@pulumi/eks 3.8.1-alpha.3 → 3.8.1-alpha.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -4,10 +4,175 @@ import * as enums from "./types/enums";
4
4
  import * as pulumiAws from "@pulumi/aws";
5
5
  import { Cluster } from "./index";
6
6
  /**
7
- * ManagedNodeGroup is a component that wraps creating an AWS managed node group.
7
+ * Manages an EKS Node Group, which can provision and optionally update an Auto Scaling Group of Kubernetes worker nodes compatible with EKS. Additional documentation about this functionality can be found in the [EKS User Guide](https://docs.aws.amazon.com/eks/latest/userguide/managed-node-groups.html).
8
8
  *
9
- * See for more details:
10
- * https://docs.aws.amazon.com/eks/latest/userguide/managed-node-groups.html
9
+ * ## Example Usage
10
+ * ### Basic Managed Node Group
11
+ * This example demonstrates creating a managed node group with typical defaults. The node group uses the latest EKS-optimized Amazon Linux AMI, creates 2 nodes, and runs on t3.medium instances. Instance security groups are automatically configured.
12
+ *
13
+ * ```typescript
14
+ * import * as pulumi from "@pulumi/pulumi";
15
+ * import * as aws from "@pulumi/aws";
16
+ * import * as awsx from "@pulumi/awsx";
17
+ * import * as eks from "@pulumi/eks";
18
+ *
19
+ * const eksVpc = new awsx.ec2.Vpc("eks-vpc", {
20
+ * enableDnsHostnames: true,
21
+ * cidrBlock: "10.0.0.0/16",
22
+ * });
23
+ * const eksCluster = new eks.Cluster("eks-cluster", {
24
+ * vpcId: eksVpc.vpcId,
25
+ * authenticationMode: eks.AuthenticationMode.Api,
26
+ * publicSubnetIds: eksVpc.publicSubnetIds,
27
+ * privateSubnetIds: eksVpc.privateSubnetIds,
28
+ * skipDefaultNodeGroup: true,
29
+ * });
30
+ * const nodeRole = new aws.iam.Role("node-role", {assumeRolePolicy: JSON.stringify({
31
+ * Version: "2012-10-17",
32
+ * Statement: [{
33
+ * Action: "sts:AssumeRole",
34
+ * Effect: "Allow",
35
+ * Sid: "",
36
+ * Principal: {
37
+ * Service: "ec2.amazonaws.com",
38
+ * },
39
+ * }],
40
+ * })});
41
+ * const workerNodePolicy = new aws.iam.RolePolicyAttachment("worker-node-policy", {
42
+ * role: nodeRole.name,
43
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
44
+ * });
45
+ * const cniPolicy = new aws.iam.RolePolicyAttachment("cni-policy", {
46
+ * role: nodeRole.name,
47
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
48
+ * });
49
+ * const registryPolicy = new aws.iam.RolePolicyAttachment("registry-policy", {
50
+ * role: nodeRole.name,
51
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
52
+ * });
53
+ * const nodeGroup = new eks.ManagedNodeGroup("node-group", {
54
+ * cluster: eksCluster,
55
+ * nodeRole: nodeRole,
56
+ * });
57
+ *
58
+ * ```
59
+ * ### Enabling EFA Support
60
+ *
61
+ * Enabling EFA support for a node group will do the following:
62
+ * - All EFA interfaces supported by the instance will be exposed on the launch template used by the node group
63
+ * - A `clustered` placement group will be created and passed to the launch template
64
+ * - Checks will be performed to ensure that the instance type supports EFA and that the specified AZ is supported by the chosen instance type
65
+ *
66
+ * The GPU optimized AMIs include all necessary drivers and libraries to support EFA. If you're choosing an instance type without GPU acceleration you will need to install the drivers and libraries manually and bake a custom AMI.
67
+ *
68
+ * You can use the [aws-efa-k8s-device-plugin](https://github.com/aws/eks-charts/tree/master/stable/aws-efa-k8s-device-plugin) Helm chart to expose the EFA interfaces on the nodes as an extended resource, and allow pods to request these interfaces to be mounted to their containers.
