acoustic-window-73051
08/19/2021, 7:47 PMpulumi up --logtostderr -v=9 --debug
it.hangs with:
I0819 19:39:01.591124 23811 eventsink.go:59] waiting for quiescence; 100 RPCs outstanding
I0819 19:39:01.591137 23811 eventsink.go:62] eventSink::Debug(<{%reset%}>waiting for quiescence; 100 RPCs outstanding<{%reset%}>)
I0819 19:39:01.591479 23811 eventsink.go:59] waiting for quiescence; 99 RPCs outstanding
I0819 19:39:01.591491 23811 eventsink.go:62] eventSink::Debug(<{%reset%}>waiting for quiescence; 99 RPCs outstanding<{%reset%}>)
I0819 19:39:01.592633 23811 eventsink.go:59] waiting for quiescence; 98 RPCs outstanding
I0819 19:39:01.592646 23811 eventsink.go:62] eventSink::Debug(<{%reset%}>waiting for quiescence; 98 RPCs outstanding<{%reset%}>)
I0819 19:39:01.593078 23811 eventsink.go:59] waiting for quiescence; 97 RPCs outstanding
I0819 19:39:01.593091 23811 eventsink.go:62] eventSink::Debug(<{%reset%}>waiting for quiescence; 97 RPCs outstanding<{%reset%}>)
acoustic-window-73051
08/19/2021, 7:47 PMvictorious-dusk-75271
08/20/2021, 6:15 AMvictorious-dusk-75271
08/20/2021, 6:17 AMvictorious-dusk-75271
08/20/2021, 6:17 AMvictorious-dusk-75271
08/20/2021, 6:18 AMfamous-train-16653
08/20/2021, 7:45 AM'error: installing [resource plugin kubernetes-3.5.0] from : untarring file /Users/johndoe/.pulumi/plugins/resource-kubernetes-v3.5.0/pulumi-resource-kubernetes: stream error: stream ID 1; PROTOCOL_ERROR\n'
magnificent-gigabyte-61048
08/20/2021, 10:02 AMcreamy-table-33432
08/20/2021, 10:53 AMmillions-eve-97186
08/20/2021, 1:03 PMlittle-journalist-4778
08/20/2021, 4:03 PMbrash-quill-35776
08/20/2021, 5:09 PMerror: Preview failed: refreshing urn:pulumi:cluster.dev::a207937_stratus-cluster::gcp:serviceAccount/account:Account$gcp:serviceAccount/key:Key::serviceAccount-key: 1 error occurred:
* Error when reading or editing Service Account Key "projects/a207937-stratus-cicd/serviceAccounts/stratus@a207937-stratus-cicd.iam.gserviceaccount.com/keys/c69bf4cd7b0f1d4d0d2f0e667a8bf61542c88aa2": Get "<https://iam.googleapis.com/v1/projects/a207937-stratus-cicd/serviceAccounts/stratus@a207937-stratus-cicd.iam.gserviceaccount.com/keys/c69bf4cd7b0f1d4d0d2f0e667a8bf61542c88aa2?alt=json&prettyPrint=false&publicKeyType=TYPE_X509_PEM_FILE>": Post "<https://oauth2.googleapis.com/token>": dial tcp: lookup <http://oauth2.googleapis.com|oauth2.googleapis.com> on 100.64.0.1:53: read udp 192.168.2.11:57302->100.64.0.1:53: i/o timeout (Client.Timeout exceeded while awaiting headers)
This happens back and forth, sometimes working sometimes not, it for now only snarl me for GCP project only
I can use the same setup to pulumi up
an Azure project succesfullybrave-angle-33257
08/20/2021, 9:18 PMvar stackref = new pulumi.StackReference('s3stack');
var resource = new <http://aws.XXX|aws.XXX>('resource', {
bucket: stackref.getOutput('outputs').apply(v=>v['storagebucket']['bucket'])
})
I'm trying to use this with a pulumi.all like this but can't get it working, it always shows up as [object] in the policy I'm trying to create. The deploy bucket is created in another stack, and the artifact bucket is created in this same stack with the build project
let pipeline_role_policy = new aws.iam.Policy(pipeline_role_name, {
name: pipeline_role_name,
policy: pulumi
.all([stackref.getOutput("outputs"), this_stack_pipeline_bucket.arn])
.apply(([bucketOutputs, artifactBucketArn]) => {
return {
Version: "2012-10-17",
Statement: [
{
Effect: "Allow",
Action: ["s3:*"],
Resource: [
`${bucketOutputs['deploy']['bucket']}`,
`${bucketOutputs['deploy']['bucket']}/*`,
`${artifactBucketArn}`,
`${artifactBucketArn}/*`,
],
},
],
};
})
.apply(JSON.stringify),
});
brave-angle-33257
08/20/2021, 9:19 PM{\"Effect\":\"Allow\",\"Action\":[\"s3:*\"],\"Resource\":[\"[object Object]\",\"[object Object]/*\",
big-island-38073
08/22/2021, 9:18 PMpulumi up
I see my nested resources in my pulumi cloud resources tab, can I fetch those outputs from the command line?bland-smartphone-19451
08/23/2021, 2:12 AMacoustic-yacht-17594
08/23/2021, 9:01 AMthousands-planet-78612
08/23/2021, 10:44 AM// this function defines our pulumi S3 static website in terms of the content that the caller passes in.
