harness.cloudprovider.Aws
Explore with Pulumi AI
Resource for creating an AWS cloud provider. This resource uses the config-as-code API’s. When updating the name
or path
of this resource you should typically also set the create_before_destroy = true
lifecycle setting.
Example Usage
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Harness = Lbrlabs.PulumiPackage.Harness;
using Harness = Pulumi.Harness;
return await Deployment.RunAsync(() =>
{
var @default = Harness.GetSecretManager.Invoke(new()
{
Default = true,
});
var awsAccessKey = new Harness.EncryptedText("awsAccessKey", new()
{
Value = "<ACCESS_KEY_ID>",
SecretManagerId = @default.Apply(@default => @default.Apply(getSecretManagerResult => getSecretManagerResult.Id)),
});
var awsSecretKey = new Harness.EncryptedText("awsSecretKey", new()
{
Value = "<SECRET_KEY_ID>",
SecretManagerId = @default.Apply(@default => @default.Apply(getSecretManagerResult => getSecretManagerResult.Id)),
});
var aws = new Harness.Cloudprovider.Aws("aws", new()
{
AccessKeyIdSecretName = awsAccessKey.Name,
SecretAccessKeySecretName = awsSecretKey.Name,
});
});
package main
import (
"github.com/lbrlabs/pulumi-harness/sdk/go/harness"
"github.com/lbrlabs/pulumi-harness/sdk/go/harness/cloudprovider"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_default, err := harness.GetSecretManager(ctx, &harness.GetSecretManagerArgs{
Default: pulumi.BoolRef(true),
}, nil)
if err != nil {
return err
}
awsAccessKey, err := harness.NewEncryptedText(ctx, "awsAccessKey", &harness.EncryptedTextArgs{
Value: pulumi.String("<ACCESS_KEY_ID>"),
SecretManagerId: *pulumi.String(_default.Id),
})
if err != nil {
return err
}
awsSecretKey, err := harness.NewEncryptedText(ctx, "awsSecretKey", &harness.EncryptedTextArgs{
Value: pulumi.String("<SECRET_KEY_ID>"),
SecretManagerId: *pulumi.String(_default.Id),
})
if err != nil {
return err
}
_, err = cloudprovider.NewAws(ctx, "aws", &cloudprovider.AwsArgs{
AccessKeyIdSecretName: awsAccessKey.Name,
SecretAccessKeySecretName: awsSecretKey.Name,
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.harness.HarnessFunctions;
import com.pulumi.harness.inputs.GetSecretManagerArgs;
import com.pulumi.harness.EncryptedText;
import com.pulumi.harness.EncryptedTextArgs;
import com.pulumi.harness.cloudprovider.Aws;
import com.pulumi.harness.cloudprovider.AwsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var default = HarnessFunctions.getSecretManager(GetSecretManagerArgs.builder()
.default_(true)
.build());
var awsAccessKey = new EncryptedText("awsAccessKey", EncryptedTextArgs.builder()
.value("<ACCESS_KEY_ID>")
.secretManagerId(default_.id())
.build());
var awsSecretKey = new EncryptedText("awsSecretKey", EncryptedTextArgs.builder()
.value("<SECRET_KEY_ID>")
.secretManagerId(default_.id())
.build());
var aws = new Aws("aws", AwsArgs.builder()
.accessKeyIdSecretName(awsAccessKey.name())
.secretAccessKeySecretName(awsSecretKey.name())
.build());
}
}
import pulumi
import lbrlabs_pulumi_harness as harness
import pulumi_harness as harness
default = harness.get_secret_manager(default=True)
aws_access_key = harness.EncryptedText("awsAccessKey",
value="<ACCESS_KEY_ID>",
secret_manager_id=default.id)
aws_secret_key = harness.EncryptedText("awsSecretKey",
value="<SECRET_KEY_ID>",
secret_manager_id=default.id)
aws = harness.cloudprovider.Aws("aws",
access_key_id_secret_name=aws_access_key.name,
secret_access_key_secret_name=aws_secret_key.name)
import * as pulumi from "@pulumi/pulumi";
import * as harness from "@lbrlabs/pulumi-harness";
import * as harness from "@pulumi/harness";
const default = harness.getSecretManager({
"default": true,
});
