Skip to main content

A Pulumi package for creating and managing Amazon Web Services (AWS) cloud resources.

Project description

Actions Status Slack NPM version Python version NuGet version PkgGoDev License

Amazon Web Services (AWS) provider

The Amazon Web Services (AWS) resource provider for Pulumi lets you use AWS resources in your cloud programs. To use this package, install the Pulumi CLI. For a streamlined Pulumi walkthrough, including language runtime installation and AWS configuration, select "Get Started" below.

Installing

This package is available in many languages in the standard packaging formats.

Node.js (Java/TypeScript)

To use from JavaScript or TypeScript in Node.js, install using either npm:

$ npm install @pulumi/aws

or yarn:

$ yarn add @pulumi/aws

Python

To use from Python, install using pip:

$ pip install pulumi_aws

Go

To use from Go, use go get to grab the latest version of the library

$ go get github.com/pulumi/pulumi-aws/sdk/v6

.NET

To use from .NET, install using dotnet add package:

$ dotnet add package Pulumi.Aws

Concepts

The @pulumi/aws package provides a strongly-typed means to create cloud applications that create and interact closely with AWS resources. Resources are exposed for the entirety of AWS resources and their properties, including (but not limited to), 'apigateway', 'cloudformation', 'EC2', 'ECS', 'iam', 'lambda', etc. Many convenience APIs have also been added to make development easier and to help avoid common mistakes, and to get stronger typing.

Serverless Functions

The aws.lambda.CallbackFunction class allows you to create an AWS lambda function directly out of a JavaScript/TypeScript function object of the right signature. This allows a Pulumi program to simply define a lambda using a simple lambda in the language of choice, while having Pulumi itself do the appropriate transformation into the final AWS Lambda resource.

This makes many APIs easier to use, such as defining a Lambda to execute when an S3 Bucket is manipulated, or a CloudWatch timer is fired. To see some examples of this in action, please refer to the examples/ directory.

Configuration

The following configuration points are available:

  • aws:region - (Required) This is the AWS region.

  • aws:accessKey - (Optional) This is the AWS access key. It can also be sourced from the AWS_ACCESS_KEY_ID environment variable, or via a shared credentials file if aws:profile is specified.

  • aws:secretKey - (Optional) This is the AWS secret key. It can also be sourced from the AWS_SECRET_ACCESS_KEY environment variable, or via a shared credentials file if aws:profile is specified.

  • aws:profile - (Optional) This is the AWS profile name as set in the shared credentials file.

  • aws:sharedCredentialsFiles - (Optional) List of paths to the shared credentials file. If not set and a profile is used, the default value is [~/.aws/credentials]. A single value can also be set with the AWS_SHARED_CREDENTIALS_FILE environment variable.

  • aws:token - (Optional) Session token for validating temporary credentials. Typically provided after successful identity federation or Multi-Factor Authentication (MFA) login. With MFA login, this is the session token provided afterward, not the 6 digit MFA code used to get temporary credentials. It can also be sourced from the AWS_SESSION_TOKEN environment variable.

  • aws:maxRetries - (Optional) This is the maximum number of times an API call is retried, in the case where requests are being throttled or experiencing transient failures. The delay between the subsequent API calls increases exponentially. If omitted, the default value is 25.

  • aws:allowedAccountIds - (Optional) List of allowed AWS account IDs to prevent you from mistakenly using an incorrect one. Conflicts with aws:forbiddenAccountIds.

  • aws:forbiddenAccountIds - (Optional) List of forbidden AWS account IDs to prevent you from mistakenly using the wrong one. Conflicts with aws:allowedAccountIds.

  • aws:assumeRole - (Optional) Supports the following (optional) arguments: durationSections: Number of seconds to restrict the assume role session duration. externalId: External identifier to use when assuming the role. policy: IAM Policy JSON describing further restricting permissions for the IAM Role being assumed. policyArns: Set of Amazon Resource Names (ARNs) of IAM Policies describing further restricting permissions for the role. roleArn: Amazon Resource Name (ARN) of the IAM Role to assume. sessionName: Session name to use when assuming the role. tags: Map of assume role session tags.

