func (lt *opsworksLayerType) Update(d *schema.ResourceData, client *opsworks.OpsWorks) error { req := &opsworks.UpdateLayerInput{ LayerId: aws.String(d.Id()), AutoAssignElasticIps: aws.Bool(d.Get("auto_assign_elastic_ips").(bool)), AutoAssignPublicIps: aws.Bool(d.Get("auto_assign_public_ips").(bool)), CustomInstanceProfileArn: aws.String(d.Get("custom_instance_profile_arn").(string)), CustomRecipes: lt.CustomRecipes(d), CustomSecurityGroupIds: expandStringSet(d.Get("custom_security_group_ids").(*schema.Set)), EnableAutoHealing: aws.Bool(d.Get("auto_healing").(bool)), InstallUpdatesOnBoot: aws.Bool(d.Get("install_updates_on_boot").(bool)), LifecycleEventConfiguration: lt.LifecycleEventConfiguration(d), Name: aws.String(d.Get("name").(string)), Packages: expandStringSet(d.Get("system_packages").(*schema.Set)), UseEbsOptimizedInstances: aws.Bool(d.Get("use_ebs_optimized_instances").(bool)), Attributes: lt.AttributeMap(d), VolumeConfigurations: lt.VolumeConfigurations(d), } if lt.CustomShortName { req.Shortname = aws.String(d.Get("short_name").(string)) } else { req.Shortname = aws.String(lt.TypeName) } log.Printf("[DEBUG] Updating OpsWorks layer: %s", d.Id()) _, err := client.UpdateLayer(req) if err != nil { return err } return lt.Read(d, client) }
func ExampleIoT_UpdateThing() { svc := iot.New(session.New()) params := &iot.UpdateThingInput{ ThingName: aws.String("ThingName"), // Required AttributePayload: &iot.AttributePayload{ Attributes: map[string]*string{ "Key": aws.String("AttributeValue"), // Required // More values... }, Merge: aws.Bool(true), }, ExpectedVersion: aws.Int64(1), RemoveThingType: aws.Bool(true), ThingTypeName: aws.String("ThingTypeName"), } resp, err := svc.UpdateThing(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleAPIGateway_PutMethod() { svc := apigateway.New(session.New()) params := &apigateway.PutMethodInput{ AuthorizationType: aws.String("String"), // Required HttpMethod: aws.String("String"), // Required ResourceId: aws.String("String"), // Required RestApiId: aws.String("String"), // Required ApiKeyRequired: aws.Bool(true), AuthorizerId: aws.String("String"), RequestModels: map[string]*string{ "Key": aws.String("String"), // Required // More values... }, RequestParameters: map[string]*bool{ "Key": aws.Bool(true), // Required // More values... }, } resp, err := svc.PutMethod(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleConfigService_PutConfigurationRecorder() { sess, err := session.NewSession() if err != nil { fmt.Println("failed to create session,", err) return } svc := configservice.New(sess) params := &configservice.PutConfigurationRecorderInput{ ConfigurationRecorder: &configservice.ConfigurationRecorder{ // Required Name: aws.String("RecorderName"), RecordingGroup: &configservice.RecordingGroup{ AllSupported: aws.Bool(true), IncludeGlobalResourceTypes: aws.Bool(true), ResourceTypes: []*string{ aws.String("ResourceType"), // Required // More values... }, }, RoleARN: aws.String("String"), }, } resp, err := svc.PutConfigurationRecorder(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func expandCacheBehavior(m map[string]interface{}) *cloudfront.CacheBehavior { cb := &cloudfront.CacheBehavior{ Compress: aws.Bool(m["compress"].(bool)), ViewerProtocolPolicy: aws.String(m["viewer_protocol_policy"].(string)), TargetOriginId: aws.String(m["target_origin_id"].(string)), ForwardedValues: expandForwardedValues(m["forwarded_values"].(*schema.Set).List()[0].(map[string]interface{})), MinTTL: aws.Int64(int64(m["min_ttl"].(int))), MaxTTL: aws.Int64(int64(m["max_ttl"].