Please wait. This can take some minutes ...
Many resources are needed to download a project. Please understand that we have to compensate our server costs. Thank you in advance.
Project price only 1 $
You can buy this project and download/modify it how often you want.
com.pulumi.aws.apigateway.kotlin.AccountArgs.kt Maven / Gradle / Ivy
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.aws.apigateway.kotlin
import com.pulumi.aws.apigateway.AccountArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.String
import kotlin.Suppress
import kotlin.jvm.JvmName
/**
* Provides a settings of an API Gateway Account. Settings is applied region-wide per `provider` block.
* > **Note:** As there is no API method for deleting account settings or resetting it to defaults, destroying this resource will keep your account settings intact
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as aws from "@pulumi/aws";
* const assumeRole = aws.iam.getPolicyDocument({
* statements: [{
* effect: "Allow",
* principals: [{
* type: "Service",
* identifiers: ["apigateway.amazonaws.com"],
* }],
* actions: ["sts:AssumeRole"],
* }],
* });
* const cloudwatchRole = new aws.iam.Role("cloudwatch", {
* name: "api_gateway_cloudwatch_global",
* assumeRolePolicy: assumeRole.then(assumeRole => assumeRole.json),
* });
* const demo = new aws.apigateway.Account("demo", {cloudwatchRoleArn: cloudwatchRole.arn});
* const cloudwatch = aws.iam.getPolicyDocument({
* statements: [{
* effect: "Allow",
* actions: [
* "logs:CreateLogGroup",
* "logs:CreateLogStream",
* "logs:DescribeLogGroups",
* "logs:DescribeLogStreams",
* "logs:PutLogEvents",
* "logs:GetLogEvents",
* "logs:FilterLogEvents",
* ],
* resources: ["*"],
* }],
* });
* const cloudwatchRolePolicy = new aws.iam.RolePolicy("cloudwatch", {
* name: "default",
* role: cloudwatchRole.id,
* policy: cloudwatch.then(cloudwatch => cloudwatch.json),
* });
* ```
* ```python
* import pulumi
* import pulumi_aws as aws
* assume_role = aws.iam.get_policy_document(statements=[{
* "effect": "Allow",
* "principals": [{
* "type": "Service",
* "identifiers": ["apigateway.amazonaws.com"],
* }],
* "actions": ["sts:AssumeRole"],
* }])
* cloudwatch_role = aws.iam.Role("cloudwatch",
* name="api_gateway_cloudwatch_global",
* assume_role_policy=assume_role.json)
* demo = aws.apigateway.Account("demo", cloudwatch_role_arn=cloudwatch_role.arn)
* cloudwatch = aws.iam.get_policy_document(statements=[{
* "effect": "Allow",
* "actions": [
* "logs:CreateLogGroup",
* "logs:CreateLogStream",
* "logs:DescribeLogGroups",
* "logs:DescribeLogStreams",
* "logs:PutLogEvents",
* "logs:GetLogEvents",
* "logs:FilterLogEvents",
* ],
* "resources": ["*"],
* }])
* cloudwatch_role_policy = aws.iam.RolePolicy("cloudwatch",
* name="default",
* role=cloudwatch_role.id,
* policy=cloudwatch.json)
* ```
* ```csharp
* using System.Collections.Generic;
* using System.Linq;
* using Pulumi;
* using Aws = Pulumi.Aws;
* return await Deployment.RunAsync(() =>
* {
* var assumeRole = Aws.Iam.GetPolicyDocument.Invoke(new()
* {
* Statements = new[]
* {
* new Aws.Iam.Inputs.GetPolicyDocumentStatementInputArgs
* {
* Effect = "Allow",
* Principals = new[]
* {
* new Aws.Iam.Inputs.GetPolicyDocumentStatementPrincipalInputArgs
* {
* Type = "Service",
* Identifiers = new[]
* {
* "apigateway.amazonaws.com",
* },
* },
* },
* Actions = new[]
* {
* "sts:AssumeRole",
* },
* },
* },
* });
* var cloudwatchRole = new Aws.Iam.Role("cloudwatch", new()
* {
* Name = "api_gateway_cloudwatch_global",
* AssumeRolePolicy = assumeRole.Apply(getPolicyDocumentResult => getPolicyDocumentResult.Json),
* });
* var demo = new Aws.ApiGateway.Account("demo", new()
* {
* CloudwatchRoleArn = cloudwatchRole.Arn,
* });
* var cloudwatch = Aws.Iam.GetPolicyDocument.Invoke(new()
