@pierskarsenbarg/sdm
Version:
A Pulumi package for creating and managing StrongDM cloud resources.
106 lines • 5.46 kB
JavaScript
;
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
Object.defineProperty(exports, "__esModule", { value: true });
exports.SecretStore = void 0;
const pulumi = require("@pulumi/pulumi");
const utilities = require("./utilities");
/**
* A SecretStore is a server where resource secrets (passwords, keys) are stored.
* Coming soon support for HashiCorp Vault and AWS Secret Store.
* This resource can be imported using the import command.
*
* ## Import
*
* A SecretStore can be imported using the id, e.g.,
*
* ```sh
* $ pulumi import sdm:index/secretStore:SecretStore example se-12345678
* ```
*/
class SecretStore extends pulumi.CustomResource {
/**
* Get an existing SecretStore resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, state, opts) {
return new SecretStore(name, state, { ...opts, id: id });
}
/**
* Returns true if the given object is an instance of SecretStore. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === SecretStore.__pulumiType;
}
constructor(name, argsOrState, opts) {
let resourceInputs = {};
opts = opts || {};
if (opts.id) {
const state = argsOrState;
resourceInputs["activeDirectoryStore"] = state?.activeDirectoryStore;
resourceInputs["aws"] = state?.aws;
resourceInputs["awsCertX509"] = state?.awsCertX509;
resourceInputs["azureStore"] = state?.azureStore;
resourceInputs["cyberarkConjur"] = state?.cyberarkConjur;
resourceInputs["cyberarkPam"] = state?.cyberarkPam;
resourceInputs["cyberarkPamExperimental"] = state?.cyberarkPamExperimental;
resourceInputs["delineaStore"] = state?.delineaStore;
resourceInputs["gcpCertX509Store"] = state?.gcpCertX509Store;
resourceInputs["gcpStore"] = state?.gcpStore;
resourceInputs["keyfactorSshStore"] = state?.keyfactorSshStore;
resourceInputs["keyfactorX509Store"] = state?.keyfactorX509Store;
resourceInputs["vaultApprole"] = state?.vaultApprole;
resourceInputs["vaultApproleCertSsh"] = state?.vaultApproleCertSsh;
resourceInputs["vaultApproleCertX509"] = state?.vaultApproleCertX509;
resourceInputs["vaultAwsEc2"] = state?.vaultAwsEc2;
resourceInputs["vaultAwsIam"] = state?.vaultAwsIam;
resourceInputs["vaultTls"] = state?.vaultTls;
resourceInputs["vaultTlsCertSsh"] = state?.vaultTlsCertSsh;
resourceInputs["vaultTlsCertX509"] = state?.vaultTlsCertX509;
resourceInputs["vaultToken"] = state?.vaultToken;
resourceInputs["vaultTokenCertSsh"] = state?.vaultTokenCertSsh;
resourceInputs["vaultTokenCertX509"] = state?.vaultTokenCertX509;
}
else {
const args = argsOrState;
resourceInputs["activeDirectoryStore"] = args?.activeDirectoryStore;
resourceInputs["aws"] = args?.aws;
resourceInputs["awsCertX509"] = args?.awsCertX509;
resourceInputs["azureStore"] = args?.azureStore;
resourceInputs["cyberarkConjur"] = args?.cyberarkConjur;
resourceInputs["cyberarkPam"] = args?.cyberarkPam;
resourceInputs["cyberarkPamExperimental"] = args?.cyberarkPamExperimental;
resourceInputs["delineaStore"] = args?.delineaStore;
resourceInputs["gcpCertX509Store"] = args?.gcpCertX509Store;
resourceInputs["gcpStore"] = args?.gcpStore;
resourceInputs["keyfactorSshStore"] = args?.keyfactorSshStore;
resourceInputs["keyfactorX509Store"] = args?.keyfactorX509Store;
resourceInputs["vaultApprole"] = args?.vaultApprole;
resourceInputs["vaultApproleCertSsh"] = args?.vaultApproleCertSsh;
resourceInputs["vaultApproleCertX509"] = args?.vaultApproleCertX509;
resourceInputs["vaultAwsEc2"] = args?.vaultAwsEc2;
resourceInputs["vaultAwsIam"] = args?.vaultAwsIam;
resourceInputs["vaultTls"] = args?.vaultTls;
resourceInputs["vaultTlsCertSsh"] = args?.vaultTlsCertSsh;
resourceInputs["vaultTlsCertX509"] = args?.vaultTlsCertX509;
resourceInputs["vaultToken"] = args?.vaultToken;
resourceInputs["vaultTokenCertSsh"] = args?.vaultTokenCertSsh;
resourceInputs["vaultTokenCertX509"] = args?.vaultTokenCertX509;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
super(SecretStore.__pulumiType, name, resourceInputs, opts);
}
}
exports.SecretStore = SecretStore;
/** @internal */
SecretStore.__pulumiType = 'sdm:index/secretStore:SecretStore';
//# sourceMappingURL=secretStore.js.map