(int))), DefaultTTL: aws.Int64(int64(m["default_ttl"].(int))), } if v, ok := m["trusted_signers"]; ok { cb.TrustedSigners = expandTrustedSigners(v.([]interface{})) } else { cb.TrustedSigners = expandTrustedSigners([]interface{}{}) } if v, ok := m["smooth_streaming"]; ok { cb.SmoothStreaming = aws.Bool(v.(bool)) } if v, ok := m["allowed_methods"]; ok { cb.AllowedMethods = expandAllowedMethods(v.([]interface{})) } if v, ok := m["cached_methods"]; ok { cb.AllowedMethods.CachedMethods = expandCachedMethods(v.([]interface{})) } if v, ok := m["path_pattern"]; ok { cb.PathPattern = aws.String(v.(string)) } return cb }
func ExampleRedshift_ResetClusterParameterGroup() { svc := redshift.New(session.New()) params := &redshift.ResetClusterParameterGroupInput{ ParameterGroupName: aws.String("String"), // Required Parameters: []*redshift.Parameter{ { // Required AllowedValues: aws.String("String"), ApplyType: aws.String("ParameterApplyType"), DataType: aws.String("String"), Description: aws.String("String"), IsModifiable: aws.Bool(true), MinimumEngineVersion: aws.String("String"), ParameterName: aws.String("String"), ParameterValue: aws.String("String"), Source: aws.String("String"), }, // More values... }, ResetAllParameters: aws.Bool(true), } resp, err := svc.ResetClusterParameterGroup(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
// New initializes a new S3 client connection based on config. func New() *S3Client { var ( cfg *aws.Config ) if config.S3.Endpoint != "" { cfg = &aws.Config{ Endpoint: aws.String(config.S3.Endpoint), DisableSSL: aws.Bool(strings.HasPrefix(config.S3.Endpoint, "http://")), Region: aws.String(config.S3.Region), S3ForcePathStyle: aws.Bool(config.S3.PathStyle), } } else { cfg = &aws.Config{ Region: aws.String(config.S3.Region), S3ForcePathStyle: aws.Bool(config.S3.PathStyle), } } if config.S3.Access != "" && config.S3.Secret != "" { cfg.Credentials = credentials.NewStaticCredentials( config.S3.Access, config.S3.Secret, "", ) } return &S3Client{ client: s3.New( session.New(), cfg, ), } }
func ExampleCloudTrail_CreateTrail() { svc := cloudtrail.New(session.New()) params := &cloudtrail.CreateTrailInput{ Name: aws.String("String"), // Required S3BucketName: aws.String("String"), // Required CloudWatchLogsLogGroupArn: aws.String("String"), CloudWatchLogsRoleArn: aws.String("String"), EnableLogFileValidation: aws.Bool(true), IncludeGlobalServiceEvents: aws.Bool(true), KmsKeyId: aws.String("String"), S3KeyPrefix: aws.String("String"), SnsTopicName: aws.String("String"), } resp, err := svc.CreateTrail(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func resourceAwsRDSClusterDelete(d *schema.ResourceData, meta interface{}) error { conn := meta.(*AWSClient).rdsconn log.Printf("[DEBUG] Destroying RDS Cluster (%s)", d.Id()) deleteOpts := rds.DeleteDBClusterInput{ DBClusterIdentifier: aws.String(d.Id()), } finalSnapshot := d.Get("final_snapshot_identifier").(string) if finalSnapshot == "" { deleteOpts.SkipFinalSnapshot = aws.Bool(true) } else { deleteOpts.FinalDBSnapshotIdentifier = aws.String(finalSnapshot) deleteOpts.SkipFinalSnapshot = aws.Bool(false) } log.Printf("[DEBUG] RDS Cluster delete options: %s", deleteOpts) _, err := conn.DeleteDBCluster(&deleteOpts) stateConf := &resource.StateChangeConf{ Pending: []string{"deleting", "backing-up", "modifying"}, Target: "destroyed", Refresh: resourceAwsRDSClusterStateRefreshFunc(d, meta), Timeout: 5 * time.Minute, MinTimeout: 3 * time.Second, } // Wait, catching any errors _, err = stateConf.WaitForState() if err != nil { return fmt.Errorf("[WARN] Error deleting RDS Cluster (%s): %s", d.Id(), err) } return nil }
