Skip to content

Commit 5a053a7

Browse files
authored
Skip flaky example (#2485)
Add a patch to skip an example that caused flaky builds AWS Cognito Identity Pool Roles Attachment example has flaky rendering to Pulumi languages causing unstable builds. Removing the example should make CI builds deterministic until such time as we can fix the root cause of this.
1 parent ea1406a commit 5a053a7

File tree

34 files changed

+130
-574
lines changed

34 files changed

+130
-574
lines changed

provider/cmd/pulumi-resource-aws/schema.json

Lines changed: 1 addition & 1 deletion
Large diffs are not rendered by default.

sdk/dotnet/Cognito/IdentityPoolRoleAttachment.cs

Lines changed: 0 additions & 129 deletions
Original file line numberDiff line numberDiff line change
@@ -12,135 +12,6 @@ namespace Pulumi.Aws.Cognito
1212
/// <summary>
1313
/// Provides an AWS Cognito Identity Pool Roles Attachment.
1414
///
15-
/// ## Example Usage
16-
///
17-
/// ```csharp
18-
/// using System.Collections.Generic;
19-
/// using Pulumi;
20-
/// using Aws = Pulumi.Aws;
21-
///
22-
/// return await Deployment.RunAsync(() =&gt;
23-
/// {
24-
/// var mainIdentityPool = new Aws.Cognito.IdentityPool("mainIdentityPool", new()
25-
/// {
26-
/// IdentityPoolName = "identity pool",
27-
/// AllowUnauthenticatedIdentities = false,
28-
/// SupportedLoginProviders =
29-
/// {
30-
/// { "graph.facebook.com", "7346241598935555" },
31-
/// },
32-
/// });
33-
///
34-
/// var authenticatedPolicyDocument = Aws.Iam.GetPolicyDocument.Invoke(new()
35-
/// {
36-
/// Statements = new[]
37-
/// {
38-
/// new Aws.Iam.Inputs.GetPolicyDocumentStatementInputArgs
39-
/// {
40-
/// Effect = "Allow",
41-
/// Principals = new[]
42-
/// {
43-
/// new Aws.Iam.Inputs.GetPolicyDocumentStatementPrincipalInputArgs
44-
/// {
45-
/// Type = "Federated",
46-
/// Identifiers = new[]
47-
/// {
48-
/// "cognito-identity.amazonaws.com",
49-
/// },
50-
/// },
51-
/// },
52-
/// Actions = new[]
53-
/// {
54-
/// "sts:AssumeRoleWithWebIdentity",
55-
/// },
56-
/// Conditions = new[]
57-
/// {
58-
/// new Aws.Iam.Inputs.GetPolicyDocumentStatementConditionInputArgs
59-
/// {
60-
/// Test = "StringEquals",
61-
/// Variable = "cognito-identity.amazonaws.com:aud",
62-
/// Values = new[]
63-
/// {
64-
/// mainIdentityPool.Id,
65-
/// },
66-
/// },
67-
/// new Aws.Iam.Inputs.GetPolicyDocumentStatementConditionInputArgs
68-
/// {
69-
/// Test = "ForAnyValue:StringLike",
70-
/// Variable = "cognito-identity.amazonaws.com:amr",
71-
/// Values = new[]
72-
/// {
73-
/// "authenticated",
74-
/// },
75-
/// },
76-
/// },
77-
/// },
78-
/// },
79-
/// });
80-
///
81-
/// var authenticatedRole = new Aws.Iam.Role("authenticatedRole", new()
82-
/// {
83-
/// AssumeRolePolicy = authenticatedPolicyDocument.Apply(getPolicyDocumentResult =&gt; getPolicyDocumentResult.Json),
84-
/// });
85-
///
86-
/// var authenticatedRolePolicyPolicyDocument = Aws.Iam.GetPolicyDocument.Invoke(new()
87-
/// {
88-
/// Statements = new[]
89-
/// {
90-
/// new Aws.Iam.Inputs.GetPolicyDocumentStatementInputArgs
91-
/// {
92-
/// Effect = "Allow",
93-
/// Actions = new[]
94-
/// {
95-
/// "mobileanalytics:PutEvents",
96-
/// "cognito-sync:*",
97-
/// "cognito-identity:*",
98-
/// },
99-
/// Resources = new[]
100-
/// {
101-
/// "*",
102-
/// },
103-
/// },
104-
/// },
105-
/// });
106-
///
107-
/// var authenticatedRolePolicy = new Aws.Iam.RolePolicy("authenticatedRolePolicy", new()
108-
/// {
109-
/// Role = authenticatedRole.Id,
110-
/// Policy = authenticatedRolePolicyPolicyDocument.Apply(getPolicyDocumentResult =&gt; getPolicyDocumentResult.Json),
111-
/// });
112-
///
113-
/// var mainIdentityPoolRoleAttachment = new Aws.Cognito.IdentityPoolRoleAttachment("mainIdentityPoolRoleAttachment", new()
114-
/// {
115-
/// IdentityPoolId = mainIdentityPool.Id,
116-
/// RoleMappings = new[]
117-
/// {
118-
/// new Aws.Cognito.Inputs.IdentityPoolRoleAttachmentRoleMappingArgs
119-
/// {
120-
/// IdentityProvider = "graph.facebook.com",
121-
/// AmbiguousRoleResolution = "AuthenticatedRole",
122-
/// Type = "Rules",
123-
/// MappingRules = new[]
124-
/// {
125-
/// new Aws.Cognito.Inputs.IdentityPoolRoleAttachmentRoleMappingMappingRuleArgs
126-
/// {
127-
/// Claim = "isAdmin",
128-
/// MatchType = "Equals",
129-
/// RoleArn = authenticatedRole.Arn,
130-
/// Value = "paid",
131-
/// },
132-
/// },
133-
/// },
134-
/// },
135-
/// Roles =
136-
/// {
137-
/// { "authenticated", authenticatedRole.Arn },
138-
/// },
139-
/// });
140-
///
141-
/// });
142-
/// ```
143-
///
14415
/// ## Import
14516
///
14617
/// Cognito Identity Pool Roles Attachment can be imported using the Identity Pool ID, e.g.,

