diff --git a/README.md b/README.md index 7ad3eefe1..4cd5efc41 100644 --- a/README.md +++ b/README.md @@ -109,6 +109,7 @@ Example | Description | Example | Description | --------- | --------- | +[AssumeRole](aws-go-assume-role) | Use AssumeRole to create resources. [Fargate](aws-go-fargate) | Provision a full ECS Fargate cluster running a load-balanced nginx web server. [Lambda](aws-go-lambda) | Create a lambda that does a simple `ToUpper` on the string input and returns it. [S3 Folder](aws-go-s3-folder) | Serve a static website on S3. @@ -118,6 +119,7 @@ Example | Description | Example | Description | --------- | --------- | +[AssumeRole](aws-cs-assume-role) | Use AssumeRole to create resources. [Fargate](aws-cs-fargate) | Build, deploy, and run a Dockerized app using ECS, ECR, and Fargate. [Lambda](aws-cs-lambda) | Create a lambda that does a simple `ToUpper` on the string input and returns it. [S3 Folder](aws-cs-s3-folder) | Serve a static website on S3. diff --git a/aws-cs-assume-role/README.md b/aws-cs-assume-role/README.md index 6d93399b9..1d73cf7ac 100644 --- a/aws-cs-assume-role/README.md +++ b/aws-cs-assume-role/README.md @@ -34,6 +34,7 @@ $ pulumi stack output --json "roleArn": "arn:aws:iam:::role/allow-s3-management-ad477e6" } ``` + If we just use the above command then the secretAccessKey would not be shown. In order to show the secret value use this ``` diff --git a/aws-cs-assume-role/assume-role/AssumeRoleStack.cs b/aws-cs-assume-role/assume-role/AssumeRoleStack.cs index 891937a56..0bfd96b0d 100644 --- a/aws-cs-assume-role/assume-role/AssumeRoleStack.cs +++ b/aws-cs-assume-role/assume-role/AssumeRoleStack.cs @@ -1,8 +1,8 @@ +using System; using Pulumi; using Aws = Pulumi.Aws; using Input = Pulumi.Aws.Inputs; using AwsConfig = Pulumi.Aws.Config; -using System; class AssumeRoleStack : Stack @@ -12,8 +12,7 @@ public AssumeRoleStack() var awsConfig = new Pulumi.Config("aws"); var config = new Pulumi.Config(); var roleToAssumeARN = config.Require("roleToAssumeARN"); - var provider = new Aws.Provider("privileged", new Aws.ProviderArgs - { + var provider = new Aws.Provider("privileged", new Aws.ProviderArgs { AssumeRole = new Aws.Inputs.ProviderAssumeRoleArgs { RoleArn = roleToAssumeARN, diff --git a/aws-cs-assume-role/assume-role/Pulumi.yaml b/aws-cs-assume-role/assume-role/Pulumi.yaml index f769ed7ec..af08ffe96 100644 --- a/aws-cs-assume-role/assume-role/Pulumi.yaml +++ b/aws-cs-assume-role/assume-role/Pulumi.yaml @@ -1,3 +1,3 @@ -name: cs-assume-role +name: assume-role runtime: dotnet description: Demonstrate use of AWS AssumeRole Functionality in C# diff --git a/aws-cs-assume-role/create-role/CreateRoleStack.cs b/aws-cs-assume-role/create-role/CreateRoleStack.cs index 4ec728af0..20ea930da 100644 --- a/aws-cs-assume-role/create-role/CreateRoleStack.cs +++ b/aws-cs-assume-role/create-role/CreateRoleStack.cs @@ -12,10 +12,10 @@ public CreateRoleStack() var config = new Pulumi.Config(); var unprivilegedUsername = config.Require("unprivilegedUsername"); - var unprivilegedUser = new Iam.User("unprivilegedUser", new Iam.UserArgs - { - Name = unprivilegedUsername, - }); + var unprivilegedUser = new Iam.User("unprivilegedUser", new Iam.UserArgs + { + Name = unprivilegedUsername, + }); var unprivilegedUserCreds = new Iam.AccessKey("unprivileged-user-key", new Iam.AccessKeyArgs { @@ -28,7 +28,7 @@ public CreateRoleStack() var tempPolicy = unprivilegedUser.Arn.Apply((string arn) => { AssumeRolePolicyArgs policyArgs = new AssumeRolePolicyArgs(arn); return JsonSerializer.Serialize(policyArgs); - }); + }); var allowS3ManagementRole = new