  • aws:insecure - (Optional) Explicitly allow the provider to perform "insecure" SSL requests. If omitted, the default value is false.

  • aws:skipCredentialsValidation - (Optional) Skip the credentials validation via the STS API. Useful for AWS API implementations that do not have STS available or implemented. Default value is false. Can be set via the environment variable AWS_SKIP_CREDENTIALS_VALIDATION.

  • aws:skipRegionValidation - (Optional) Skip validation of provided region name. Useful for AWS-like implementations that use their own region names or to bypass the validation for regions that aren't publicly available yet. Default value is true.

  • aws:skipRequestionAccountId - (Optional) Skip requesting the account ID. Useful for AWS API implementations that do not have the IAM, STS API, or metadata API. Default value is false. When specified, the use of ARNs is compromised as there is no accountID available to construct the ARN.

  • aws:skipMetadataApiCheck - (Optional) Skip the AWS Metadata API check. Useful for AWS API implementations that do not have a metadata API endpoint. This provider from authenticating via the Metadata API by default. You may need to use other authentication methods like static credentials, configuration variables, or environment variables. Default is true. Can be set via the environment variable AWS_SKIP_METADATA_API_CHECK.

  • aws:s3UsePathStyle - (Optional) Set this to true to force the request to use path-style addressing, i.e., http://s3.amazonaws.com/BUCKET/KEY. By default, the S3 client will use virtual hosted bucket addressing, http://BUCKET.s3.amazonaws.com/KEY, when possible. Specific to the Amazon S3 service. Default is false.

Authenticating pulumi-aws via EC2 Instance Metadata?

As of pulumi-aws v3.28.1, the default behaviour for the provider was changed to disable MetadataApiCheck by default. This means, you need to do either of the following

  1. When using the default provider:
pulumi config set aws:skipMetadataApiCheck false
  1. When using a named provider
const myProvider = new aws.Provider("named-provider", {
  // other config
  skipMetadataApiCheck: false,
});
var provider = new Aws.Provider("named-provider", new Aws.ProviderArgs
{
  // other config
  SkipMetadataApiCheck = false,
});
provider, err := aws.NewProvider(ctx, "named-provider", &aws.ProviderArgs{
    // other config
    SkipMetadataApiCheck: pulumi.BoolPtr(false),
})
provider = pulumi_aws.Provider('named-provider', skip_metadata_api_check=False)

Reference

For further information, visit AWS in the Pulumi Registry or for detailed API reference documentation, visit AWS API Docs in the Pulumi Registry.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pulumi_aws-6.14.0a1701870783.tar.gz (5.7 MB view details)

Uploaded Source

Built Distribution

pulumi_aws-6.14.0a1701870783-py3-none-any.whl (8.0 MB view details)

Uploaded Python 3

File details

Details for the file pulumi_aws-6.14.0a1701870783.tar.gz.

File metadata

File hashes

Hashes for pulumi_aws-6.14.0a1701870783.tar.gz
Algorithm Hash digest
SHA256 d24fdb002a55362ee7a76ea3a4bf2b4ed5ab806ddcce72d7e916dccd26a708bb
MD5 dd0b7ba6a78b5ae07fa91549d46a39de
BLAKE2b-256 757a90e4bab7425c2e2ce6db583a80457a919c7945ff1ae3c725db402afe223b

See more details on using hashes here.

File details

Details for the file pulumi_aws-6.14.0a1701870783-py3-none-any.whl.

File metadata

File hashes

Hashes for pulumi_aws-6.14.0a1701870783-py3-none-any.whl
Algorithm Hash digest
SHA256 5910fd4e8ee1994a74dc628042293fc8eb4c8ee4c479fe30c7494220571079bc
MD5 9ec4f5c5bde12d8f4702f7a10ae01fa0
BLAKE2b-256 b47988850ce00979823abe5c9aceffba42623358f1793e5ee3621139b2022d4d

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page