// this allows us to dynamically deploy websites based on user defined values from the POST body.
func createPulumiProgram(content string) pulumi.RunFunc {
return func(ctx *pulumi.Context) error {
// our program defines a s3 website.
// here we create the bucket
siteBucket, err := s3.NewBucket(ctx, "s3-website-bucket", &s3.BucketArgs{
Website: s3.BucketWebsiteArgs{
IndexDocument: pulumi.String("index.html"),
},
})
if err != nil {
return err
}
// here our HTML is defined based on what the caller curries in.
indexContent := content
// upload our index.html
if _, err := s3.NewBucketObject(ctx, "index", &s3.BucketObjectArgs{
Bucket: siteBucket.ID(), // reference to the s3.Bucket object
Content: pulumi.String(indexContent),
Key: pulumi.String("index.html"), // set the key of the object
ContentType: pulumi.String("text/html; charset=utf-8"), // set the MIME type of the file
}); err != nil {
return err
}
// Set the access policy for the bucket so all objects are readable.
if _, err := s3.NewBucketPolicy(ctx, "bucketPolicy", &s3.BucketPolicyArgs{
Bucket: siteBucket.ID(), // refer to the bucket created earlier
Policy: pulumi.Any(map[string]interface{}{
"Version": "2012-10-17",
"Statement": []map[string]interface{}{
{
"Effect": "Allow",
"Principal": "*",
"Action": []interface{}{
"s3:GetObject",
},
"Resource": []interface{}{
pulumi.Sprintf("arn:aws:s3:::%s/*", siteBucket.ID()), // policy refers to bucket name explicitly
},
},
},
}),
}); err != nil {
return err
}
// export the website URL
ctx.Export("websiteUrl", siteBucket.WebsiteEndpoint)
return nil
}
}
creamy-holiday-75376
08/23/2021, 1:46 PMnice-yak-27438
08/23/2021, 3:03 PMdamp-memory-66729
08/23/2021, 5:20 PMignoreChanges
option is working for aws.route53.Record. If we ignore change on one prop and another one changes, does Pulumi override all the props of a resource?echoing-jelly-67975
08/23/2021, 8:10 PMdry-florist-5950
08/24/2021, 1:48 PMcolossal-flower-87257
08/24/2021, 7:51 PMbig-london-74366
08/25/2021, 6:40 AMvpcSecurityGroupIds
is read only, so, I can't do something like:
rds.vpcSecurityGroupIds = [rds.vpcSecurityGroupIds.concat(anotherSecurityGroup.id)]
Background story: I created the RDS outside Pulumi, so, I just import it. In order to allow access from another resource to that RDS, I need to add the security group to that RDSsparse-intern-71089
08/25/2021, 6:44 AMthousands-planet-78612
08/25/2021, 1:01 PMwhite-cat-90296
08/25/2021, 4:49 PM// Create an Azure resource (Storage Account)
const storageAccount = new storage.StorageAccount('sa', {
resourceGroupName: resourceGroup.name,
sku: {
name: storage.SkuName.Standard_LRS,
},
kind: storage.Kind.StorageV2,
});
// Export the primary key of the Storage Account
const storageAccountKeys = pulumi
.all([resourceGroup.name, storageAccount.name])
.apply(([resourceGroupName, accountName]) =>
storage.listStorageAccountKeys({ resourceGroupName, accountName })
);
export const primaryStorageKey = storageAccountKeys.keys[0].value;
// MAYBE A FUNCTION HERE TO BE EXECUTED AFTER SA IS CREATED/MODIFIED
const callback = () => { axios.get(`<http://mycustomserver.com/blabla/${> primaryStorageKey }`) }
fancy-judge-41348
08/25/2021, 4:58 PMmillions-orange-97816
08/25/2021, 6:51 PMmillions-orange-97816
08/25/2021, 6:51 PM