69
+ * Your application container will need to have the necessary libraries and runtimes in order to leverage the EFA interfaces (e.g. libfabric).
70
+ *
71
+ * ```typescript
72
+ * import * as pulumi from "@pulumi/pulumi";
73
+ * import * as aws from "@pulumi/aws";
74
+ * import * as awsx from "@pulumi/awsx";
75
+ * import * as eks from "@pulumi/eks";
76
+ * import * as kubernetes from "@pulumi/kubernetes";
77
+ *
78
+ * const eksVpc = new awsx.ec2.Vpc("eks-vpc", {
79
+ * enableDnsHostnames: true,
80
+ * cidrBlock: "10.0.0.0/16",
81
+ * });
82
+ * const eksCluster = new eks.Cluster("eks-cluster", {
83
+ * vpcId: eksVpc.vpcId,
84
+ * authenticationMode: eks.AuthenticationMode.Api,
85
+ * publicSubnetIds: eksVpc.publicSubnetIds,
86
+ * privateSubnetIds: eksVpc.privateSubnetIds,
87
+ * skipDefaultNodeGroup: true,
88
+ * });
89
+ * const k8SProvider = new kubernetes.Provider("k8sProvider", {kubeconfig: eksCluster.kubeconfig});
90
+ * const nodeRole = new aws.iam.Role("node-role", {assumeRolePolicy: JSON.stringify({
91
+ * Version: "2012-10-17",
92
+ * Statement: [{
93
+ * Action: "sts:AssumeRole",
94
+ * Effect: "Allow",
95
+ * Sid: "",
96
+ * Principal: {
97
+ * Service: "ec2.amazonaws.com",
98
+ * },
99
+ * }],
100
+ * })});
101
+ * const workerNodePolicy = new aws.iam.RolePolicyAttachment("worker-node-policy", {
102
+ * role: nodeRole.name,
103
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
104
+ * });
105
+ * const cniPolicy = new aws.iam.RolePolicyAttachment("cni-policy", {
106
+ * role: nodeRole.name,
107
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
108
+ * });
109
+ * const registryPolicy = new aws.iam.RolePolicyAttachment("registry-policy", {
110
+ * role: nodeRole.name,
111
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
112
+ * });
113
+ *
114
+ * // The node group for running system pods (e.g. coredns, etc.)
115
+ * const systemNodeGroup = new eks.ManagedNodeGroup("system-node-group", {
116
+ * cluster: eksCluster,
117
+ * nodeRole: nodeRole,
118
+ * });
119
+ *
120
+ * // The EFA device plugin for exposing EFA interfaces as extended resources
121
+ * const devicePlugin = new kubernetes.helm.v3.Release("device-plugin", {
122
+ * version: "0.5.7",
123
+ * repositoryOpts: {
124
+ * repo: "https://aws.github.io/eks-charts",
125
+ * },
126
+ * chart: "aws-efa-k8s-device-plugin",
127
+ * namespace: "kube-system",
128
+ * atomic: true,
129
+ * values: {
130
+ * tolerations: [{
131
+ * key: "efa-enabled",
132
+ * operator: "Exists",
133
+ * effect: "NoExecute",
134
+ * }],
135
+ * },
136
+ * }, {
137
+ * provider: k8SProvider,
138
+ * });
139
+ *
140
+ * // The node group for running EFA enabled workloads
141
+ * const efaNodeGroup = new eks.ManagedNodeGroup("efa-node-group", {
142
+ * cluster: eksCluster,
143
+ * nodeRole: nodeRole,
144
+ * instanceTypes: ["g6.8xlarge"],
145
+ * gpu: true,
146
+ * scalingConfig: {
147
+ * minSize: 2,
148
+ * desiredSize: 2,
149
+ * maxSize: 4,
150
+ * },
151
+ * enableEfaSupport: true,
152
+ * placementGroupAvailabilityZone: "us-west-2b",
153
+ *
154
+ * // Taint the nodes so that only pods with the efa-enabled label can be scheduled on them
155
+ * taints: [{
156
+ * key: "efa-enabled",
157
+ * value: "true",
158
+ * effect: "NO_EXECUTE",
159
+ * }],
160
+ *
161
+ * // Instances with GPUs usually have nvme instance store volumes, so we can mount them in RAID-0 for kubelet and containerd
162
+ * // These are faster than the regular EBS volumes
163
+ * nodeadmExtraOptions: [{
164
+ * contentType: "application/node.eks.aws",
165
+ * content: `apiVersion: node.eks.aws/v1alpha1
166
+ * kind: NodeConfig
167
+ * spec:
168
+ * instance:
169
+ * localStorage:
170
+ * strategy: RAID0
171
+ * `,
172
+ * }],
173
+ * });
174
+ *
175
+ * ```
11
176
  */
12
177
  export declare class ManagedNodeGroup extends pulumi.ComponentResource {
13
178
  /**
@@ -6,10 +6,175 @@ exports.ManagedNodeGroup = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * ManagedNodeGroup is a component that wraps creating an AWS managed node group.
