Skip to content

Commit

Permalink
Recompute the minimal schema
Browse files Browse the repository at this point in the history
  • Loading branch information
t0yv0 committed Oct 25, 2024
1 parent 7ef7b2b commit 6fa4f08
Showing 1 changed file with 129 additions and 0 deletions.
129 changes: 129 additions & 0 deletions provider/cmd/pulumi-resource-aws/schema-minimal.json
Original file line number Diff line number Diff line change
Expand Up @@ -275518,6 +275518,60 @@
"type": "object"
}
},
"aws:iam/groupPolicyAttachmentsExclusive:GroupPolicyAttachmentsExclusive": {
"description": "\n\n## Import\n\nUsing `pulumi import`, import exclusive management of customer managed policy assignments using the `group_name`. For example:\n\n```sh\n$ pulumi import aws:iam/groupPolicyAttachmentsExclusive:GroupPolicyAttachmentsExclusive example MyGroup\n```\n",
"properties": {
"groupName": {
"type": "string",
"description": "IAM group name.\n"
},
"policyArns": {
"type": "array",
"items": {
"type": "string"
},
"description": "A list of customer managed policy ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed.\n"
}
},
"required": [
"groupName",
"policyArns"
],
"inputProperties": {
"groupName": {
"type": "string",
"description": "IAM group name.\n"
},
"policyArns": {
"type": "array",
"items": {
"type": "string"
},
"description": "A list of customer managed policy ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed.\n"
}
},
"requiredInputs": [
"groupName",
"policyArns"
],
"stateInputs": {
"description": "Input properties used for looking up and filtering GroupPolicyAttachmentsExclusive resources.\n",
"properties": {
"groupName": {
"type": "string",
"description": "IAM group name.\n"
},
"policyArns": {
"type": "array",
"items": {
"type": "string"
},
"description": "A list of customer managed policy ARNs to be attached to the group. Policies attached to this group but not configured in this argument will be removed.\n"
}
},
"type": "object"
}
},
"aws:iam/instanceProfile:InstanceProfile": {
"description": "Provides an IAM instance profile.\n\n\u003e **NOTE:** When managing instance profiles, remember that the `name` attribute must always be unique. This means that even if you have different `role` or `path` values, duplicating an existing instance profile `name` will lead to an `EntityAlreadyExists` error.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as aws from \"@pulumi/aws\";\n\nconst assumeRole = aws.iam.getPolicyDocument({\n statements: [{\n effect: \"Allow\",\n principals: [{\n type: \"Service\",\n identifiers: [\"ec2.amazonaws.com\"],\n }],\n actions: [\"sts:AssumeRole\"],\n }],\n});\nconst role = new aws.iam.Role(\"role\", {\n name: \"test_role\",\n path: \"/\",\n assumeRolePolicy: assumeRole.then(assumeRole =\u003e assumeRole.json),\n});\nconst testProfile = new aws.iam.InstanceProfile(\"test_profile\", {\n name: \"test_profile\",\n role: role.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_aws as aws\n\nassume_role = aws.iam.get_policy_document(statements=[{\n \"effect\": \"Allow\",\n \"principals\": [{\n \"type\": \"Service\",\n \"identifiers\": [\"ec2.amazonaws.com\"],\n }],\n \"actions\": [\"sts:AssumeRole\"],\n}])\nrole = aws.iam.Role(\"role\",\n name=\"test_role\",\n path=\"/\",\n assume_role_policy=assume_role.json)\ntest_profile = aws.iam.InstanceProfile(\"test_profile\",\n name=\"test_profile\",\n role=role.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Aws = Pulumi.Aws;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var assumeRole = Aws.Iam.GetPolicyDocument.Invoke(new()\n {\n Statements = new[]\n {\n new Aws.Iam.Inputs.GetPolicyDocumentStatementInputArgs\n {\n Effect = \"Allow\",\n Principals = new[]\n {\n new Aws.Iam.Inputs.GetPolicyDocumentStatementPrincipalInputArgs\n {\n Type = \"Service\",\n Identifiers = new[]\n {\n \"ec2.amazonaws.com\",\n },\n },\n },\n Actions = new[]\n {\n \"sts:AssumeRole\",\n },\n },\n },\n });\n\n var role = new Aws.Iam.Role(\"role\", new()\n {\n Name = \"test_role\",\n Path = \"/\",\n AssumeRolePolicy = assumeRole.Apply(getPolicyDocumentResult =\u003e getPolicyDocumentResult.Json),\n });\n\n var testProfile = new Aws.Iam.InstanceProfile(\"test_profile\", new()\n {\n Name = \"test_profile\",\n Role = role.Name,\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/iam\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tassumeRole, err := iam.GetPolicyDocument(ctx, \u0026iam.GetPolicyDocumentArgs{\n\t\t\tStatements: []iam.GetPolicyDocumentStatement{\n\t\t\t\t{\n\t\t\t\t\tEffect: pulumi.StringRef(\"Allow\"),\n\t\t\t\t\tPrincipals: []iam.GetPolicyDocumentStatementPrincipal{\n\t\t\t\t\t\t{\n\t\t\t\t\t\t\tType: \"Service\",\n\t\t\t\t\t\t\tIdentifiers: []string{\n\t\t\t\t\t\t\t\t\"ec2.amazonaws.com\",\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t\tActions: []string{\n\t\t\t\t\t\t\"sts:AssumeRole\",\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trole, err := iam.NewRole(ctx, \"role\", \u0026iam.RoleArgs{\n\t\t\tName: pulumi.String(\"test_role\"),\n\t\t\tPath: pulumi.String(\"/\"),\n\t\t\tAssumeRolePolicy: pulumi.String(assumeRole.Json),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = iam.NewInstanceProfile(ctx, \"test_profile\", \u0026iam.InstanceProfileArgs{\n\t\t\tName: pulumi.String(\"test_profile\"),\n\t\t\tRole: role.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.aws.iam.IamFunctions;\nimport com.pulumi.aws.iam.inputs.GetPolicyDocumentArgs;\nimport com.pulumi.aws.iam.Role;\nimport com.pulumi.aws.iam.RoleArgs;\nimport com.pulumi.aws.iam.InstanceProfile;\nimport com.pulumi.aws.iam.InstanceProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n final var assumeRole = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()\n .statements(GetPolicyDocumentStatementArgs.builder()\n .effect(\"Allow\")\n .principals(GetPolicyDocumentStatementPrincipalArgs.builder()\n .type(\"Service\")\n .identifiers(\"ec2.amazonaws.com\")\n .build())\n .actions(\"sts:AssumeRole\")\n .build())\n .build());\n\n var role = new Role(\"role\", RoleArgs.builder()\n .name(\"test_role\")\n .path(\"/\")\n .assumeRolePolicy(assumeRole.applyValue(getPolicyDocumentResult -\u003e getPolicyDocumentResult.json()))\n .build());\n\n var testProfile = new InstanceProfile(\"testProfile\", InstanceProfileArgs.builder()\n .name(\"test_profile\")\n .role(role.name())\n .build());\n\n }\n}\n```\n```yaml\nresources:\n testProfile:\n type: aws:iam:InstanceProfile\n name: test_profile\n properties:\n name: test_profile\n role: ${role.name}\n role:\n type: aws:iam:Role\n properties:\n name: test_role\n path: /\n assumeRolePolicy: ${assumeRole.json}\nvariables:\n assumeRole:\n fn::invoke:\n Function: aws:iam:getPolicyDocument\n Arguments:\n statements:\n - effect: Allow\n principals:\n - type: Service\n identifiers:\n - ec2.amazonaws.com\n actions:\n - sts:AssumeRole\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nUsing `pulumi import`, import Instance Profiles using the `name`. For example:\n\n```sh\n$ pulumi import aws:iam/instanceProfile:InstanceProfile test_profile app-instance-profile-1\n```\n",
"properties": {
Expand Down Expand Up @@ -277691,6 +277745,60 @@
"type": "object"
}
},
"aws:iam/userPolicyAttachmentsExclusive:UserPolicyAttachmentsExclusive": {
"description": "\n\n## Import\n\nUsing `pulumi import`, import exclusive management of customer managed policy assignments using the `user_name`. For example:\n\n```sh\n$ pulumi import aws:iam/userPolicyAttachmentsExclusive:UserPolicyAttachmentsExclusive example MyUser\n```\n",
"properties": {
"policyArns": {
"type": "array",
"items": {
"type": "string"
},
"description": "A list of customer managed policy ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed.\n"
},
"userName": {
"type": "string",
"description": "IAM user name.\n"
}
},
"required": [
"policyArns",
"userName"
],
"inputProperties": {
"policyArns": {
"type": "array",
"items": {
"type": "string"
},
"description": "A list of customer managed policy ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed.\n"
},
"userName": {
"type": "string",
"description": "IAM user name.\n"
}
},
"requiredInputs": [
"policyArns",
"userName"
],
"stateInputs": {
"description": "Input properties used for looking up and filtering UserPolicyAttachmentsExclusive resources.\n",
"properties": {
"policyArns": {
"type": "array",
"items": {
"type": "string"
},
"description": "A list of customer managed policy ARNs to be attached to the user. Policies attached to this user but not configured in this argument will be removed.\n"
},
"userName": {
"type": "string",
"description": "IAM user name.\n"
}
},
"type": "object"
}
},
"aws:iam/virtualMfaDevice:VirtualMfaDevice": {