func (s *GoofysTest) SetUpSuite(t *C) { //addr := "play.minio.io:9000" const LOCAL_TEST = true if LOCAL_TEST { addr := "127.0.0.1:8080" err := s.waitFor(t, addr) t.Assert(err, IsNil) s.awsConfig = &aws.Config{ //Credentials: credentials.AnonymousCredentials, Credentials: credentials.NewStaticCredentials("foo", "bar", ""), Region: aws.String("us-west-2"), Endpoint: aws.String(addr), DisableSSL: aws.Bool(true), S3ForcePathStyle: aws.Bool(true), MaxRetries: aws.Int(0), //Logger: t, //LogLevel: aws.LogLevel(aws.LogDebug), //LogLevel: aws.LogLevel(aws.LogDebug | aws.LogDebugWithHTTPBody), } } else { s.awsConfig = &aws.Config{ Region: aws.String("us-west-2"), DisableSSL: aws.Bool(true), } } s.s3 = s3.New(s.awsConfig) _, err := s.s3.ListBuckets(nil) t.Assert(err, IsNil) }
// Shortcut for updating current parameters // If template changed, more care about new or removed parameters must be taken (see Release.Promote or System.Save) func (a *App) UpdateParams(changes map[string]string) error { req := &cloudformation.UpdateStackInput{ StackName: aws.String(a.StackName()), Capabilities: []*string{aws.String("CAPABILITY_IAM")}, UsePreviousTemplate: aws.Bool(true), } // sort parameters by key name to make test requests stable var keys []string for key := range a.Parameters { keys = append(keys, key) } sort.Strings(keys) for _, key := range keys { if updatedValue, present := changes[key]; present { req.Parameters = append(req.Parameters, &cloudformation.Parameter{ ParameterKey: aws.String(key), ParameterValue: aws.String(updatedValue), }) } else { req.Parameters = append(req.Parameters, &cloudformation.Parameter{ ParameterKey: aws.String(key), UsePreviousValue: aws.Bool(true), }) } } _, err := UpdateStack(req) return err }
func expandPeeringOptions(m map[string]interface{}) *ec2.PeeringConnectionOptionsRequest { return &ec2.PeeringConnectionOptionsRequest{ AllowDnsResolutionFromRemoteVpc: aws.Bool(m["allow_remote_vpc_dns_resolution"].(bool)), AllowEgressFromLocalClassicLinkToRemoteVpc: aws.Bool(m["allow_classic_link_to_remote_vpc"].(bool)), AllowEgressFromLocalVpcToRemoteClassicLink: aws.Bool(m["allow_vpc_to_remote_classic_link"].(bool)), } }
func NewAwsConfig( accessKey string, secretKey string, regionName string, endpoint string, disableSSL bool, ) *aws.Config { var creds *credentials.Credentials if accessKey == "" && secretKey == "" { creds = credentials.AnonymousCredentials } else { creds = credentials.NewStaticCredentials(accessKey, secretKey, "") } if len(regionName) == 0 { regionName = "us-east-1" } awsConfig := &aws.Config{ Region: aws.String(regionName), Credentials: creds, S3ForcePathStyle: aws.Bool(true), MaxRetries: aws.Int(maxRetries), DisableSSL: aws.Bool(disableSSL), } if len(endpoint) != 0 { endpoint := fmt.Sprintf("%s", endpoint) awsConfig.Endpoint = &endpoint } return awsConfig }
func resourceAwsOpsworksSetPermission(d *schema.ResourceData, meta interface{}) error { client := meta.(*AWSClient).opsworksconn req := &opsworks.SetPermissionInput{ AllowSudo: aws.Bool(d.Get("allow_sudo").(bool)), AllowSsh: aws.Bool(d.Get("allow_ssh").(bool)), Level: aws.String(d.Get("level").(string)), IamUserArn: aws.String(d.Get("user_arn").(string)), StackId: aws.String(d.Get("stack_id").(string)), } err := resource.Retry(2*time.Minute, func() *resource.RetryError { var cerr error _, cerr = client.SetPermission(req) if cerr != nil { log.Printf("[INFO] client error") if opserr, ok := cerr.(awserr.Error); ok { // XXX: handle errors log.Printf("[ERROR] OpsWorks error: %s message: %s", opserr.Code(), opserr.Message()) return resource.RetryableError(cerr) } return resource.NonRetryableError(cerr) } return nil }) if err != nil { return err } return resourceAwsOpsworksPermissionRead(d, meta) }