sdk/go/aws/cognito/identityPoolRoleAttachment.go

Lines changed: 0 additions & 122 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

sdk/java/src/main/java/com/pulumi/aws/cognito/IdentityPoolRoleAttachment.java

Lines changed: 0 additions & 99 deletions
Original file line numberDiff line numberDiff line change
@@ -20,105 +20,6 @@
2020
/**
2121
* Provides an AWS Cognito Identity Pool Roles Attachment.
2222
*
23-
* ## Example Usage
24-
* ```java
25-
* package generated_program;
26-
*
27-
* import com.pulumi.Context;
28-
* import com.pulumi.Pulumi;
29-
* import com.pulumi.core.Output;
30-
* import com.pulumi.aws.cognito.IdentityPool;
31-
* import com.pulumi.aws.cognito.IdentityPoolArgs;
32-
* import com.pulumi.aws.iam.IamFunctions;
33-
* import com.pulumi.aws.iam.inputs.GetPolicyDocumentArgs;
34-
* import com.pulumi.aws.iam.Role;
35-
* import com.pulumi.aws.iam.RoleArgs;
36-
* import com.pulumi.aws.iam.RolePolicy;
37-
* import com.pulumi.aws.iam.RolePolicyArgs;
38-
* import com.pulumi.aws.cognito.IdentityPoolRoleAttachment;
39-
* import com.pulumi.aws.cognito.IdentityPoolRoleAttachmentArgs;
40-
* import com.pulumi.aws.cognito.inputs.IdentityPoolRoleAttachmentRoleMappingArgs;
41-
* import java.util.List;
42-
* import java.util.ArrayList;
43-
* import java.util.Map;
44-
* import java.io.File;
45-
* import java.nio.file.Files;
46-
* import java.nio.file.Paths;
47-
*
48-
* public class App {
49-
* public static void main(String[] args) {
50-
* Pulumi.run(App::stack);
51-
* }
52-
*
53-
* public static void stack(Context ctx) {
54-
* var mainIdentityPool = new IdentityPool(&#34;mainIdentityPool&#34;, IdentityPoolArgs.builder()
55-
* .identityPoolName(&#34;identity pool&#34;)
56-
* .allowUnauthenticatedIdentities(false)
57-
* .supportedLoginProviders(Map.of(&#34;graph.facebook.com&#34;, &#34;7346241598935555&#34;))
58-
* .build());
59-
*
60-
* final var authenticatedPolicyDocument = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()
61-
* .statements(GetPolicyDocumentStatementArgs.builder()
62-
* .effect(&#34;Allow&#34;)
63-
* .principals(GetPolicyDocumentStatementPrincipalArgs.builder()
64-
* .type(&#34;Federated&#34;)
65-
* .identifiers(&#34;cognito-identity.amazonaws.com&#34;)
66-
* .build())
67-
* .actions(&#34;sts:AssumeRoleWithWebIdentity&#34;)
68-
* .conditions(
69-
* GetPolicyDocumentStatementConditionArgs.builder()
70-
* .test(&#34;StringEquals&#34;)
71-
