orange-byte-86458
06/30/2021, 11:40 PMpulumi state delete
to not support resource deletion if it has children. I’m trying to delete a k8s.yaml.ConfigFile
, which subsequently expands into ~100 k8s resources and deleting them one by one manually is just not feasible..nutritious-australia-90040
07/01/2021, 6:01 AMpurple-lawyer-35555
07/01/2021, 8:00 AMfunction getViewerCertificate(
customDomain: string | undefined,
... // other parameters
): pulumi.Input<aws.types.input.cloudfront.DistributionViewerCertificate> {
if (!customDomain) {
return {
minimumProtocolVersion: 'TLSv1.1_2016',
cloudfrontDefaultCertificate: true,
}
}
which I later call it (with customDomain
set to undefined
)
const viewerCertificate = getViewerCertificate(customDomain,...)
and use it:
const distributionArgs: aws.cloudfront.DistributionArgs = {enabled: true, aliases: customDomain ? [customDomain] : [], viewerCertificate, ...}
and after running the update
command with automation api this change is detected on every deploy as an updated resource, taking a lot of time to complete the operation. I understand that pulumi should not detect this as a change.
is this an expected behavior? it seems like a bug to megorgeous-country-43026
07/01/2021, 9:38 AMRandomUuid
value and everything is working correctly except it was in different value when it was applied to specific service and it stored it into it's database during initial startup. I would like to use that value and change it into Pulumi state so that it gets set correctly elsewhere but still keep the RandomUuid
so that if and when a new env is setup with Pulumi configs it will get generated as it shouldnutritious-shampoo-16116
07/01/2021, 12:55 PMmillions-furniture-75402
07/01/2021, 2:12 PMgreat-optician-69584
07/01/2021, 2:16 PMgreat-optician-69584
07/01/2021, 2:16 PMgreat-optician-69584
07/01/2021, 2:16 PMgreat-optician-69584
07/01/2021, 2:17 PMgreat-optician-69584
07/01/2021, 2:17 PMgreat-optician-69584
07/01/2021, 2:17 PMgreat-optician-69584
07/01/2021, 2:17 PMpurple-lawyer-35555
07/01/2021, 2:41 PMcold-motherboard-287
07/01/2021, 4:46 PMasync
"things" happening inside of a ComponentResource? I need to use await and inside of the constructor, AFAIK, is not possible.bright-sandwich-93783
07/01/2021, 10:30 PMbland-florist-21412
07/01/2021, 10:36 PMBigQuery
Dataset
with code like the following:
ds = Dataset('product_metrics_dataset',
dataset_id='pm',
location=location,
project=project_id)
and I'm getting this error:
googleapi: Error 400: Invalid dataset ID "projects/fullsuitetest/datasets/pm". Dataset IDs must be alphanumeric (plus underscores and dashes) and must be at most 1024 characters long., invalid
it appears that the projects/fullsuitetest/datasets/
prefix is an error but Pulumi is adding that on my behalf. Any ideas what's going wrong?billowy-army-68599
helpful-hair-30515
07/02/2021, 2:39 PMpulumi up
and it created the 29 resources after that if i do pulumi preview
it again deleting the resources i did not change any of my source code i am using pulumi version 3.5.1
mysterious-lighter-33699
07/02/2021, 6:54 PMbetter-shampoo-48884
07/04/2021, 8:12 AMicy-football-94152
07/04/2021, 9:09 AMcolossal-battery-24701
07/05/2021, 11:03 AMType 'Output<string> | undefined' is not assignable to type 'Input<string>'.
How can I add these variables neatly? This example shows only one API and few variable but in actual code, I have many routes and 20+ env variable. Any help is appreciated
export const apiGateway = new awsx.apigateway.API('retool-lambda-api-gw', {
routes: [
{
path: '/oc/d-sup',
authorizers: authorizerAPI,
method: 'POST',
eventHandler: new aws.lambda.CallbackFunction('retool-lambda-delete-supporter', {
callback: async (event: awsx.apigateway.Request) => {
return routes.deleteSupporterHandler(event);
},
environment: {
variables: {
DB_HOST: config.getSecret('DB_HOST'), // this and the below vars throw error
DB_USER: config.getSecret('DB_USER'),
DB_PASSWORD: config.getSecret('DB_PASSWORD'),
DB_NAME: config.getSecret('DB_NAME'),
}
},
role: role,
vpcConfig: {
subnetIds: [awsNetworkingEnvVariables.SUBNET_ID],
securityGroupIds: [lambdaSecurityGroup.id],
}
}),
},
],
});
icy-football-94152
07/05/2021, 2:48 PMambitious-article-39970
07/05/2021, 3:03 PM'secrets': [{ 'name': "dbpassword", 'valueFrom': str(db_password.arn.apply(lambda a : f"{a}"))}],
when I use the lambda to write the value down to the log *pulumi.warn im getting the expected arn value however this doestn appear to be what is sent to awsambitious-article-39970
07/05/2021, 3:22 PMicy-football-94152
07/05/2021, 3:35 PMflaky-school-82490
07/05/2021, 10:06 PMbored-monitor-99026
07/06/2021, 3:21 AMalert-monitor-28534
07/06/2021, 9:38 AM