"description": "Provides an IAM Virtual MFA Device.\n\n\u003e **Note:** All attributes will be stored in the raw state as plain-text.\n\u003e **Note:** A virtual MFA device cannot be directly associated with an IAM User from the provider.\n To associate the virtual MFA device with a user and enable it, use the code returned in either `base_32_string_seed` or `qr_code_png` to generate TOTP authentication codes.\n The authentication codes can then be used with the AWS CLI command [`aws iam enable-mfa-device`](https://docs.aws.amazon.com/cli/latest/reference/iam/enable-mfa-device.html) or the AWS API call [`EnableMFADevice`](https://docs.aws.amazon.com/IAM/latest/APIReference/API_EnableMFADevice.html).\n\n## Example Usage\n\n**Using certs on file:**\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as aws from \"@pulumi/aws\";\n\nconst example = new aws.iam.VirtualMfaDevice(\"example\", {virtualMfaDeviceName: \"example\"});\n```\n```python\nimport pulumi\nimport pulumi_aws as aws\n\nexample = aws.iam.VirtualMfaDevice(\"example\", virtual_mfa_device_name=\"example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Aws = Pulumi.Aws;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n var example = new Aws.Iam.VirtualMfaDevice(\"example\", new()\n {\n VirtualMfaDeviceName = \"example\",\n });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-aws/sdk/v6/go/aws/iam\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := iam.NewVirtualMfaDevice(ctx, \"example\", \u0026iam.VirtualMfaDeviceArgs{\n\t\t\tVirtualMfaDeviceName: pulumi.String(\"example\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.aws.iam.VirtualMfaDevice;\nimport com.pulumi.aws.iam.VirtualMfaDeviceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var example = new VirtualMfaDevice(\"example\", VirtualMfaDeviceArgs.builder()\n .virtualMfaDeviceName(\"example\")\n .build());\n\n }\n}\n```\n```yaml\nresources:\n example:\n type: aws:iam:VirtualMfaDevice\n properties:\n virtualMfaDeviceName: example\n```\n\u003c!--End PulumiCodeChooser --\u003e\n\n## Import\n\nUsing `pulumi import`, import IAM Virtual MFA Devices using the `arn`. For example:\n\n```sh\n$ pulumi import aws:iam/virtualMfaDevice:VirtualMfaDevice example arn:aws:iam::123456789012:mfa/example\n```\n",
"properties": {
Expand Down Expand Up @@ -335320,6 +335428,10 @@
"type": "string",
"description": "The name of the view. The name must be no more than 64 characters long, and can include letters, digits, and the dash (-) character. The name must be unique within its AWS Region.\n"
},
"scope": {
"type": "string",
"description": "The root ARN of the account, an organizational unit (OU), or an organization ARN. If left empty, the default is account.\n"
},
"tags": {
"type": "object",
"additionalProperties": {
Expand All @@ -335340,6 +335452,7 @@
"arn",
"defaultView",
"name",
"scope",
"tagsAll"
],
"inputProperties": {
Expand All @@ -335362,6 +335475,10 @@
"type": "string",
"description": "The name of the view. The name must be no more than 64 characters long, and can include letters, digits, and the dash (-) character. The name must be unique within its AWS Region.\n"
},
"scope": {
"type": "string",
"description": "The root ARN of the account, an organizational unit (OU), or an organization ARN. If left empty, the default is account.\n"
},
"tags": {
"type": "object",
"additionalProperties": {
Expand Down Expand Up @@ -335396,6 +335513,10 @@
"type": "string",
"description": "The name of the view. The name must be no more than 64 characters long, and can include letters, digits, and the dash (-) character. The name must be unique within its AWS Region.\n"
},
"scope": {
"type": "string",
"description": "The root ARN of the account, an organizational unit (OU), or an organization ARN. If left empty, the default is account.\n"
},
"tags": {
"type": "object",
"additionalProperties": {
Expand Down Expand Up @@ -376807,6 +376928,9 @@
"outputs": {
"description": "A collection of values returned by getKey.\n",
"properties": {
"arn": {
"type": "string"
},
"createdDate": {
"description": "Date and time when the API Key was created.\n",
"type": "string"
Expand Down Expand Up @@ -376849,6 +376973,7 @@
}
},
"required": [
"arn",
"createdDate",
"customerId",
"description",
Expand Down Expand Up @@ -377117,6 +377242,9 @@
"outputs": {
"description": "A collection of values returned by getVpcLink.\n",
"properties": {
"arn": {
"type": "string"
},
"description": {
"description": "Description of the VPC link.\n",
"type": "string"
Expand Down Expand Up @@ -377152,6 +377280,7 @@
}
},
"required": [
"arn",
"description",
"id",
"name",
Expand Down

0 comments on commit 6fa4f08

Please sign in to comment.