crooked-pillow-11944
09/23/2021, 3:38 AMred-match-15116
09/23/2021, 3:52 AMbuckets
looks like?output.all()
Output.all(*buckets).apply(lambda args: f"{args[0]}, {args[1]"})
buckets = {"bucket-1": "bucketid1", "bucket-2": "bucketid2"}
Output.all(**buckets).apply(lambda args: f"{args["bucket-1"]}, {args["bucket-2"]}) // returns Output("bucketid1, bucketid2")
proud-art-41399
09/23/2021, 8:17 AMOutput.all
with multiple values:
execution_role_policy = aws.iam.Policy(
"execution-role-policy",
policy=pulumi.Output.all(
mongodb_uri_parameter=mongodb_uri_parameter.arn,
mongodb_database_parameter=mongodb_database_parameter.arn,
elasticsearch_url_parameter=elasticsearch_url_parameter.arn,
).apply(
lambda args: json.dumps(
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": ["ssm:GetParameters"],
"Resource": [
args["mongodb_uri_parameter"],
args["mongodb_database_parameter"],
args["elasticsearch_url_parameter"],
],
}
],
}
)
),
)
crooked-pillow-11944
09/23/2021, 11:31 AMfor k in dictionary:
stmt['Resource'].append(f'arn:aws:s3:::{k}')
stmt['Resource'].append(f'arn:aws:s3:::{k}/*')
for key in buckets:
codebuild_role_policy = aws.iam.RolePolicy(f"bucketpolicy-{key}",
role=test_role.name,
policy=pulumi.Output.all(bucket=buckets[key]).apply(lambda args: f"""{{
"Version": "2012-10-17",
"Statement": [
{{
"Effect": "Allow",
"Action": ["s3:*"],
"Resource": [
"arn:aws:s3:::{args['bucket']}",
"arn:aws:s3:::{args['bucket']}/*"
]
}}
]
}}
"""))