const awsAccessKey = new harness.EncryptedText("awsAccessKey", {
value: "<ACCESS_KEY_ID>",
secretManagerId: _default.then(_default => _default.id),
});
const awsSecretKey = new harness.EncryptedText("awsSecretKey", {
value: "<SECRET_KEY_ID>",
secretManagerId: _default.then(_default => _default.id),
});
const aws = new harness.cloudprovider.Aws("aws", {
accessKeyIdSecretName: awsAccessKey.name,
secretAccessKeySecretName: awsSecretKey.name,
});
resources:
awsAccessKey:
type: harness:EncryptedText
properties:
value: <ACCESS_KEY_ID>
secretManagerId: ${default.id}
awsSecretKey:
type: harness:EncryptedText
properties:
value: <SECRET_KEY_ID>
secretManagerId: ${default.id}
aws:
type: harness:cloudprovider:Aws
properties:
accessKeyIdSecretName: ${awsAccessKey.name}
secretAccessKeySecretName: ${awsSecretKey.name}
variables:
default:
fn::invoke:
Function: harness:getSecretManager
Arguments:
default: true
Create Aws Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Aws(name: string, args?: AwsArgs, opts?: CustomResourceOptions);
@overload
def Aws(resource_name: str,
args: Optional[AwsArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def Aws(resource_name: str,
opts: Optional[ResourceOptions] = None,
access_key_id: Optional[str] = None,
access_key_id_secret_name: Optional[str] = None,
assume_cross_account_role: Optional[AwsAssumeCrossAccountRoleArgs] = None,
delegate_selector: Optional[str] = None,
name: Optional[str] = None,
secret_access_key_secret_name: Optional[str] = None,
usage_scopes: Optional[Sequence[AwsUsageScopeArgs]] = None,
use_ec2_iam_credentials: Optional[bool] = None,
use_irsa: Optional[bool] = None)
func NewAws(ctx *Context, name string, args *AwsArgs, opts ...ResourceOption) (*Aws, error)
public Aws(string name, AwsArgs? args = null, CustomResourceOptions? opts = null)
type: harness:cloudprovider:Aws
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AwsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AwsArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AwsArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AwsArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AwsArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var awsResource = new Harness.Cloudprovider.Aws("awsResource", new()
{
AccessKeyId = "string",
AccessKeyIdSecretName = "string",
AssumeCrossAccountRole = new Harness.Cloudprovider.Inputs.AwsAssumeCrossAccountRoleArgs
{
RoleArn = "string",
ExternalId = "string",
},
DelegateSelector = "string",
Name = "string",
SecretAccessKeySecretName = "string",
UsageScopes = new[]
{
new Harness.Cloudprovider.Inputs.AwsUsageScopeArgs
{
ApplicationId = "string",
EnvironmentFilterType = "string",
EnvironmentId = "string",
},
},
UseEc2IamCredentials = false,
UseIrsa = false,
});
example, err := cloudprovider.NewAws(ctx, "awsResource", &cloudprovider.AwsArgs{
AccessKeyId: pulumi.String("string"),
AccessKeyIdSecretName: pulumi.String("string"),
AssumeCrossAccountRole: &cloudprovider.AwsAssumeCrossAccountRoleArgs{
RoleArn: pulumi.String("string"),
ExternalId: pulumi.String("string"),
},
DelegateSelector: pulumi.String("string"),
Name: pulumi.String("string"),
SecretAccessKeySecretName: pulumi.String("string"),
UsageScopes: cloudprovider.AwsUsageScopeArray{
&cloudprovider.AwsUsageScopeArgs{
ApplicationId: pulumi.String("string"),
EnvironmentFilterType: pulumi.String("string"),
EnvironmentId: pulumi.String("string"),
},
},
UseEc2IamCredentials: pulumi.Bool(false),
UseIrsa: pulumi.Bool(false),
})
var awsResource = new Aws("awsResource", AwsArgs.builder()
.accessKeyId("string")
.accessKeyIdSecretName("string")
.assumeCrossAccountRole(AwsAssumeCrossAccountRoleArgs.builder()
.roleArn("string")