func ExampleOpsWorks_CreateApp() { svc := opsworks.New(nil) params := &opsworks.CreateAppInput{ Name: aws.String("String"), // Required StackId: aws.String("String"), // Required Type: aws.String("AppType"), // Required AppSource: &opsworks.Source{ Password: aws.String("String"), Revision: aws.String("String"), SshKey: aws.String("String"), Type: aws.String("SourceType"), Url: aws.String("String"), Username: aws.String("String"), }, Attributes: map[string]*string{ "Key": aws.String("String"), // Required // More values... }, DataSources: []*opsworks.DataSource{ { // Required Arn: aws.String("String"), DatabaseName: aws.String("String"), Type: aws.String("String"), }, // More values... }, Description: aws.String("String"), Domains: []*string{ aws.String("String"), // Required // More values... }, EnableSsl: aws.Bool(true), Environment: []*opsworks.EnvironmentVariable{ { // Required Key: aws.String("String"), // Required Value: aws.String("String"), // Required Secure: aws.Bool(true), }, // More values... }, Shortname: aws.String("String"), SslConfiguration: &opsworks.SslConfiguration{ Certificate: aws.String("String"), // Required PrivateKey: aws.String("String"), // Required Chain: aws.String("String"), }, } resp, err := svc.CreateApp(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleSupport_DescribeCases() { sess, err := session.NewSession() if err != nil { fmt.Println("failed to create session,", err) return } svc := support.New(sess) params := &support.DescribeCasesInput{ AfterTime: aws.String("AfterTime"), BeforeTime: aws.String("BeforeTime"), CaseIdList: []*string{ aws.String("CaseId"), // Required // More values... }, DisplayId: aws.String("DisplayId"), IncludeCommunications: aws.Bool(true), IncludeResolvedCases: aws.Bool(true), Language: aws.String("Language"), MaxResults: aws.Int64(1), NextToken: aws.String("NextToken"), } resp, err := svc.DescribeCases(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleOpsWorks_UpdateInstance() { svc := opsworks.New(nil) params := &opsworks.UpdateInstanceInput{ InstanceId: aws.String("String"), // Required AgentVersion: aws.String("String"), AmiId: aws.String("String"), Architecture: aws.String("Architecture"), AutoScalingType: aws.String("AutoScalingType"), EbsOptimized: aws.Bool(true), Hostname: aws.String("String"), InstallUpdatesOnBoot: aws.Bool(true), InstanceType: aws.String("String"), LayerIds: []*string{ aws.String("String"), // Required // More values... }, Os: aws.String("String"), SshKeyName: aws.String("String"), } resp, err := svc.UpdateInstance(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func (lt *opsworksLayerType) Update(d *schema.ResourceData, client *opsworks.OpsWorks) error { req := &opsworks.UpdateLayerInput{ LayerId: aws.String(d.Id()), AutoAssignElasticIps: aws.Bool(d.Get("auto_assign_elastic_ips").(bool)), AutoAssignPublicIps: aws.Bool(d.Get("auto_assign_public_ips").(bool)), CustomInstanceProfileArn: aws.String(d.Get("custom_instance_profile_arn").(string)), CustomRecipes: lt.CustomRecipes(d), CustomSecurityGroupIds: makeAwsStringSet(d.Get("custom_security_group_ids").(*schema.Set)), EnableAutoHealing: aws.Bool(d.Get("auto_healing").(bool)), InstallUpdatesOnBoot: aws.Bool(d.Get("install_updates_on_boot").