Skip to content

Commit

Permalink
runs make tfgen
Browse files Browse the repository at this point in the history
  • Loading branch information
kpitzen committed Mar 24, 2023
1 parent 29165a6 commit 6033270
Showing 1 changed file with 2 additions and 5 deletions.
7 changes: 2 additions & 5 deletions provider/cmd/pulumi-resource-aws/schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -21797,10 +21797,7 @@
}
},
"ec2Configuration": {
"type": "array",
"items": {
"$ref": "#/types/aws:batch/ComputeEnvironmentComputeResourcesEc2Configuration:ComputeEnvironmentComputeResourcesEc2Configuration"
},
"$ref": "#/types/aws:batch/ComputeEnvironmentComputeResourcesEc2Configuration:ComputeEnvironmentComputeResourcesEc2Configuration",
"description": "Provides information used to select Amazon Machine Images (AMIs) for EC2 instances in the compute environment. If Ec2Configuration isn't specified, the default is ECS_AL2. This parameter isn't applicable to jobs that are running on Fargate resources, and shouldn't be specified.\n",
"language": {
"python": {
Expand Down Expand Up @@ -440298,7 +440295,7 @@
}
},
"aws:cognito/identityPoolRoleAttachment:IdentityPoolRoleAttachment": {
"description": "Provides an AWS Cognito Identity Pool Roles Attachment.\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.aws.cognito.IdentityPool;\nimport com.pulumi.aws.cognito.IdentityPoolArgs;\nimport com.pulumi.aws.iam.IamFunctions;\nimport com.pulumi.aws.iam.inputs.GetPolicyDocumentArgs;\nimport com.pulumi.aws.iam.Role;\nimport com.pulumi.aws.iam.RoleArgs;\nimport com.pulumi.aws.iam.RolePolicy;\nimport com.pulumi.aws.iam.RolePolicyArgs;\nimport com.pulumi.aws.cognito.IdentityPoolRoleAttachment;\nimport com.pulumi.aws.cognito.IdentityPoolRoleAttachmentArgs;\nimport com.pulumi.aws.cognito.inputs.IdentityPoolRoleAttachmentRoleMappingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var mainIdentityPool = new IdentityPool(\"mainIdentityPool\", IdentityPoolArgs.builder() \n .identityPoolName(\"identity pool\")\n .allowUnauthenticatedIdentities(false)\n .supportedLoginProviders(Map.of(\"graph.facebook.com\", \"7346241598935555\"))\n .build());\n\n final var authenticatedPolicyDocument = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()\n .statements(GetPolicyDocumentStatementArgs.builder()\n .effect(\"Allow\")\n .principals(GetPolicyDocumentStatementPrincipalArgs.builder()\n .type(\"Federated\")\n .identifiers(\"cognito-identity.amazonaws.com\")\n .build())\n .actions(\"sts:AssumeRoleWithWebIdentity\")\n .conditions( \n GetPolicyDocumentStatementConditionArgs.builder()\n .test(\"StringEquals\")\n .variable(\"cognito-identity.amazonaws.com:aud\")\n .values(mainIdentityPool.id())\n .build(),\n GetPolicyDocumentStatementConditionArgs.builder()\n .test(\"ForAnyValue:StringLike\")\n .variable(\"cognito-identity.amazonaws.com:amr\")\n .values(\"authenticated\")\n .build())\n .build())\n .build());\n\n var authenticatedRole = new Role(\"authenticatedRole\", RoleArgs.builder() \n .assumeRolePolicy(authenticatedPolicyDocument.applyValue(getPolicyDocumentResult -\u003e getPolicyDocumentResult).applyValue(authenticatedPolicyDocument -\u003e authenticatedPolicyDocument.applyValue(getPolicyDocumentResult -\u003e getPolicyDocumentResult.json())))\n .build());\n\n final var authenticatedRolePolicyPolicyDocument = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()\n .effect(\"Allow\")\n .actions( \n \"mobileanalytics:PutEvents\",\n \"cognito-sync:*\",\n \"cognito-identity:*\")\n .resources(\"*\")\n .build());\n\n var authenticatedRolePolicy = new RolePolicy(\"authenticatedRolePolicy\", RolePolicyArgs.builder() \n .role(authenticatedRole.id())\n .policy(authenticatedRolePolicyPolicyDocument.applyValue(getPolicyDocumentResult -\u003e getPolicyDocumentResult.json()))\n .build());\n\n var mainIdentityPoolRoleAttachment = new IdentityPoolRoleAttachment(\"mainIdentityPoolRoleAttachment\", IdentityPoolRoleAttachmentArgs.builder() \n .identityPoolId(mainIdentityPool.id())\n .roleMappings(IdentityPoolRoleAttachmentRoleMappingArgs.builder()\n .identityProvider(\"graph.facebook.com\")\n .ambiguousRoleResolution(\"AuthenticatedRole\")\n .type(\"Rules\")\n .mappingRules(IdentityPoolRoleAttachmentRoleMappingMappingRuleArgs.builder()\n .claim(\"isAdmin\")\n .matchType(\"Equals\")\n .roleArn(authenticatedRole.arn())\n .value(\"paid\")\n .build())\n .build())\n .roles(Map.of(\"authenticated\", authenticatedRole.arn()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n mainIdentityPool:\n type: aws:cognito:IdentityPool\n properties:\n identityPoolName: identity pool\n allowUnauthenticatedIdentities: false\n supportedLoginProviders:\n graph.facebook.com: '7346241598935555'\n authenticatedRole:\n type: aws:iam:Role\n properties:\n assumeRolePolicy: ${authenticatedPolicyDocument.json}\n authenticatedRolePolicy:\n type: aws:iam:RolePolicy\n properties:\n role: ${authenticatedRole.id}\n policy: ${authenticatedRolePolicyPolicyDocument.json}\n mainIdentityPoolRoleAttachment:\n type: aws:cognito:IdentityPoolRoleAttachment\n properties:\n identityPoolId: ${mainIdentityPool.id}\n roleMappings:\n - identityProvider: graph.facebook.com\n ambiguousRoleResolution: AuthenticatedRole\n type: Rules\n mappingRules:\n - claim: isAdmin\n matchType: Equals\n roleArn: ${authenticatedRole.arn}\n value: paid\n roles:\n authenticated: ${authenticatedRole.arn}\nvariables:\n authenticatedPolicyDocument:\n fn::invoke:\n Function: aws:iam:getPolicyDocument\n Arguments:\n statements:\n - effect: Allow\n principals:\n - type: Federated\n identifiers:\n - cognito-identity.amazonaws.com\n actions:\n - sts:AssumeRoleWithWebIdentity\n conditions:\n - test: StringEquals\n variable: cognito-identity.amazonaws.com:aud\n values:\n - ${mainIdentityPool.id}\n - test: ForAnyValue:StringLike\n variable: cognito-identity.amazonaws.com:amr\n values:\n - authenticated\n authenticatedRolePolicyPolicyDocument:\n fn::invoke:\n Function: aws:iam:getPolicyDocument\n Arguments:\n effect: Allow\n actions:\n - mobileanalytics:PutEvents\n - cognito-sync:*\n - cognito-identity:*\n resources:\n - '*'\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nCognito Identity Pool Roles Attachment can be imported using the Identity Pool ID, e.g.,\n\n```sh\n $ pulumi import aws:cognito/identityPoolRoleAttachment:IdentityPoolRoleAttachment example us-west-2:b64805ad-cb56-40ba-9ffc-f5d8207e6d42\n```\n\n ",
"description": "Provides an AWS Cognito Identity Pool Roles Attachment.\n\n{{% examples %}}\n## Example Usage\n{{% example %}}\n\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.aws.cognito.IdentityPool;\nimport com.pulumi.aws.cognito.IdentityPoolArgs;\nimport com.pulumi.aws.iam.IamFunctions;\nimport com.pulumi.aws.iam.inputs.GetPolicyDocumentArgs;\nimport com.pulumi.aws.iam.Role;\nimport com.pulumi.aws.iam.RoleArgs;\nimport com.pulumi.aws.iam.RolePolicy;\nimport com.pulumi.aws.iam.RolePolicyArgs;\nimport com.pulumi.aws.cognito.IdentityPoolRoleAttachment;\nimport com.pulumi.aws.cognito.IdentityPoolRoleAttachmentArgs;\nimport com.pulumi.aws.cognito.inputs.IdentityPoolRoleAttachmentRoleMappingArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n public static void main(String[] args) {\n Pulumi.run(App::stack);\n }\n\n public static void stack(Context ctx) {\n var mainIdentityPool = new IdentityPool(\"mainIdentityPool\", IdentityPoolArgs.builder() \n .identityPoolName(\"identity pool\")\n .allowUnauthenticatedIdentities(false)\n .supportedLoginProviders(Map.of(\"graph.facebook.com\", \"7346241598935555\"))\n .build());\n\n final var authenticatedPolicyDocument = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()\n .statements(GetPolicyDocumentStatementArgs.builder()\n .effect(\"Allow\")\n .principals(GetPolicyDocumentStatementPrincipalArgs.builder()\n .type(\"Federated\")\n .identifiers(\"cognito-identity.amazonaws.com\")\n .build())\n .actions(\"sts:AssumeRoleWithWebIdentity\")\n .conditions( \n