.externalId("string")
.build())
.delegateSelector("string")
.name("string")
.secretAccessKeySecretName("string")
.usageScopes(AwsUsageScopeArgs.builder()
.applicationId("string")
.environmentFilterType("string")
.environmentId("string")
.build())
.useEc2IamCredentials(false)
.useIrsa(false)
.build());
aws_resource = harness.cloudprovider.Aws("awsResource",
access_key_id="string",
access_key_id_secret_name="string",
assume_cross_account_role=harness.cloudprovider.AwsAssumeCrossAccountRoleArgs(
role_arn="string",
external_id="string",
),
delegate_selector="string",
name="string",
secret_access_key_secret_name="string",
usage_scopes=[harness.cloudprovider.AwsUsageScopeArgs(
application_id="string",
environment_filter_type="string",
environment_id="string",
)],
use_ec2_iam_credentials=False,
use_irsa=False)
const awsResource = new harness.cloudprovider.Aws("awsResource", {
accessKeyId: "string",
accessKeyIdSecretName: "string",
assumeCrossAccountRole: {
roleArn: "string",
externalId: "string",
},
delegateSelector: "string",
name: "string",
secretAccessKeySecretName: "string",
usageScopes: [{
applicationId: "string",
environmentFilterType: "string",
environmentId: "string",
}],
useEc2IamCredentials: false,
useIrsa: false,
});
type: harness:cloudprovider:Aws
properties:
accessKeyId: string
accessKeyIdSecretName: string
assumeCrossAccountRole:
externalId: string
roleArn: string
delegateSelector: string
name: string
secretAccessKeySecretName: string
usageScopes:
- applicationId: string
environmentFilterType: string
environmentId: string
useEc2IamCredentials: false
useIrsa: false
Aws Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The Aws resource accepts the following input properties:
- Access
Key stringId - The plain text AWS access key id.
- Access
Key stringId Secret Name - The name of the Harness secret containing the AWS access key id
- Assume
Cross Lbrlabs.Account Role Pulumi Package. Harness. Cloudprovider. Inputs. Aws Assume Cross Account Role - Configuration for assuming a cross account role.
- Delegate
Selector string - Select the Delegate to use via one of its Selectors.
- Name string
- The name of the cloud provider.
- Secret
Access stringKey Secret Name - The name of the Harness secret containing the AWS secret access key.
- Usage
Scopes List<Lbrlabs.Pulumi Package. Harness. Cloudprovider. Inputs. Aws Usage Scope> - This block is used for scoping the resource to a specific set of applications or environments.
- Use
Ec2Iam boolCredentials - Use the EC2 Instance Profile for Service Accounts.
- Use
Irsa bool - Use the AWS IAM Role for Service Accounts.
- Access
Key stringId - The plain text AWS access key id.
- Access
Key stringId Secret Name - The name of the Harness secret containing the AWS access key id
- Assume
Cross AwsAccount Role Assume Cross Account Role Args - Configuration for assuming a cross account role.
- Delegate
Selector string - Select the Delegate to use via one of its Selectors.
- Name string
- The name of the cloud provider.
- Secret
Access stringKey Secret Name - The name of the Harness secret containing the AWS secret access key.
- Usage
Scopes []AwsUsage Scope Args - This block is used for scoping the resource to a specific set of applications or environments.
- Use
Ec2Iam boolCredentials - Use the EC2 Instance Profile for Service Accounts.
- Use
Irsa bool - Use the AWS IAM Role for Service Accounts.
- access
Key StringId - The plain text AWS access key id.
- access
Key StringId Secret Name - The name of the Harness secret containing the AWS access key id
- assume
Cross AwsAccount Role Assume Cross Account Role - Configuration for assuming a cross account role.