(bool)), LifecycleEventConfiguration: lt.LifecycleEventConfiguration(d), Name: aws.String(d.Get("name").(string)), Packages: makeAwsStringSet(d.Get("system_packages").(*schema.Set)), UseEbsOptimizedInstances: aws.Bool(d.Get("use_ebs_optimized_instances").(bool)), Attributes: lt.AttributeMap(d), VolumeConfigurations: lt.VolumeConfigurations(d), } if lt.CustomShortName { req.Shortname = aws.String(d.Get("short_name").(string)) } else { req.Shortname = aws.String(lt.TypeName) } log.Printf("[DEBUG] Updating OpsWorks layer: %s", d.Id()) if d.HasChange("elastic_load_balancer") { lbo, lbn := d.GetChange("elastic_load_balancer") loadBalancerOld := aws.String(lbo.(string)) loadBalancerNew := aws.String(lbn.(string)) if loadBalancerOld != nil && *loadBalancerOld != "" { log.Printf("[DEBUG] Dettaching load balancer: %s", *loadBalancerOld) _, err := client.DetachElasticLoadBalancer(&opsworks.DetachElasticLoadBalancerInput{ ElasticLoadBalancerName: loadBalancerOld, LayerId: aws.String(d.Id()), }) if err != nil { return err } } if loadBalancerNew != nil && *loadBalancerNew != "" { log.Printf("[DEBUG] Attaching load balancer: %s", *loadBalancerNew) client.AttachElasticLoadBalancer(&opsworks.AttachElasticLoadBalancerInput{ ElasticLoadBalancerName: loadBalancerNew, LayerId: aws.String(d.Id()), }) } } _, err := client.UpdateLayer(req) if err != nil { return err } return lt.Read(d, client) }
func ExampleElasticBeanstalk_CreateApplicationVersion() { svc := elasticbeanstalk.New(session.New()) params := &elasticbeanstalk.CreateApplicationVersionInput{ ApplicationName: aws.String("ApplicationName"), // Required VersionLabel: aws.String("VersionLabel"), // Required AutoCreateApplication: aws.Bool(true), Description: aws.String("Description"), Process: aws.Bool(true), SourceBundle: &elasticbeanstalk.S3Location{ S3Bucket: aws.String("S3Bucket"), S3Key: aws.String("S3Key"), }, } resp, err := svc.CreateApplicationVersion(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func ExampleElasticBeanstalk_TerminateEnvironment() { sess, err := session.NewSession() if err != nil { fmt.Println("failed to create session,", err) return } svc := elasticbeanstalk.New(sess) params := &elasticbeanstalk.TerminateEnvironmentInput{ EnvironmentId: aws.String("EnvironmentId"), EnvironmentName: aws.String("EnvironmentName"), ForceTerminate: aws.Bool(true), TerminateResources: aws.Bool(true), } resp, err := svc.TerminateEnvironment(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func TestKMSGenerateCipherData(t *testing.T) { ts := httptest.NewServer(http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { fmt.Fprintln(w, `{"CiphertextBlob":"AQEDAHhqBCCY1MSimw8gOGcUma79cn4ANvTtQyv9iuBdbcEF1QAAAH4wfAYJKoZIhvcNAQcGoG8wbQIBADBoBgkqhkiG9w0BBwEwHgYJYIZIAWUDBAEuMBEEDJ6IcN5E4wVbk38MNAIBEIA7oF1E3lS7FY9DkoxPc/UmJsEwHzL82zMqoLwXIvi8LQHr8If4Lv6zKqY8u0+JRgSVoqCvZDx3p8Cn6nM=","KeyId":"arn:aws:kms:us-west-2:042062605278:key/c80a5cdb-8d09-4f9f-89ee-df01b2e3870a","Plaintext":"6tmyz9JLBE2yIuU7iXpArqpDVle172WSmxjcO6GNT7E="}`) })) sess := unit.Session.Copy(&aws.Config{ MaxRetries: aws.Int(0), Endpoint: aws.String(ts.URL[7:]), DisableSSL: aws.Bool(true), S3ForcePathStyle: aws.Bool(true), Region: aws.String("us-west-2"), }) svc := kms.New(sess) handler := NewKMSKeyGenerator(svc, "testid") keySize := 32 ivSize := 16 cd, err := handler.GenerateCipherData(keySize, ivSize) assert.NoError(t, err) assert.Equal(t, keySize, len(cd.Key)) assert.Equal(t, ivSize, len(cd.IV)) assert.NotEmpty(t, cd.Key) assert.NotEmpty(t, cd.IV) }