9
+ * Manages an EKS Node Group, which can provision and optionally update an Auto Scaling Group of Kubernetes worker nodes compatible with EKS. Additional documentation about this functionality can be found in the [EKS User Guide](https://docs.aws.amazon.com/eks/latest/userguide/managed-node-groups.html).
10
10
  *
11
- * See for more details:
12
- * https://docs.aws.amazon.com/eks/latest/userguide/managed-node-groups.html
11
+ * ## Example Usage
12
+ * ### Basic Managed Node Group
13
+ * This example demonstrates creating a managed node group with typical defaults. The node group uses the latest EKS-optimized Amazon Linux AMI, creates 2 nodes, and runs on t3.medium instances. Instance security groups are automatically configured.
14
+ *
15
+ * ```typescript
16
+ * import * as pulumi from "@pulumi/pulumi";
17
+ * import * as aws from "@pulumi/aws";
18
+ * import * as awsx from "@pulumi/awsx";
19
+ * import * as eks from "@pulumi/eks";
20
+ *
21
+ * const eksVpc = new awsx.ec2.Vpc("eks-vpc", {
22
+ * enableDnsHostnames: true,
23
+ * cidrBlock: "10.0.0.0/16",
24
+ * });
25
+ * const eksCluster = new eks.Cluster("eks-cluster", {
26
+ * vpcId: eksVpc.vpcId,
27
+ * authenticationMode: eks.AuthenticationMode.Api,
28
+ * publicSubnetIds: eksVpc.publicSubnetIds,
29
+ * privateSubnetIds: eksVpc.privateSubnetIds,
30
+ * skipDefaultNodeGroup: true,
31
+ * });
32
+ * const nodeRole = new aws.iam.Role("node-role", {assumeRolePolicy: JSON.stringify({
33
+ * Version: "2012-10-17",
34
+ * Statement: [{
35
+ * Action: "sts:AssumeRole",
36
+ * Effect: "Allow",
37
+ * Sid: "",
38
+ * Principal: {
39
+ * Service: "ec2.amazonaws.com",
40
+ * },
41
+ * }],
42
+ * })});
43
+ * const workerNodePolicy = new aws.iam.RolePolicyAttachment("worker-node-policy", {
44
+ * role: nodeRole.name,
45
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
46
+ * });
47
+ * const cniPolicy = new aws.iam.RolePolicyAttachment("cni-policy", {
48
+ * role: nodeRole.name,
49
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
50
+ * });
51
+ * const registryPolicy = new aws.iam.RolePolicyAttachment("registry-policy", {
52
+ * role: nodeRole.name,
53
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
54
+ * });
55
+ * const nodeGroup = new eks.ManagedNodeGroup("node-group", {
56
+ * cluster: eksCluster,
57
+ * nodeRole: nodeRole,
58
+ * });
59
+ *
60
+ * ```
61
+ * ### Enabling EFA Support
62
+ *
63
+ * Enabling EFA support for a node group will do the following:
64
+ * - All EFA interfaces supported by the instance will be exposed on the launch template used by the node group
65
+ * - A `clustered` placement group will be created and passed to the launch template
66
+ * - Checks will be performed to ensure that the instance type supports EFA and that the specified AZ is supported by the chosen instance type
67
+ *
68
+ * The GPU optimized AMIs include all necessary drivers and libraries to support EFA. If you're choosing an instance type without GPU acceleration you will need to install the drivers and libraries manually and bake a custom AMI.