- delegate
Selector String - Select the Delegate to use via one of its Selectors.
- name String
- The name of the cloud provider.
- secret
Access StringKey Secret Name - The name of the Harness secret containing the AWS secret access key.
- usage
Scopes List<AwsUsage Scope> - This block is used for scoping the resource to a specific set of applications or environments.
- use
Ec2Iam BooleanCredentials - Use the EC2 Instance Profile for Service Accounts.
- use
Irsa Boolean - Use the AWS IAM Role for Service Accounts.
- access
Key stringId - The plain text AWS access key id.
- access
Key stringId Secret Name - The name of the Harness secret containing the AWS access key id
- assume
Cross AwsAccount Role Assume Cross Account Role - Configuration for assuming a cross account role.
- delegate
Selector string - Select the Delegate to use via one of its Selectors.
- name string
- The name of the cloud provider.
- secret
Access stringKey Secret Name - The name of the Harness secret containing the AWS secret access key.
- usage
Scopes AwsUsage Scope[] - This block is used for scoping the resource to a specific set of applications or environments.
- use
Ec2Iam booleanCredentials - Use the EC2 Instance Profile for Service Accounts.
- use
Irsa boolean - Use the AWS IAM Role for Service Accounts.
- access_
key_ strid - The plain text AWS access key id.
- access_
key_ strid_ secret_ name - The name of the Harness secret containing the AWS access key id
- assume_
cross_ Awsaccount_ role Assume Cross Account Role Args - Configuration for assuming a cross account role.
- delegate_
selector str - Select the Delegate to use via one of its Selectors.
- name str
- The name of the cloud provider.
- secret_
access_ strkey_ secret_ name - The name of the Harness secret containing the AWS secret access key.
- usage_
scopes Sequence[AwsUsage Scope Args] - This block is used for scoping the resource to a specific set of applications or environments.
- use_
ec2_ booliam_ credentials - Use the EC2 Instance Profile for Service Accounts.
- use_
irsa bool - Use the AWS IAM Role for Service Accounts.
- access
Key StringId - The plain text AWS access key id.
- access
Key StringId Secret Name - The name of the Harness secret containing the AWS access key id
- assume
Cross Property MapAccount Role - Configuration for assuming a cross account role.
- delegate
Selector String - Select the Delegate to use via one of its Selectors.
- name String
- The name of the cloud provider.
- secret
Access StringKey Secret Name - The name of the Harness secret containing the AWS secret access key.
- usage
Scopes List<Property Map> - This block is used for scoping the resource to a specific set of applications or environments.
- use
Ec2Iam BooleanCredentials - Use the EC2 Instance Profile for Service Accounts.
- use
Irsa Boolean - Use the AWS IAM Role for Service Accounts.
Outputs
All input properties are implicitly available as output properties. Additionally, the Aws resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing Aws Resource
Get an existing Aws resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AwsState, opts?: CustomResourceOptions): Aws
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
access_key_id: Optional[str] = None,
access_key_id_secret_name: Optional[str] = None,
assume_cross_account_role: Optional[AwsAssumeCrossAccountRoleArgs] = None,
delegate_selector: Optional[str] = None,
name: Optional[str] = None,
secret_access_key_secret_name: Optional[str] = None,
usage_scopes: Optional[Sequence[AwsUsageScopeArgs]] = None,
use_ec2_iam_credentials: Optional[bool] = None,
use_irsa: Optional[bool] = None) -> Aws
func GetAws(ctx *Context, name string, id IDInput, state *AwsState, opts ...ResourceOption) (*Aws, error)
public static Aws Get(string name, Input<string> id, AwsState? state, CustomResourceOptions? opts = null)
public static Aws get(String name, Output<String> id, AwsState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Access
Key stringId - The plain text AWS access key id.
- Access
Key stringId Secret Name - The name of the Harness secret containing the AWS access key id
- Assume
Cross Lbrlabs.Account Role Pulumi Package. Harness. Cloudprovider. Inputs. Aws Assume Cross Account Role - Configuration for assuming a cross account role.