func resourceAwsOpsworksInstanceDelete(d *schema.ResourceData, meta interface{}) error { client := meta.(*AWSClient).opsworksconn if v, ok := d.GetOk("status"); ok && v.(string) != "stopped" { err := stopOpsworksInstance(d, meta, true) if err != nil { return err } } req := &opsworks.DeleteInstanceInput{ InstanceId: aws.String(d.Id()), DeleteElasticIp: aws.Bool(d.Get("delete_eip").(bool)), DeleteVolumes: aws.Bool(d.Get("delete_ebs").(bool)), } log.Printf("[DEBUG] Deleting OpsWorks instance: %s", d.Id()) _, err := client.DeleteInstance(req) if err != nil { return err } d.SetId("") return nil }
func ExampleRoute53_CreateHealthCheck() { svc := route53.New(session.New()) params := &route53.CreateHealthCheckInput{ CallerReference: aws.String("HealthCheckNonce"), // Required HealthCheckConfig: &route53.HealthCheckConfig{ // Required Type: aws.String("HealthCheckType"), // Required ChildHealthChecks: []*string{ aws.String("HealthCheckId"), // Required // More values... }, FailureThreshold: aws.Int64(1), FullyQualifiedDomainName: aws.String("FullyQualifiedDomainName"), HealthThreshold: aws.Int64(1), IPAddress: aws.String("IPAddress"), Inverted: aws.Bool(true), MeasureLatency: aws.Bool(true), Port: aws.Int64(1), RequestInterval: aws.Int64(1), ResourcePath: aws.String("ResourcePath"), SearchString: aws.String("SearchString"), }, } resp, err := svc.CreateHealthCheck(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
// Add adds a key and the value for the same to the cloudformation parameters. If the key already // exists, the value is overwritten, func (s *CfnStackParams) Add(key string, value string) error { param, err := s.GetParameter(key) if err != nil { // either new parameter or bad state. if err != ParameterNotFoundError { // bad state. return err } // UsePreviousValue is false since we are explicitly setting the value for a parameter here. s.params = append(s.params, &cloudformation.Parameter{ ParameterKey: aws.String(key), ParameterValue: aws.String(value), UsePreviousValue: aws.Bool(false), }) s.nameToKeys[key] = value } else { // parameter found. param.ParameterValue = aws.String(value) // UsePreviousValue is false since we are explicitly setting the value for a parameter here. param.UsePreviousValue = aws.Bool(false) s.nameToKeys[key] = value } return nil }
func resourceAwsCloudTrailUpdate(d *schema.ResourceData, meta interface{}) error { conn := meta.(*AWSClient).cloudtrailconn input := cloudtrail.UpdateTrailInput{ Name: aws.String(d.Id()), } if d.HasChange("s3_bucket_name") { input.S3BucketName = aws.String(d.Get("s3_bucket_name").(string)) } if d.HasChange("s3_key_prefix") { input.S3KeyPrefix = aws.String(d.Get("s3_key_prefix").(string)) } if d.HasChange("cloud_watch_logs_role_arn") { input.CloudWatchLogsRoleArn = aws.String(d.Get("cloud_watch_logs_role_arn").(string)) } if d.HasChange("cloud_watch_logs_group_arn") { input.CloudWatchLogsLogGroupArn = aws.String(d.Get("cloud_watch_logs_group_arn").(string)) } if d.HasChange("include_global_service_events") { input.IncludeGlobalServiceEvents = aws.Bool(d.Get("include_global_service_events").(bool)) } if d.HasChange("is_multi_region_trail") { input.IsMultiRegionTrail = aws.Bool(d.Get("is_multi_region_trail").(bool)) } if d.HasChange("enable_log_file_validation") { input.EnableLogFileValidation = aws.Bool(d.Get("enable_log_file_validation").(bool)) } if d.HasChange("kms_key_id") { input.KmsKeyId = aws.String(d.Get("kms_key_id").(string)) } if d.HasChange("sns_topic_name") { input.SnsTopicName = aws.String(d.Get("sns_topic_name").(string)) } log.Printf("[DEBUG] Updating CloudTrail: %s", input) t, err := conn.UpdateTrail(&input) if err != nil { return err } if d.HasChange("tags") { err := setTagsCloudtrail(conn, d) if err != nil { return err } } if d.HasChange("enable_logging") { log.Printf("[DEBUG] Updating logging on CloudTrail: %s", input) err := cloudTrailSetLogging(conn, d.Get("enable_logging").(bool), *input.Name) if err != nil { return err } } log.Printf("[DEBUG] CloudTrail updated: %s", t) return resourceAwsCloudTrailRead(d, meta) }
