numerous-fireman-63827
05/01/2023, 3:45 PMmillions-furniture-75402
05/05/2023, 12:05 PMfancy-artist-45287
08/17/2023, 12:09 PMsparse-optician-70334
09/09/2023, 7:04 AMfrom pulumi_databricks.mws import MwsWorkspaces, MwsCredentials, MwsStorageConfigurations
but this fails with undefined imports.sparse-optician-70334
09/11/2023, 5:38 PMassume_role_policy_document
this: assume_role_policy
is suggested which fails to compilesparse-optician-70334
09/12/2023, 7:16 AMrole
instead of role_name
is used.straight-cartoon-24485
09/15/2023, 6:12 PMadamant-lawyer-19698
09/15/2023, 8:47 PMnew AbcArgs()
, not AbcArgs.builder()...build()
sparse-optician-70334
09/22/2023, 8:22 AMfull-boots-69133
11/23/2023, 11:20 PMsparse-optician-70334
11/28/2023, 10:32 PMaloof-gigabyte-74853
12/04/2023, 2:35 PMpackage main
import (
"<http://github.com/pulumi/pulumi/sdk/v3/go/pulumi|github.com/pulumi/pulumi/sdk/v3/go/pulumi>"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
// Create a new instance of Pulumi Config.
conf := pulumi.NewConfig(ctx)
// Get a secret configuration value.
// Replace "mySecret" with the key for your secret configuration item.
mySecret := conf.RequireSecret("mySecret")
// The `mySecret` variable now holds a reference to your secret
// value and can be passed to resources that need it, while remaining encrypted.
// To use the secret as part of a resource definition:
// resourceArgs := &SomeResourceArgs{
// SecretProperty: mySecret,
// }
// myResource, err := NewSomeResource(ctx, "myResourceName", resourceArgs)
// if err != nil {
// return err
// }
return nil
})
}
This is incorrect and leads to: "pulumi.NewConfig(ctx) is undefined".melodic-animal-51673
02/22/2024, 10:00 AM// Create a custom VPC
const vpc = new awsx.ec2.Vpc("customVPC", { numberOfAvailabilityZones: 2 });
// Create an ECS cluster in the custom VPC
const cluster = new awsx.ecs.Cluster("cluster", { vpc });
The only thing is that it is not supported, and I can't get Pulumi AI to not do it.