17
|
+
* subject: [{
|
|
18
|
+
* commonName: example.registrationCode,
|
|
19
|
+
* }],
|
|
20
20
|
* });
|
|
21
21
|
* ```
|
|
22
22
|
*/
|
|
@@ -45,13 +45,13 @@ export interface GetRegistrationCodeResult {
|
|
|
45
45
|
* import * as tls from "@pulumi/tls";
|
|
46
46
|
*
|
|
47
47
|
* const example = aws.iot.getRegistrationCode({});
|
|
48
|
-
* const verification = new tls.PrivateKey("verification", {algorithm: "RSA"});
|
|
49
|
-
* const verificationCertRequest = new tls.CertRequest("verification", {
|
|
48
|
+
* const verification = new tls.index.PrivateKey("verification", {algorithm: "RSA"});
|
|
49
|
+
* const verificationCertRequest = new tls.index.CertRequest("verification", {
|
|
50
50
|
* keyAlgorithm: "RSA",
|
|
51
51
|
* privateKeyPem: verification.privateKeyPem,
|
|
52
|
-
* subject: {
|
|
53
|
-
* commonName: example.
|
|
54
|
-
* },
|
|
52
|
+
* subject: [{
|
|
53
|
+
* commonName: example.registrationCode,
|
|
54
|
+
* }],
|
|
55
55
|
* });
|
|
56
56
|
* ```
|
|
57
57
|
*/
|
|
@@ -16,13 +16,13 @@ const utilities = require("../utilities");
|
|
|
16
16
|
* import * as tls from "@pulumi/tls";
|
|
17
17
|
*
|
|
18
18
|
* const example = aws.iot.getRegistrationCode({});
|
|
19
|
-
* const verification = new tls.PrivateKey("verification", {algorithm: "RSA"});
|
|
20
|
-
* const verificationCertRequest = new tls.CertRequest("verification", {
|
|
19
|
+
* const verification = new tls.index.PrivateKey("verification", {algorithm: "RSA"});
|
|
20
|
+
* const verificationCertRequest = new tls.index.CertRequest("verification", {
|
|
21
21
|
* keyAlgorithm: "RSA",
|
|
22
22
|
* privateKeyPem: verification.privateKeyPem,
|
|
23
|
-
* subject: {
|
|
24
|
-
* commonName: example.
|
|
25
|
-
* },
|
|
23
|
+
* subject: [{
|
|
24
|
+
* commonName: example.registrationCode,
|
|
25
|
+
* }],
|
|
26
26
|
* });
|
|
27
27
|
* ```
|
|
28
28
|
*/
|
|
@@ -42,13 +42,13 @@ exports.getRegistrationCode = getRegistrationCode;
|
|
|
42
42
|
* import * as tls from "@pulumi/tls";
|
|
43
43
|
*
|
|
44
44
|
* const example = aws.iot.getRegistrationCode({});
|
|
45
|
-
* const verification = new tls.PrivateKey("verification", {algorithm: "RSA"});
|
|
46
|
-
* const verificationCertRequest = new tls.CertRequest("verification", {
|
|
45
|
+
* const verification = new tls.index.PrivateKey("verification", {algorithm: "RSA"});
|
|
46
|
+
* const verificationCertRequest = new tls.index.CertRequest("verification", {
|
|
47
47
|
* keyAlgorithm: "RSA",
|
|
48
48
|
* privateKeyPem: verification.privateKeyPem,
|
|
49
|
-
* subject: {
|
|
50
|
-
* commonName: example.
|
|
51
|
-
* },
|
|
49
|
+
* subject: [{
|
|
50
|
+
* commonName: example.registrationCode,
|
|
51
|
+
* }],
|
|
52
52
|
* });
|
|
53
53
|
* ```
|
|
54
54
|
*/
|
package/package.json
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@pulumi/aws",
|
|
3
|
-
"version": "6.70.
|
|
3
|
+
"version": "6.70.1-alpha.1741108905",
|
|
4
4
|
"description": "A Pulumi package for creating and managing Amazon Web Services (AWS) cloud resources.",
|
|
5
5
|
"keywords": [
|
|
6
6
|
"pulumi",
|
|
@@ -24,6 +24,6 @@
|
|
|
24
24
|
"pulumi": {
|
|
25
25
|
"resource": true,
|
|
26
26
|
"name": "aws",
|
|
27
|
-
"version": "6.70.
|
|
27
|
+
"version": "6.70.1-alpha.1741108905"
|
|
28
28
|
}
|
|
29
29
|
}
|
package/transfer/sshKey.d.ts
CHANGED
|
@@ -10,7 +10,7 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
10
10
|
* import * as std from "@pulumi/std";
|
|
11
11
|
* import * as tls from "@pulumi/tls";
|
|
12
12
|
*
|
|
13
|
-
* const examplePrivateKey = new tls.PrivateKey("example", {
|
|
13
|
+
* const examplePrivateKey = new tls.index.PrivateKey("example", {
|
|
14
14
|
* algorithm: "RSA",
|
|
15
15
|
* rsaBits: 4096,
|
|
16
16
|
* });
|
|
@@ -45,9 +45,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
45
45
|
* const exampleSshKey = new aws.transfer.SshKey("example", {
|
|
46
46
|
* serverId: exampleServer.id,
|
|
47
47
|
* userName: exampleUser.userName,
|
|
48
|
-
* body: std.
|
|
48
|
+
* body: std.trimspace({
|
|
49
49
|
* input: examplePrivateKey.publicKeyOpenssh,
|
|
50
|
-
* }).
|
|
50
|
+
* }).then(invoke => invoke.result),
|
|
51
51
|
* });
|
|
52
52
|
* const example = aws.iam.getPolicyDocument({
|
|
53
53
|
* statements: [{
|
package/transfer/sshKey.js
CHANGED
|
@@ -16,7 +16,7 @@ const utilities = require("../utilities");
|
|
|
16
16
|
* import * as std from "@pulumi/std";
|
|
17
17
|
* import * as tls from "@pulumi/tls";
|
|
18
18
|
*
|
|
19
|
-
* const examplePrivateKey = new tls.PrivateKey("example", {
|
|
19
|
+
* const examplePrivateKey = new tls.index.PrivateKey("example", {
|
|
20
20
|
* algorithm: "RSA",
|
|
21
21
|
* rsaBits: 4096,
|
|
22
22
|
* });
|
|
@@ -51,9 +51,9 @@ const utilities = require("../utilities");
|
|
|
51
51
|
* const exampleSshKey = new aws.transfer.SshKey("example", {
|
|
52
52
|
* serverId: exampleServer.id,
|
|
53
53
|
* userName: exampleUser.userName,
|
|
54
|
-
* body: std.
|
|
54
|
+
* body: std.trimspace({
|
|
55
55
|
* input: examplePrivateKey.publicKeyOpenssh,
|
|
56
|
-
* }).
|
|
56
|
+
* }).then(invoke => invoke.result),
|
|
57
57
|
* });
|
|
58
58
|
* const example = aws.iam.getPolicyDocument({
|
|
59
59
|
* statements: [{
|