Iam.Role("allow-s3-management", new Iam.RoleArgs { diff --git a/aws-cs-assume-role/create-role/Program.cs b/aws-cs-assume-role/create-role/Program.cs index 8883515d8..6c1be424e 100644 --- a/aws-cs-assume-role/create-role/Program.cs +++ b/aws-cs-assume-role/create-role/Program.cs @@ -1,4 +1,6 @@ -using System.Threading.Tasks; +// Copyright 2016-2020, Pulumi Corporation. All rights reserved. + +using System.Threading.Tasks; using Pulumi; class Program diff --git a/aws-cs-assume-role/create-role/Pulumi.yaml b/aws-cs-assume-role/create-role/Pulumi.yaml index 7a4ca4f72..5606bc2f3 100644 --- a/aws-cs-assume-role/create-role/Pulumi.yaml +++ b/aws-cs-assume-role/create-role/Pulumi.yaml @@ -1,3 +1,3 @@ -name: cs-create-role +name: create-role runtime: dotnet description: Demonstrate use of AWS AssumeRole Functionality in C# diff --git a/aws-go-assume-role/README.md b/aws-go-assume-role/README.md index d53a50e6c..bbe3f779b 100644 --- a/aws-go-assume-role/README.md +++ b/aws-go-assume-role/README.md @@ -63,7 +63,7 @@ must be set to the region in which you wish to operate: ```bash $ pulumi stack init assume-role-assume -$ pulumi config set roleToAssumeARN "$(pulumi stack output --stack assume-role-create roleArn)" +$ pulumi config set roleToAssumeARN "$(pulumi stack output --stack {YOUR_STACK_PATH/assume-role-create} roleArn)" $ pulumi config set aws:region us-east-1 ``` diff --git a/aws-go-assume-role/assume-role/assume-role b/aws-go-assume-role/assume-role/assume-role deleted file mode 100755 index 67acb8cdf..000000000 Binary files a/aws-go-assume-role/assume-role/assume-role and /dev/null differ diff --git a/aws-go-assume-role/assume-role/main.go b/aws-go-assume-role/assume-role/main.go index c8bbd39f8..bb4875244 100644 --- a/aws-go-assume-role/assume-role/main.go +++ b/aws-go-assume-role/assume-role/main.go @@ -1,3 +1,5 @@ +// Copyright 2016-2020, Pulumi Corporation. All rights reserved. + package main import ( diff --git a/aws-go-assume-role/create-role/main.go b/aws-go-assume-role/create-role/main.go index 4363df41c..908d05ab1 100644 --- a/aws-go-assume-role/create-role/main.go +++ b/aws-go-assume-role/create-role/main.go @@ -1,4 +1,5 @@ -// Copyright 2016-2019, Pulumi Corporation. All rights reserved. +// Copyright 2016-2020, Pulumi Corporation. All rights reserved. + package main import ( diff --git a/aws-py-assume-role/create-role/venv/pyvenv.cfg b/aws-py-assume-role/create-role/venv/pyvenv.cfg deleted file mode 100644 index 09096b0fc..000000000 --- a/aws-py-assume-role/create-role/venv/pyvenv.cfg +++ /dev/null @@ -1,3 +0,0 @@ -home = /Users/xuanhezhou/examples/aws-py-assume-role/create-role/venv/bin -include-system-site-packages = false -version = 3.8.3 diff --git a/aws-ts-assume-role/create-role/index.ts b/aws-ts-assume-role/create-role/index.ts index f2c0359ac..4aeee448d 100644 --- a/aws-ts-assume-role/create-role/index.ts +++ b/aws-ts-assume-role/create-role/index.ts @@ -1,4 +1,4 @@ -// Copyright 2016-2019, Pulumi Corporation. All rights reserved. +// Copyright 2016-2020, Pulumi Corporation. All rights reserved. import * as aws from "@pulumi/aws"; import * as pulumi from "@pulumi/pulumi"; @@ -15,7 +15,7 @@ const unprivilegedUserCreds = new aws.iam.AccessKey("unprivileged-user-key", { }, // additional_secret_outputs specify properties that must be encrypted as secrets // https://www.pulumi.com/docs/intro/concepts/programming-model/#additionalsecretoutputs -{additionalSecretOutputs: ["secret"]}); +{ additionalSecretOutputs: ["secret"] }); const allowS3ManagementRole = new aws.iam.Role("allow-s3-management", { description: "Allow management of S3 buckets",