- Delegate
Selector string - Select the Delegate to use via one of its Selectors.
- Name string
- The name of the cloud provider.
- Secret
Access stringKey Secret Name - The name of the Harness secret containing the AWS secret access key.
- Usage
Scopes List<Lbrlabs.Pulumi Package. Harness. Cloudprovider. Inputs. Aws Usage Scope> - This block is used for scoping the resource to a specific set of applications or environments.
- Use
Ec2Iam boolCredentials - Use the EC2 Instance Profile for Service Accounts.
- Use
Irsa bool - Use the AWS IAM Role for Service Accounts.
- Access
Key stringId - The plain text AWS access key id.
- Access
Key stringId Secret Name - The name of the Harness secret containing the AWS access key id
- Assume
Cross AwsAccount Role Assume Cross Account Role Args - Configuration for assuming a cross account role.
- Delegate
Selector string - Select the Delegate to use via one of its Selectors.
- Name string
- The name of the cloud provider.
- Secret
Access stringKey Secret Name - The name of the Harness secret containing the AWS secret access key.
- Usage
Scopes []AwsUsage Scope Args - This block is used for scoping the resource to a specific set of applications or environments.
- Use
Ec2Iam boolCredentials - Use the EC2 Instance Profile for Service Accounts.
- Use
Irsa bool - Use the AWS IAM Role for Service Accounts.
- access
Key StringId - The plain text AWS access key id.
- access
Key StringId Secret Name - The name of the Harness secret containing the AWS access key id
- assume
Cross AwsAccount Role Assume Cross Account Role - Configuration for assuming a cross account role.
- delegate
Selector String - Select the Delegate to use via one of its Selectors.
- name String
- The name of the cloud provider.
- secret
Access StringKey Secret Name - The name of the Harness secret containing the AWS secret access key.
- usage
Scopes List<AwsUsage Scope> - This block is used for scoping the resource to a specific set of applications or environments.
- use
Ec2Iam BooleanCredentials - Use the EC2 Instance Profile for Service Accounts.
- use
Irsa Boolean - Use the AWS IAM Role for Service Accounts.
- access
Key stringId - The plain text AWS access key id.
- access
Key stringId Secret Name - The name of the Harness secret containing the AWS access key id
- assume
Cross AwsAccount Role Assume Cross Account Role - Configuration for assuming a cross account role.
- delegate
Selector string - Select the Delegate to use via one of its Selectors.
- name string
- The name of the cloud provider.
- secret
Access stringKey Secret Name - The name of the Harness secret containing the AWS secret access key.
- usage
Scopes AwsUsage Scope[] - This block is used for scoping the resource to a specific set of applications or environments.
- use
Ec2Iam booleanCredentials - Use the EC2 Instance Profile for Service Accounts.
- use
Irsa boolean - Use the AWS IAM Role for Service Accounts.
- access_
key_ strid - The plain text AWS access key id.
- access_
key_ strid_ secret_ name - The name of the Harness secret containing the AWS access key id
- assume_
cross_ Awsaccount_ role Assume Cross Account Role Args - Configuration for assuming a cross account role.
- delegate_
selector str - Select the Delegate to use via one of its Selectors.
- name str
- The name of the cloud provider.
- secret_
access_ strkey_ secret_ name - The name of the Harness secret containing the AWS secret access key.
- usage_
scopes Sequence[AwsUsage Scope Args] - This block is used for scoping the resource to a specific set of applications or environments.
- use_
ec2_ booliam_ credentials - Use the EC2 Instance Profile for Service Accounts.
- use_
irsa bool - Use the AWS IAM Role for Service Accounts.
- access
Key StringId - The plain text AWS access key id.
- access
Key StringId Secret Name - The name of the Harness secret containing the AWS access key id
- assume
Cross Property MapAccount Role - Configuration for assuming a cross account role.
- delegate
Selector String - Select the Delegate to use via one of its Selectors.
- name String
- The name of the cloud provider.
- secret
Access StringKey Secret Name - The name of the Harness secret containing the AWS secret access key.
