@pierskarsenbarg/sdm
Version:
A Pulumi package for creating and managing StrongDM cloud resources.
139 lines • 7.27 kB
JavaScript
;
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
var desc = Object.getOwnPropertyDescriptor(m, k);
if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) {
desc = { enumerable: true, get: function() { return m[k]; } };
}
Object.defineProperty(o, k2, desc);
}) : (function(o, m, k, k2) {
if (k2 === undefined) k2 = k;
o[k2] = m[k];
}));
var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) {
Object.defineProperty(o, "default", { enumerable: true, value: v });
}) : function(o, v) {
o["default"] = v;
});
var __importStar = (this && this.__importStar) || function (mod) {
if (mod && mod.__esModule) return mod;
var result = {};
if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k);
__setModuleDefault(result, mod);
return result;
};
Object.defineProperty(exports, "__esModule", { value: true });
exports.SecretStore = void 0;
const pulumi = __importStar(require("@pulumi/pulumi"));
const utilities = __importStar(require("./utilities"));
/**
* A SecretStore is a server where resource secrets (passwords, keys) are stored.
* Coming soon support for HashiCorp Vault and AWS Secret Store.
* This resource can be imported using the import command.
*
* ## Import
*
* A SecretStore can be imported using the id, e.g.,
*
* ```sh
* $ pulumi import sdm:index/secretStore:SecretStore example se-12345678
* ```
*/
class SecretStore extends pulumi.CustomResource {
/**
* Get an existing SecretStore resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, state, opts) {
return new SecretStore(name, state, { ...opts, id: id });
}
/** @internal */
static __pulumiType = 'sdm:index/secretStore:SecretStore';
/**
* Returns true if the given object is an instance of SecretStore. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === SecretStore.__pulumiType;
}
constructor(name, argsOrState, opts) {
let resourceInputs = {};
opts = opts || {};
if (opts.id) {
const state = argsOrState;
resourceInputs["activeDirectoryStore"] = state?.activeDirectoryStore;
resourceInputs["aws"] = state?.aws;
resourceInputs["awsCertX509"] = state?.awsCertX509;
resourceInputs["azureStore"] = state?.azureStore;
resourceInputs["cyberarkConjur"] = state?.cyberarkConjur;
resourceInputs["cyberarkPam"] = state?.cyberarkPam;
resourceInputs["cyberarkPamExperimental"] = state?.cyberarkPamExperimental;
resourceInputs["delineaStore"] = state?.delineaStore;
resourceInputs["gcpCertX509Store"] = state?.gcpCertX509Store;
resourceInputs["gcpStore"] = state?.gcpStore;
resourceInputs["keyfactorSshStore"] = state?.keyfactorSshStore;
resourceInputs["keyfactorX509Store"] = state?.keyfactorX509Store;
resourceInputs["strongVault"] = state?.strongVault;
resourceInputs["vaultApprole"] = state?.vaultApprole;
resourceInputs["vaultApproleCertSsh"] = state?.vaultApproleCertSsh;
resourceInputs["vaultApproleCertX509"] = state?.vaultApproleCertX509;
resourceInputs["vaultAwsEc2"] = state?.vaultAwsEc2;
resourceInputs["vaultAwsEc2CertSsh"] = state?.vaultAwsEc2CertSsh;
resourceInputs["vaultAwsEc2CertX509"] = state?.vaultAwsEc2CertX509;
resourceInputs["vaultAwsIam"] = state?.vaultAwsIam;
resourceInputs["vaultAwsIamCertSsh"] = state?.vaultAwsIamCertSsh;
resourceInputs["vaultAwsIamCertX509"] = state?.vaultAwsIamCertX509;
resourceInputs["vaultTls"] = state?.vaultTls;
resourceInputs["vaultTlsCertSsh"] = state?.vaultTlsCertSsh;
resourceInputs["vaultTlsCertX509"] = state?.vaultTlsCertX509;
resourceInputs["vaultToken"] = state?.vaultToken;
resourceInputs["vaultTokenCertSsh"] = state?.vaultTokenCertSsh;
resourceInputs["vaultTokenCertX509"] = state?.vaultTokenCertX509;
}
else {
const args = argsOrState;
resourceInputs["activeDirectoryStore"] = args?.activeDirectoryStore;
resourceInputs["aws"] = args?.aws;
resourceInputs["awsCertX509"] = args?.awsCertX509;
resourceInputs["azureStore"] = args?.azureStore;
resourceInputs["cyberarkConjur"] = args?.cyberarkConjur;
resourceInputs["cyberarkPam"] = args?.cyberarkPam;
resourceInputs["cyberarkPamExperimental"] = args?.cyberarkPamExperimental;
resourceInputs["delineaStore"] = args?.delineaStore;
resourceInputs["gcpCertX509Store"] = args?.gcpCertX509Store;
resourceInputs["gcpStore"] = args?.gcpStore;
resourceInputs["keyfactorSshStore"] = args?.keyfactorSshStore;
resourceInputs["keyfactorX509Store"] = args?.keyfactorX509Store;
resourceInputs["strongVault"] = args?.strongVault;
resourceInputs["vaultApprole"] = args?.vaultApprole;
resourceInputs["vaultApproleCertSsh"] = args?.vaultApproleCertSsh;
resourceInputs["vaultApproleCertX509"] = args?.vaultApproleCertX509;
resourceInputs["vaultAwsEc2"] = args?.vaultAwsEc2;
resourceInputs["vaultAwsEc2CertSsh"] = args?.vaultAwsEc2CertSsh;
resourceInputs["vaultAwsEc2CertX509"] = args?.vaultAwsEc2CertX509;
resourceInputs["vaultAwsIam"] = args?.vaultAwsIam;
resourceInputs["vaultAwsIamCertSsh"] = args?.vaultAwsIamCertSsh;
resourceInputs["vaultAwsIamCertX509"] = args?.vaultAwsIamCertX509;
resourceInputs["vaultTls"] = args?.vaultTls;
resourceInputs["vaultTlsCertSsh"] = args?.vaultTlsCertSsh;
resourceInputs["vaultTlsCertX509"] = args?.vaultTlsCertX509;
resourceInputs["vaultToken"] = args?.vaultToken;
resourceInputs["vaultTokenCertSsh"] = args?.vaultTokenCertSsh;
resourceInputs["vaultTokenCertX509"] = args?.vaultTokenCertX509;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
super(SecretStore.__pulumiType, name, resourceInputs, opts);
}
}
exports.SecretStore = SecretStore;
//# sourceMappingURL=secretStore.js.map