* .variable(&#34;cognito-identity.amazonaws.com:aud&#34;)
72-
* .values(mainIdentityPool.id())
73-
* .build(),
74-
* GetPolicyDocumentStatementConditionArgs.builder()
75-
* .test(&#34;ForAnyValue:StringLike&#34;)
76-
* .variable(&#34;cognito-identity.amazonaws.com:amr&#34;)
77-
* .values(&#34;authenticated&#34;)
78-
* .build())
79-
* .build())
80-
* .build());
81-
*
82-
* var authenticatedRole = new Role(&#34;authenticatedRole&#34;, RoleArgs.builder()
83-
* .assumeRolePolicy(authenticatedPolicyDocument.applyValue(getPolicyDocumentResult -&gt; getPolicyDocumentResult).applyValue(authenticatedPolicyDocument -&gt; authenticatedPolicyDocument.applyValue(getPolicyDocumentResult -&gt; getPolicyDocumentResult.json())))
84-
* .build());
85-
*
86-
* final var authenticatedRolePolicyPolicyDocument = IamFunctions.getPolicyDocument(GetPolicyDocumentArgs.builder()
87-
* .statements(GetPolicyDocumentStatementArgs.builder()
88-
* .effect(&#34;Allow&#34;)
89-
* .actions(
90-
* &#34;mobileanalytics:PutEvents&#34;,
91-
* &#34;cognito-sync:*&#34;,
92-
* &#34;cognito-identity:*&#34;)
93-
* .resources(&#34;*&#34;)
94-
* .build())
95-
* .build());
96-
*
97-
* var authenticatedRolePolicy = new RolePolicy(&#34;authenticatedRolePolicy&#34;, RolePolicyArgs.builder()
98-
* .role(authenticatedRole.id())
99-
* .policy(authenticatedRolePolicyPolicyDocument.applyValue(getPolicyDocumentResult -&gt; getPolicyDocumentResult.json()))
100-
* .build());
101-
*
102-
* var mainIdentityPoolRoleAttachment = new IdentityPoolRoleAttachment(&#34;mainIdentityPoolRoleAttachment&#34;, IdentityPoolRoleAttachmentArgs.builder()
103-
* .identityPoolId(mainIdentityPool.id())
104-
* .roleMappings(IdentityPoolRoleAttachmentRoleMappingArgs.builder()
105-
* .identityProvider(&#34;graph.facebook.com&#34;)
106-
* .ambiguousRoleResolution(&#34;AuthenticatedRole&#34;)
107-
* .type(&#34;Rules&#34;)
108-
* .mappingRules(IdentityPoolRoleAttachmentRoleMappingMappingRuleArgs.builder()
109-
* .claim(&#34;isAdmin&#34;)
110-
* .matchType(&#34;Equals&#34;)
111-
* .roleArn(authenticatedRole.arn())
112-
* .value(&#34;paid&#34;)
113-
* .build())
114-
* .build())
115-
* .roles(Map.of(&#34;authenticated&#34;, authenticatedRole.arn()))
116-
* .build());
117-
*
118-
* }
119-
* }
120-
* ```
121-
*
12223
* ## Import
12324
*
12425
* Cognito Identity Pool Roles Attachment can be imported using the Identity Pool ID, e.g.,

0 commit comments

Comments
 (0)