69
+ *
70
+ * You can use the [aws-efa-k8s-device-plugin](https://github.com/aws/eks-charts/tree/master/stable/aws-efa-k8s-device-plugin) Helm chart to expose the EFA interfaces on the nodes as an extended resource, and allow pods to request these interfaces to be mounted to their containers.
71
+ * Your application container will need to have the necessary libraries and runtimes in order to leverage the EFA interfaces (e.g. libfabric).
72
+ *
73
+ * ```typescript
74
+ * import * as pulumi from "@pulumi/pulumi";
75
+ * import * as aws from "@pulumi/aws";
76
+ * import * as awsx from "@pulumi/awsx";
77
+ * import * as eks from "@pulumi/eks";
78
+ * import * as kubernetes from "@pulumi/kubernetes";
79
+ *
80
+ * const eksVpc = new awsx.ec2.Vpc("eks-vpc", {
81
+ * enableDnsHostnames: true,
82
+ * cidrBlock: "10.0.0.0/16",
83
+ * });
84
+ * const eksCluster = new eks.Cluster("eks-cluster", {
85
+ * vpcId: eksVpc.vpcId,
86
+ * authenticationMode: eks.AuthenticationMode.Api,
87
+ * publicSubnetIds: eksVpc.publicSubnetIds,
88
+ * privateSubnetIds: eksVpc.privateSubnetIds,
89
+ * skipDefaultNodeGroup: true,
90
+ * });
91
+ * const k8SProvider = new kubernetes.Provider("k8sProvider", {kubeconfig: eksCluster.kubeconfig});
92
+ * const nodeRole = new aws.iam.Role("node-role", {assumeRolePolicy: JSON.stringify({
93
+ * Version: "2012-10-17",
94
+ * Statement: [{
95
+ * Action: "sts:AssumeRole",
96
+ * Effect: "Allow",
97
+ * Sid: "",
98
+ * Principal: {
99
+ * Service: "ec2.amazonaws.com",
100
+ * },
101
+ * }],
102
+ * })});
103
+ * const workerNodePolicy = new aws.iam.RolePolicyAttachment("worker-node-policy", {
104
+ * role: nodeRole.name,
105
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEKSWorkerNodePolicy",
106
+ * });
107
+ * const cniPolicy = new aws.iam.RolePolicyAttachment("cni-policy", {
108
+ * role: nodeRole.name,
109
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
110
+ * });
111
+ * const registryPolicy = new aws.iam.RolePolicyAttachment("registry-policy", {
112
+ * role: nodeRole.name,
113
+ * policyArn: "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly",
114
+ * });
115
+ *
116
+ * // The node group for running system pods (e.g. coredns, etc.)