GetPolicyDocumentStatementConditionArgs.builder()\n .test(\"StringEquals\")\n .variable(\"cognito-identity.amazonaws.com:aud\")\n .values(mainIdentityPool.id())\n .build(),\n GetPolicyDocumentStatementConditionArgs.builder()\n .test(\"ForAnyValue:StringLike\")\n .variable(\"cognito-identity.amazonaws.com:amr\")\n .values(\"authenticated\")\n .build())\n .build())\n .build());\n\n var authenticatedRole = new Role(\"authenticatedRole\", RoleArgs.builder() \n .assumeRolePolicy(authenticatedPolicyDocument.applyValue(getPolicyDocumentResult -\u003e getPolicyDocumentResult).applyValue(authenticatedPolicyDocument -\u003e authenticatedPolicyDocument.applyValue(getPolicyDocumentResult -\u003e getPolicyDocumentResult.json())))\n .build());\n\n final var authenticatedRolePolicy = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()\n .effect(\"Allow\")\n .actions( \n \"mobileanalytics:PutEvents\",\n \"cognito-sync:*\",\n \"cognito-identity:*\")\n .resources(\"*\")\n .build());\n\n var authenticatedIam_rolePolicyRolePolicy = new RolePolicy(\"authenticatedIam/rolePolicyRolePolicy\", RolePolicyArgs.builder() \n .role(authenticatedRole.id())\n .policy(authenticatedRolePolicy.applyValue(getPolicyDocumentResult -\u003e getPolicyDocumentResult.json()))\n .build());\n\n var mainIdentityPoolRoleAttachment = new IdentityPoolRoleAttachment(\"mainIdentityPoolRoleAttachment\", IdentityPoolRoleAttachmentArgs.builder() \n .identityPoolId(mainIdentityPool.id())\n .roleMappings(IdentityPoolRoleAttachmentRoleMappingArgs.builder()\n .identityProvider(\"graph.facebook.com\")\n .ambiguousRoleResolution(\"AuthenticatedRole\")\n .type(\"Rules\")\n .mappingRules(IdentityPoolRoleAttachmentRoleMappingMappingRuleArgs.builder()\n .claim(\"isAdmin\")\n .matchType(\"Equals\")\n .roleArn(authenticatedRole.arn())\n .value(\"paid\")\n .build())\n .build())\n .roles(Map.of(\"authenticated\", authenticatedRole.arn()))\n .build());\n\n }\n}\n```\n```yaml\nresources:\n mainIdentityPool:\n type: aws:cognito:IdentityPool\n properties:\n identityPoolName: identity pool\n allowUnauthenticatedIdentities: false\n supportedLoginProviders:\n graph.facebook.com: '7346241598935555'\n authenticatedRole:\n type: aws:iam:Role\n properties:\n assumeRolePolicy: ${authenticatedPolicyDocument.json}\n authenticatedIam/rolePolicyRolePolicy:\n type: aws:iam:RolePolicy\n properties:\n role: ${authenticatedRole.id}\n policy: ${authenticatedRolePolicy.json}\n mainIdentityPoolRoleAttachment:\n type: aws:cognito:IdentityPoolRoleAttachment\n properties:\n identityPoolId: ${mainIdentityPool.id}\n roleMappings:\n - identityProvider: graph.facebook.com\n ambiguousRoleResolution: AuthenticatedRole\n type: Rules\n mappingRules:\n - claim: isAdmin\n matchType: Equals\n roleArn: ${authenticatedRole.arn}\n value: paid\n roles:\n authenticated: ${authenticatedRole.arn}\nvariables:\n authenticatedPolicyDocument:\n fn::invoke:\n Function: aws:iam:getPolicyDocument\n Arguments:\n statements:\n - effect: Allow\n principals:\n - type: Federated\n identifiers:\n - cognito-identity.amazonaws.com\n actions:\n - sts:AssumeRoleWithWebIdentity\n conditions:\n - test: StringEquals\n variable: cognito-identity.amazonaws.com:aud\n values:\n - ${mainIdentityPool.id}\n - test: ForAnyValue:StringLike\n variable: cognito-identity.amazonaws.com:amr\n values:\n - authenticated\n authenticatedRolePolicy:\n fn::invoke:\n Function: aws:iam:getPolicyDocument\n Arguments:\n effect: Allow\n actions:\n - mobileanalytics:PutEvents\n - cognito-sync:*\n - cognito-identity:*\n resources:\n - '*'\n```\n{{% /example %}}\n{{% /examples %}}\n\n## Import\n\nCognito Identity Pool Roles Attachment can be imported using the Identity Pool ID, e.g.,\n\n```sh\n $ pulumi import aws:cognito/identityPoolRoleAttachment:IdentityPoolRoleAttachment example us-west-2:b64805ad-cb56-40ba-9ffc-f5d8207e6d42\n```\n\n ",
"properties": {
"identityPoolId": {
"type": "string",
Expand Down

0 comments on commit 6033270

Please sign in to comment.