* {
* Statements = new[]
* {
* new Aws.Iam.Inputs.GetPolicyDocumentStatementInputArgs
* {
* Effect = "Allow",
* Actions = new[]
* {
* "logs:CreateLogGroup",
* "logs:CreateLogStream",
* "logs:DescribeLogGroups",
* "logs:DescribeLogStreams",
* "logs:PutLogEvents",
* "logs:GetLogEvents",
* "logs:FilterLogEvents",
* },
* Resources = new[]
* {
* "*",
* },
* },
* },
* });
* var cloudwatchRolePolicy = new Aws.Iam.RolePolicy("cloudwatch", new()
* {
* Name = "default",
* Role = cloudwatchRole.Id,
* Policy = cloudwatch.Apply(getPolicyDocumentResult => getPolicyDocumentResult.Json),
* });
* });
* ```
* ```go
* package main
* import (
* "github.com/pulumi/pulumi-aws/sdk/v6/go/aws/apigateway"
* "github.com/pulumi/pulumi-aws/sdk/v6/go/aws/iam"
* "github.com/pulumi/pulumi/sdk/v3/go/pulumi"
* )
* func main() {
* pulumi.Run(func(ctx *pulumi.Context) error {
* assumeRole, err := iam.GetPolicyDocument(ctx, &iam.GetPolicyDocumentArgs{
* Statements: []iam.GetPolicyDocumentStatement{
* {
* Effect: pulumi.StringRef("Allow"),
* Principals: []iam.GetPolicyDocumentStatementPrincipal{
* {
* Type: "Service",
* Identifiers: []string{
* "apigateway.amazonaws.com",
* },
* },
* },
* Actions: []string{
* "sts:AssumeRole",
* },
* },
* },
* }, nil)
* if err != nil {
* return err
* }
* cloudwatchRole, err := iam.NewRole(ctx, "cloudwatch", &iam.RoleArgs{
* Name: pulumi.String("api_gateway_cloudwatch_global"),
* AssumeRolePolicy: pulumi.String(assumeRole.Json),
* })
* if err != nil {
* return err
* }
* _, err = apigateway.NewAccount(ctx, "demo", &apigateway.AccountArgs{
* CloudwatchRoleArn: cloudwatchRole.Arn,
* })
* if err != nil {
* return err
* }
* cloudwatch, err := iam.GetPolicyDocument(ctx, &iam.GetPolicyDocumentArgs{
* Statements: []iam.GetPolicyDocumentStatement{
* {
* Effect: pulumi.StringRef("Allow"),
* Actions: []string{
* "logs:CreateLogGroup",
* "logs:CreateLogStream",
* "logs:DescribeLogGroups",
* "logs:DescribeLogStreams",
* "logs:PutLogEvents",
* "logs:GetLogEvents",
* "logs:FilterLogEvents",
* },
* Resources: []string{
* "*",
* },
* },
* },
* }, nil)
* if err != nil {
* return err
* }
* _, err = iam.NewRolePolicy(ctx, "cloudwatch", &iam.RolePolicyArgs{
* Name: pulumi.String("default"),
* Role: cloudwatchRole.ID(),
* Policy: pulumi.String(cloudwatch.Json),
* })
* if err != nil {
* return err
* }
* return nil
* })
* }
* ```
* ```java
* package generated_program;
* import com.pulumi.Context;
* import com.pulumi.Pulumi;
* import com.pulumi.core.Output;
* import com.pulumi.aws.iam.IamFunctions;
* import com.pulumi.aws.iam.inputs.GetPolicyDocumentArgs;
* import com.pulumi.aws.iam.Role;
* import com.pulumi.aws.iam.RoleArgs;
* import com.pulumi.aws.apigateway.Account;
* import com.pulumi.aws.apigateway.AccountArgs;
* import com.pulumi.aws.iam.RolePolicy;
* import com.pulumi.aws.iam.RolePolicyArgs;
* import java.util.List;
* import java.util.ArrayList;
* import java.util.Map;
* import java.io.File;
* import java.nio.file.Files;
* import java.nio.file.Paths;
* public class App {
* public static void main(String[] args) {
* Pulumi.run(App::stack);
* }
* public static void stack(Context ctx) {
* final var assumeRole = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()
* .statements(GetPolicyDocumentStatementArgs.builder()
* .effect("Allow")
* .principals(GetPolicyDocumentStatementPrincipalArgs.builder()
* .type("Service")
* .identifiers("apigateway.amazonaws.com")
* .build())
* .actions("sts:AssumeRole")
* .build())
* .build());
* var cloudwatchRole = new Role("cloudwatchRole", RoleArgs.builder()
* .name("api_gateway_cloudwatch_global")
* .assumeRolePolicy(assumeRole.applyValue(getPolicyDocumentResult -> getPolicyDocumentResult.json()))
* .build());
* var demo = new Account("demo", AccountArgs.builder()