- usage
Scopes List<Property Map> - This block is used for scoping the resource to a specific set of applications or environments.
- use
Ec2Iam BooleanCredentials - Use the EC2 Instance Profile for Service Accounts.
- use
Irsa Boolean - Use the AWS IAM Role for Service Accounts.
Supporting Types
AwsAssumeCrossAccountRole, AwsAssumeCrossAccountRoleArgs
- Role
Arn string - This is an IAM role in the target deployment AWS account.
- External
Id string - If the administrator of the account to which the role belongs provided you with an external ID, then enter that value.
- Role
Arn string - This is an IAM role in the target deployment AWS account.
- External
Id string - If the administrator of the account to which the role belongs provided you with an external ID, then enter that value.
- role
Arn String - This is an IAM role in the target deployment AWS account.
- external
Id String - If the administrator of the account to which the role belongs provided you with an external ID, then enter that value.
- role
Arn string - This is an IAM role in the target deployment AWS account.
- external
Id string - If the administrator of the account to which the role belongs provided you with an external ID, then enter that value.
- role_
arn str - This is an IAM role in the target deployment AWS account.
- external_
id str - If the administrator of the account to which the role belongs provided you with an external ID, then enter that value.
- role
Arn String - This is an IAM role in the target deployment AWS account.
- external
Id String - If the administrator of the account to which the role belongs provided you with an external ID, then enter that value.
AwsUsageScope, AwsUsageScopeArgs
- Application
Id string - Id of the application to scope to. If empty then this scope applies to all applications.
- Environment
Filter stringType - Type of environment filter applied. Cannot be used with
environment_id
. Valid options are NONPRODUCTIONENVIRONMENTS, PRODUCTION_ENVIRONMENTS. - Environment
Id string - Id of the id of the specific environment to scope to. Cannot be used with
environment_filter_type
.
- Application
Id string - Id of the application to scope to. If empty then this scope applies to all applications.
- Environment
Filter stringType - Type of environment filter applied. Cannot be used with
environment_id
. Valid options are NONPRODUCTIONENVIRONMENTS, PRODUCTION_ENVIRONMENTS. - Environment
Id string - Id of the id of the specific environment to scope to. Cannot be used with
environment_filter_type
.
- application
Id String - Id of the application to scope to. If empty then this scope applies to all applications.
- environment
Filter StringType - Type of environment filter applied. Cannot be used with
environment_id
. Valid options are NONPRODUCTIONENVIRONMENTS, PRODUCTION_ENVIRONMENTS. - environment
Id String - Id of the id of the specific environment to scope to. Cannot be used with
environment_filter_type
.
- application
Id string - Id of the application to scope to. If empty then this scope applies to all applications.
- environment
Filter stringType - Type of environment filter applied. Cannot be used with
environment_id
. Valid options are NONPRODUCTIONENVIRONMENTS, PRODUCTION_ENVIRONMENTS. - environment
Id string - Id of the id of the specific environment to scope to. Cannot be used with
environment_filter_type
.
- application_
id str - Id of the application to scope to. If empty then this scope applies to all applications.
- environment_
filter_ strtype - Type of environment filter applied. Cannot be used with
environment_id
. Valid options are NONPRODUCTIONENVIRONMENTS, PRODUCTION_ENVIRONMENTS. - environment_
id str - Id of the id of the specific environment to scope to. Cannot be used with
environment_filter_type
.
- application
Id String - Id of the application to scope to. If empty then this scope applies to all applications.
- environment
Filter StringType - Type of environment filter applied. Cannot be used with
environment_id
. Valid options are NONPRODUCTIONENVIRONMENTS, PRODUCTION_ENVIRONMENTS. - environment
Id String - Id of the id of the specific environment to scope to. Cannot be used with
environment_filter_type
.
Import
Import using the Harness aws cloud provider id.
$ pulumi import harness:cloudprovider/aws:Aws example <provider_id>
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- harness lbrlabs/pulumi-harness
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
harness
Terraform Provider.