UNPKG

@pulumi/aws

Version:

A Pulumi package for creating and managing Amazon Web Services (AWS) cloud resources.

104 lines 4.8 kB
"use strict"; // *** WARNING: this file was generated by pulumi-language-nodejs. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.RolePoliciesExclusive = void 0; const pulumi = require("@pulumi/pulumi"); const utilities = require("../utilities"); /** * > **NOTE:**: To reliably detect drift between customer managed inline policies listed in this resource and actual policies attached to the role in the cloud, you currently need to run Pulumi with `pulumi up --refresh`. See [#4766](https://github.com/pulumi/pulumi-aws/issues/4766) for tracking making this work with regular `pulumi up` invocations. * * Resource for maintaining exclusive management of inline policies assigned to an AWS IAM (Identity & Access Management) role. * * !> This resource takes exclusive ownership over inline policies assigned to a role. This includes removal of inline policies which are not explicitly configured. To prevent persistent drift, ensure any `aws.iam.RolePolicy` resources managed alongside this resource are included in the `policyNames` argument. * * > Destruction of this resource means Pulumi will no longer manage reconciliation of the configured inline policy assignments. It __will not__ delete the configured policies from the role. * * ## Example Usage * * ### Basic Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as aws from "@pulumi/aws"; * * const example = new aws.iam.RolePoliciesExclusive("example", { * roleName: exampleAwsIamRole.name, * policyNames: [exampleAwsIamRolePolicy.name], * }); * ``` * * ### Disallow Inline Policies * * To automatically remove any configured inline policies, set the `policyNames` argument to an empty list. * * > This will not __prevent__ inline policies from being assigned to a role via Pulumi (or any other interface). This resource enables bringing inline policy assignments into a configured state, however, this reconciliation happens only when `apply` is proactively run. * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as aws from "@pulumi/aws"; * * const example = new aws.iam.RolePoliciesExclusive("example", { * roleName: exampleAwsIamRole.name, * policyNames: [], * }); * ``` * * ## Import * * Using `pulumi import`, import exclusive management of inline policy assignments using the `role_name`. For example: * * ```sh * $ pulumi import aws:iam/rolePoliciesExclusive:RolePoliciesExclusive example MyRole * ``` */ class RolePoliciesExclusive extends pulumi.CustomResource { /** * Get an existing RolePoliciesExclusive resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new RolePoliciesExclusive(name, state, { ...opts, id: id }); } /** * Returns true if the given object is an instance of RolePoliciesExclusive. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === RolePoliciesExclusive.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["policyNames"] = state?.policyNames; resourceInputs["roleName"] = state?.roleName; } else { const args = argsOrState; if (args?.policyNames === undefined && !opts.urn) { throw new Error("Missing required property 'policyNames'"); } if (args?.roleName === undefined && !opts.urn) { throw new Error("Missing required property 'roleName'"); } resourceInputs["policyNames"] = args?.policyNames; resourceInputs["roleName"] = args?.roleName; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); super(RolePoliciesExclusive.__pulumiType, name, resourceInputs, opts); } } exports.RolePoliciesExclusive = RolePoliciesExclusive; /** @internal */ RolePoliciesExclusive.__pulumiType = 'aws:iam/rolePoliciesExclusive:RolePoliciesExclusive'; //# sourceMappingURL=rolePoliciesExclusive.js.map