UNPKG

@pierskarsenbarg/sdm

Version:

A Pulumi package for creating and managing StrongDM cloud resources.

139 lines 7.27 kB
"use strict"; // *** WARNING: this file was generated by pulumi-language-nodejs. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** var __createBinding = (this && this.__createBinding) || (Object.create ? (function(o, m, k, k2) { if (k2 === undefined) k2 = k; var desc = Object.getOwnPropertyDescriptor(m, k); if (!desc || ("get" in desc ? !m.__esModule : desc.writable || desc.configurable)) { desc = { enumerable: true, get: function() { return m[k]; } }; } Object.defineProperty(o, k2, desc); }) : (function(o, m, k, k2) { if (k2 === undefined) k2 = k; o[k2] = m[k]; })); var __setModuleDefault = (this && this.__setModuleDefault) || (Object.create ? (function(o, v) { Object.defineProperty(o, "default", { enumerable: true, value: v }); }) : function(o, v) { o["default"] = v; }); var __importStar = (this && this.__importStar) || function (mod) { if (mod && mod.__esModule) return mod; var result = {}; if (mod != null) for (var k in mod) if (k !== "default" && Object.prototype.hasOwnProperty.call(mod, k)) __createBinding(result, mod, k); __setModuleDefault(result, mod); return result; }; Object.defineProperty(exports, "__esModule", { value: true }); exports.SecretStore = void 0; const pulumi = __importStar(require("@pulumi/pulumi")); const utilities = __importStar(require("./utilities")); /** * A SecretStore is a server where resource secrets (passwords, keys) are stored. * Coming soon support for HashiCorp Vault and AWS Secret Store. * This resource can be imported using the import command. * * ## Import * * A SecretStore can be imported using the id, e.g., * * ```sh * $ pulumi import sdm:index/secretStore:SecretStore example se-12345678 * ``` */ class SecretStore extends pulumi.CustomResource { /** * Get an existing SecretStore resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new SecretStore(name, state, { ...opts, id: id }); } /** @internal */ static __pulumiType = 'sdm:index/secretStore:SecretStore'; /** * Returns true if the given object is an instance of SecretStore. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === SecretStore.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["activeDirectoryStore"] = state?.activeDirectoryStore; resourceInputs["aws"] = state?.aws; resourceInputs["awsCertX509"] = state?.awsCertX509; resourceInputs["azureStore"] = state?.azureStore; resourceInputs["cyberarkConjur"] = state?.cyberarkConjur; resourceInputs["cyberarkPam"] = state?.cyberarkPam; resourceInputs["cyberarkPamExperimental"] = state?.cyberarkPamExperimental; resourceInputs["delineaStore"] = state?.delineaStore; resourceInputs["gcpCertX509Store"] = state?.gcpCertX509Store; resourceInputs["gcpStore"] = state?.gcpStore; resourceInputs["keyfactorSshStore"] = state?.keyfactorSshStore; resourceInputs["keyfactorX509Store"] = state?.keyfactorX509Store; resourceInputs["strongVault"] = state?.strongVault; resourceInputs["vaultApprole"] = state?.vaultApprole; resourceInputs["vaultApproleCertSsh"] = state?.vaultApproleCertSsh; resourceInputs["vaultApproleCertX509"] = state?.vaultApproleCertX509; resourceInputs["vaultAwsEc2"] = state?.vaultAwsEc2; resourceInputs["vaultAwsEc2CertSsh"] = state?.vaultAwsEc2CertSsh; resourceInputs["vaultAwsEc2CertX509"] = state?.vaultAwsEc2CertX509; resourceInputs["vaultAwsIam"] = state?.vaultAwsIam; resourceInputs["vaultAwsIamCertSsh"] = state?.vaultAwsIamCertSsh; resourceInputs["vaultAwsIamCertX509"] = state?.vaultAwsIamCertX509; resourceInputs["vaultTls"] = state?.vaultTls; resourceInputs["vaultTlsCertSsh"] = state?.vaultTlsCertSsh; resourceInputs["vaultTlsCertX509"] = state?.vaultTlsCertX509; resourceInputs["vaultToken"] = state?.vaultToken; resourceInputs["vaultTokenCertSsh"] = state?.vaultTokenCertSsh; resourceInputs["vaultTokenCertX509"] = state?.vaultTokenCertX509; } else { const args = argsOrState; resourceInputs["activeDirectoryStore"] = args?.activeDirectoryStore; resourceInputs["aws"] = args?.aws; resourceInputs["awsCertX509"] = args?.awsCertX509; resourceInputs["azureStore"] = args?.azureStore; resourceInputs["cyberarkConjur"] = args?.cyberarkConjur; resourceInputs["cyberarkPam"] = args?.cyberarkPam; resourceInputs["cyberarkPamExperimental"] = args?.cyberarkPamExperimental; resourceInputs["delineaStore"] = args?.delineaStore; resourceInputs["gcpCertX509Store"] = args?.gcpCertX509Store; resourceInputs["gcpStore"] = args?.gcpStore; resourceInputs["keyfactorSshStore"] = args?.keyfactorSshStore; resourceInputs["keyfactorX509Store"] = args?.keyfactorX509Store; resourceInputs["strongVault"] = args?.strongVault; resourceInputs["vaultApprole"] = args?.vaultApprole; resourceInputs["vaultApproleCertSsh"] = args?.vaultApproleCertSsh; resourceInputs["vaultApproleCertX509"] = args?.vaultApproleCertX509; resourceInputs["vaultAwsEc2"] = args?.vaultAwsEc2; resourceInputs["vaultAwsEc2CertSsh"] = args?.vaultAwsEc2CertSsh; resourceInputs["vaultAwsEc2CertX509"] = args?.vaultAwsEc2CertX509; resourceInputs["vaultAwsIam"] = args?.vaultAwsIam; resourceInputs["vaultAwsIamCertSsh"] = args?.vaultAwsIamCertSsh; resourceInputs["vaultAwsIamCertX509"] = args?.vaultAwsIamCertX509; resourceInputs["vaultTls"] = args?.vaultTls; resourceInputs["vaultTlsCertSsh"] = args?.vaultTlsCertSsh; resourceInputs["vaultTlsCertX509"] = args?.vaultTlsCertX509; resourceInputs["vaultToken"] = args?.vaultToken; resourceInputs["vaultTokenCertSsh"] = args?.vaultTokenCertSsh; resourceInputs["vaultTokenCertX509"] = args?.vaultTokenCertX509; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); super(SecretStore.__pulumiType, name, resourceInputs, opts); } } exports.SecretStore = SecretStore; //# sourceMappingURL=secretStore.js.map