* .cloudwatchRoleArn(cloudwatchRole.arn())
* .build());
* final var cloudwatch = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()
* .statements(GetPolicyDocumentStatementArgs.builder()
* .effect("Allow")
* .actions(
* "logs:CreateLogGroup",
* "logs:CreateLogStream",
* "logs:DescribeLogGroups",
* "logs:DescribeLogStreams",
* "logs:PutLogEvents",
* "logs:GetLogEvents",
* "logs:FilterLogEvents")
* .resources("*")
* .build())
* .build());
* var cloudwatchRolePolicy = new RolePolicy("cloudwatchRolePolicy", RolePolicyArgs.builder()
* .name("default")
* .role(cloudwatchRole.id())
* .policy(cloudwatch.applyValue(getPolicyDocumentResult -> getPolicyDocumentResult.json()))
* .build());
* }
* }
* ```
* ```yaml
* resources:
* demo:
* type: aws:apigateway:Account
* properties:
* cloudwatchRoleArn: ${cloudwatchRole.arn}
* cloudwatchRole:
* type: aws:iam:Role
* name: cloudwatch
* properties:
* name: api_gateway_cloudwatch_global
* assumeRolePolicy: ${assumeRole.json}
* cloudwatchRolePolicy:
* type: aws:iam:RolePolicy
* name: cloudwatch
* properties:
* name: default
* role: ${cloudwatchRole.id}
* policy: ${cloudwatch.json}
* variables:
* assumeRole:
* fn::invoke:
* Function: aws:iam:getPolicyDocument
* Arguments:
* statements:
* - effect: Allow
* principals:
* - type: Service
* identifiers:
* - apigateway.amazonaws.com
* actions:
* - sts:AssumeRole
* cloudwatch:
* fn::invoke:
* Function: aws:iam:getPolicyDocument
* Arguments:
* statements:
* - effect: Allow
* actions:
* - logs:CreateLogGroup
* - logs:CreateLogStream
* - logs:DescribeLogGroups
* - logs:DescribeLogStreams
* - logs:PutLogEvents
* - logs:GetLogEvents
* - logs:FilterLogEvents
* resources:
* - '*'
* ```
*
* ## Import
* Using `pulumi import`, import API Gateway Accounts using the word `api-gateway-account`. For example:
* ```sh
* $ pulumi import aws:apigateway/account:Account demo api-gateway-account
* ```
* @property cloudwatchRoleArn ARN of an IAM role for CloudWatch (to allow logging & monitoring). See more [in AWS Docs](https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-stage-settings.html#how-to-stage-settings-console). Logging & monitoring can be enabled/disabled and otherwise tuned on the API Gateway Stage level.
*/
public data class AccountArgs(
public val cloudwatchRoleArn: Output? = null,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.aws.apigateway.AccountArgs =
com.pulumi.aws.apigateway.AccountArgs.builder()
.cloudwatchRoleArn(cloudwatchRoleArn?.applyValue({ args0 -> args0 })).build()
}
/**
* Builder for [AccountArgs].
*/
@PulumiTagMarker
public class AccountArgsBuilder internal constructor() {
private var cloudwatchRoleArn: Output? = null
/**
* @param value ARN of an IAM role for CloudWatch (to allow logging & monitoring). See more [in AWS Docs](https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-stage-settings.html#how-to-stage-settings-console). Logging & monitoring can be enabled/disabled and otherwise tuned on the API Gateway Stage level.
*/
@JvmName("sytsjhcpqaptfffa")
public suspend fun cloudwatchRoleArn(`value`: Output) {
this.cloudwatchRoleArn = value
}
/**
* @param value ARN of an IAM role for CloudWatch (to allow logging & monitoring). See more [in AWS Docs](https://docs.aws.amazon.com/apigateway/latest/developerguide/how-to-stage-settings.html#how-to-stage-settings-console). Logging & monitoring can be enabled/disabled and otherwise tuned on the API Gateway Stage level.
*/
@JvmName("rsiynpagnbjjoqgl")
public suspend fun cloudwatchRoleArn(`value`: String?) {
val toBeMapped = value
val mapped = toBeMapped?.let({ args0 -> of(args0) })
this.cloudwatchRoleArn = mapped
}
internal fun build(): AccountArgs = AccountArgs(
cloudwatchRoleArn = cloudwatchRoleArn,
)
}