UNPKG

@pierskarsenbarg/sdm

Version:

A Pulumi package for creating and managing StrongDM cloud resources.

106 lines 5.46 kB
"use strict"; // *** WARNING: this file was generated by pulumi-language-nodejs. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.SecretStore = void 0; const pulumi = require("@pulumi/pulumi"); const utilities = require("./utilities"); /** * A SecretStore is a server where resource secrets (passwords, keys) are stored. * Coming soon support for HashiCorp Vault and AWS Secret Store. * This resource can be imported using the import command. * * ## Import * * A SecretStore can be imported using the id, e.g., * * ```sh * $ pulumi import sdm:index/secretStore:SecretStore example se-12345678 * ``` */ class SecretStore extends pulumi.CustomResource { /** * Get an existing SecretStore resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new SecretStore(name, state, { ...opts, id: id }); } /** * Returns true if the given object is an instance of SecretStore. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === SecretStore.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["activeDirectoryStore"] = state?.activeDirectoryStore; resourceInputs["aws"] = state?.aws; resourceInputs["awsCertX509"] = state?.awsCertX509; resourceInputs["azureStore"] = state?.azureStore; resourceInputs["cyberarkConjur"] = state?.cyberarkConjur; resourceInputs["cyberarkPam"] = state?.cyberarkPam; resourceInputs["cyberarkPamExperimental"] = state?.cyberarkPamExperimental; resourceInputs["delineaStore"] = state?.delineaStore; resourceInputs["gcpCertX509Store"] = state?.gcpCertX509Store; resourceInputs["gcpStore"] = state?.gcpStore; resourceInputs["keyfactorSshStore"] = state?.keyfactorSshStore; resourceInputs["keyfactorX509Store"] = state?.keyfactorX509Store; resourceInputs["vaultApprole"] = state?.vaultApprole; resourceInputs["vaultApproleCertSsh"] = state?.vaultApproleCertSsh; resourceInputs["vaultApproleCertX509"] = state?.vaultApproleCertX509; resourceInputs["vaultAwsEc2"] = state?.vaultAwsEc2; resourceInputs["vaultAwsIam"] = state?.vaultAwsIam; resourceInputs["vaultTls"] = state?.vaultTls; resourceInputs["vaultTlsCertSsh"] = state?.vaultTlsCertSsh; resourceInputs["vaultTlsCertX509"] = state?.vaultTlsCertX509; resourceInputs["vaultToken"] = state?.vaultToken; resourceInputs["vaultTokenCertSsh"] = state?.vaultTokenCertSsh; resourceInputs["vaultTokenCertX509"] = state?.vaultTokenCertX509; } else { const args = argsOrState; resourceInputs["activeDirectoryStore"] = args?.activeDirectoryStore; resourceInputs["aws"] = args?.aws; resourceInputs["awsCertX509"] = args?.awsCertX509; resourceInputs["azureStore"] = args?.azureStore; resourceInputs["cyberarkConjur"] = args?.cyberarkConjur; resourceInputs["cyberarkPam"] = args?.cyberarkPam; resourceInputs["cyberarkPamExperimental"] = args?.cyberarkPamExperimental; resourceInputs["delineaStore"] = args?.delineaStore; resourceInputs["gcpCertX509Store"] = args?.gcpCertX509Store; resourceInputs["gcpStore"] = args?.gcpStore; resourceInputs["keyfactorSshStore"] = args?.keyfactorSshStore; resourceInputs["keyfactorX509Store"] = args?.keyfactorX509Store; resourceInputs["vaultApprole"] = args?.vaultApprole; resourceInputs["vaultApproleCertSsh"] = args?.vaultApproleCertSsh; resourceInputs["vaultApproleCertX509"] = args?.vaultApproleCertX509; resourceInputs["vaultAwsEc2"] = args?.vaultAwsEc2; resourceInputs["vaultAwsIam"] = args?.vaultAwsIam; resourceInputs["vaultTls"] = args?.vaultTls; resourceInputs["vaultTlsCertSsh"] = args?.vaultTlsCertSsh; resourceInputs["vaultTlsCertX509"] = args?.vaultTlsCertX509; resourceInputs["vaultToken"] = args?.vaultToken; resourceInputs["vaultTokenCertSsh"] = args?.vaultTokenCertSsh; resourceInputs["vaultTokenCertX509"] = args?.vaultTokenCertX509; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); super(SecretStore.__pulumiType, name, resourceInputs, opts); } } exports.SecretStore = SecretStore; /** @internal */ SecretStore.__pulumiType = 'sdm:index/secretStore:SecretStore'; //# sourceMappingURL=secretStore.js.map