117
+ * const systemNodeGroup = new eks.ManagedNodeGroup("system-node-group", {
118
+ * cluster: eksCluster,
119
+ * nodeRole: nodeRole,
120
+ * });
121
+ *
122
+ * // The EFA device plugin for exposing EFA interfaces as extended resources
123
+ * const devicePlugin = new kubernetes.helm.v3.Release("device-plugin", {
124
+ * version: "0.5.7",
125
+ * repositoryOpts: {
126
+ * repo: "https://aws.github.io/eks-charts",
127
+ * },
128
+ * chart: "aws-efa-k8s-device-plugin",
129
+ * namespace: "kube-system",
130
+ * atomic: true,
131
+ * values: {
132
+ * tolerations: [{
133
+ * key: "efa-enabled",
134
+ * operator: "Exists",
135
+ * effect: "NoExecute",
136
+ * }],
137
+ * },
138
+ * }, {
139
+ * provider: k8SProvider,
140
+ * });
141
+ *
142
+ * // The node group for running EFA enabled workloads
143
+ * const efaNodeGroup = new eks.ManagedNodeGroup("efa-node-group", {
144
+ * cluster: eksCluster,
145
+ * nodeRole: nodeRole,
146
+ * instanceTypes: ["g6.8xlarge"],
147
+ * gpu: true,
148
+ * scalingConfig: {
149
+ * minSize: 2,
150
+ * desiredSize: 2,
151
+ * maxSize: 4,
152
+ * },
153
+ * enableEfaSupport: true,
154
+ * placementGroupAvailabilityZone: "us-west-2b",
155
+ *
156
+ * // Taint the nodes so that only pods with the efa-enabled label can be scheduled on them
157
+ * taints: [{
158
+ * key: "efa-enabled",
159
+ * value: "true",
160
+ * effect: "NO_EXECUTE",
161
+ * }],
162
+ *
163
+ * // Instances with GPUs usually have nvme instance store volumes, so we can mount them in RAID-0 for kubelet and containerd
164
+ * // These are faster than the regular EBS volumes
165
+ * nodeadmExtraOptions: [{
166
+ * contentType: "application/node.eks.aws",
167
+ * content: `apiVersion: node.eks.aws/v1alpha1
168
+ * kind: NodeConfig
169
+ * spec:
170
+ * instance:
171
+ * localStorage:
172
+ * strategy: RAID0
173
+ * `,
174
+ * }],
175
+ * });
176
+ *
177
+ * ```
13
178
  */
14
179
  class ManagedNodeGroup extends pulumi.ComponentResource {
15
180
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"managedNodeGroup.js","sourceRoot":"","sources":["../managedNodeGroup.ts"],"names":[],"mappings":";AAAA,8DAA8D;AAC9D,iFAAiF;;;AAEjF,yCAAyC;AAIzC,yCAAyC;AAOzC;;;;;GAKG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,iBAAiB;IAI1D;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IAWD;;;;;;OAMG;IACH,YAAY,IAAY,EAAE,IAA0B,EAAE,IAAsC;QACxF,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,CAAC,IAAI,CAAC,EAAE,EAAE;YACV,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gCAAgC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1G,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC5D;aAAM;YACH,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC5D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC;IACtF,CAAC;;AA9EL,4CA+EC;AA9EG,gBAAgB;AACO,6BAAY,GAAG,4BAA4B,CAAC"}
1
+ {"version":3,"file":"managedNodeGroup.js","sourceRoot":"","sources":["../managedNodeGroup.ts"],"names":[],"mappings":";AAAA,8DAA8D;AAC9D,iFAAiF;;;AAEjF,yCAAyC;AAIzC,yCAAyC;AAOzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0KG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,iBAAiB;IAI1D;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IAWD;;;;;;OAMG;IACH,YAAY,IAAY,EAAE,IAA0B,EAAE,IAAsC;QACxF,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,CAAC,IAAI,CAAC,EAAE,EAAE;YACV,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,KAAK,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,GAAG,CAAC,CAAC,CAAC,SAAS,CAAC;YACpD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gCAAgC,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,8BAA8B,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1G,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC5D;aAAM;YACH,cAAc,CAAC,WAAW,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;YAChD,cAAc,CAAC,oBAAoB,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAC5D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,EAAE,IAAI,CAAC,UAAU,CAAC,CAAC;IACtF,CAAC;;AA9EL,4CA+EC;AA9EG,gBAAgB;AACO,6BAAY,GAAG,4BAA4B,CAAC"}
package/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "@pulumi/eks",
3
- "version": "3.8.1-alpha.3",
3
+ "version": "3.8.1-alpha.5",
4
4
  "keywords": [
5
5
  "pulumi",
6
6
  "aws",
@@ -33,6 +33,6 @@
33
33
  "pulumi": {
34
34
  "resource": true,
35
35
  "name": "eks",
36
- "version": "3.8.1-alpha.3"
36
+ "version": "3.8.1-alpha.5"
37
37
  }
38
38
  }