func ExampleIoT_RegisterCACertificate() { sess, err := session.NewSession() if err != nil { fmt.Println("failed to create session,", err) return } svc := iot.New(sess) params := &iot.RegisterCACertificateInput{ CaCertificate: aws.String("CertificatePem"), // Required VerificationCertificate: aws.String("CertificatePem"), // Required AllowAutoRegistration: aws.Bool(true), SetAsActive: aws.Bool(true), } resp, err := svc.RegisterCACertificate(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func containerDef(family *string, containerPort *int64, hostPort *int64, image *string, cpu *int64, memory *int64, essential bool, links []*string) *ecs.ContainerDefinition { portMapping := &ecs.PortMapping{ ContainerPort: containerPort, HostPort: hostPort, Protocol: aws.String("tcp"), } mountPoint := &ecs.MountPoint{ ContainerPath: aws.String("/var/www/" + (*family) + "-vol"), SourceVolume: aws.String(*family + "-vol"), ReadOnly: aws.Bool(false), } c := ecs.ContainerDefinition{} c.Name = aws.String(*family + "-app") c.Image = image c.Cpu = cpu c.Memory = memory c.Essential = aws.Bool(essential) c.Links = links if *hostPort != 0 { c.PortMappings = []*ecs.PortMapping{portMapping} } c.MountPoints = []*ecs.MountPoint{mountPoint} return &c }
func ExampleRoute53_UpdateHealthCheck() { svc := route53.New(session.New()) params := &route53.UpdateHealthCheckInput{ HealthCheckId: aws.String("HealthCheckId"), // Required ChildHealthChecks: []*string{ aws.String("HealthCheckId"), // Required // More values... }, EnableSNI: aws.Bool(true), FailureThreshold: aws.Int64(1), FullyQualifiedDomainName: aws.String("FullyQualifiedDomainName"), HealthCheckVersion: aws.Int64(1), HealthThreshold: aws.Int64(1), IPAddress: aws.String("IPAddress"), Inverted: aws.Bool(true), Port: aws.Int64(1), ResourcePath: aws.String("ResourcePath"), SearchString: aws.String("SearchString"), } resp, err := svc.UpdateHealthCheck(params) if err != nil { // Print the error, cast err to awserr.Error to get the Code and // Message from an error. fmt.Println(err.Error()) return } // Pretty-print the response data. fmt.Println(resp) }
func expandESClusterConfig(m map[string]interface{}) *elasticsearch.ElasticsearchClusterConfig { config := elasticsearch.ElasticsearchClusterConfig{} if v, ok := m["dedicated_master_enabled"]; ok { isEnabled := v.(bool) config.DedicatedMasterEnabled = aws.Bool(isEnabled) if isEnabled { if v, ok := m["dedicated_master_count"]; ok && v.(int) > 0 { config.DedicatedMasterCount = aws.Int64(int64(v.(int))) } if v, ok := m["dedicated_master_type"]; ok && v.(string) != "" { config.DedicatedMasterType = aws.String(v.(string)) } } } if v, ok := m["instance_count"]; ok { config.InstanceCount = aws.Int64(int64(v.(int))) } if v, ok := m["instance_type"]; ok { config.InstanceType = aws.String(v.(string)) } if v, ok := m["zone_awareness_enabled"]; ok { config.ZoneAwarenessEnabled = aws.Bool(v.(bool)) } return &config }
func TestAccelerateDualstackBucketBuild(t *testing.T) { s := s3.New(unit.Session, &aws.Config{ S3UseAccelerate: aws.Bool(true), UseDualStack: aws.Bool(true), }) runTests(t, s, accelerateDualstack) }