sparse-intern-71089
06/20/2023, 9:08 AMsticky-bear-14421
06/20/2023, 9:24 AMnew aws.s3.BucketPolicy("pulumi-infrastructure-bucket-policy", {
bucket: bucket.bucket,
policy:
`
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Statement1",
"Effect": "Deny",
"Principal": "*",
"Action": "s3:*",
"Resource": [
"arn:aws:s3:::infrastructure.pulumi.dev",
"arn:aws:s3:::infrastructure.pulumi.dev"
],
"Condition": {
"Bool": {
"aws:SecureTransport": "false"
}
}
}
]
}`,
});
echoing-dinner-19531
06/20/2023, 9:28 AMpulumi import
? Did you get the type token and id the right way round (pulumi import <type> <name> <id/arn>)sticky-bear-14421
06/20/2023, 9:28 AMsticky-bear-14421
06/20/2023, 9:28 AMechoing-dinner-19531
06/20/2023, 9:34 AMsticky-bear-14421
06/20/2023, 9:35 AMsticky-bear-14421
06/20/2023, 9:36 AMsticky-bear-14421
06/20/2023, 9:37 AMsticky-bear-14421
06/20/2023, 9:38 AMpulumi import aws:s3/bucketPolicy:BucketPolicy allow_access_from_another_account my-tf-test-bucket
I guess I was kind of over eager and replaced my-tf-test-bucket with the arnsticky-bear-14421
06/20/2023, 9:38 AMechoing-dinner-19531
06/20/2023, 9:39 AMsticky-bear-14421
06/20/2023, 9:43 AMerror: no name for resource urn:pulumi:dev::bootstrap::aws:s3/bucket:bucket::pulumi-infrastructure-bucket
sticky-bear-14421
06/20/2023, 9:44 AMsticky-bear-14421
06/20/2023, 9:45 AMechoing-dinner-19531
06/20/2023, 9:53 AMechoing-dinner-19531
06/20/2023, 9:54 AMsticky-bear-14421
06/20/2023, 10:01 AMpulumi import aws:s3/bucketPolicy:BucketPolicy pulumi-infrastructure-bucket-policy infrastructure.pulumi.dev
sticky-bear-14421
06/20/2023, 10:04 AMechoing-dinner-19531
06/20/2023, 10:04 AMechoing-dinner-19531
06/20/2023, 10:05 AMsticky-bear-14421
06/20/2023, 10:06 AM