UNPKG

@pulumi/aws

Version:

A Pulumi package for creating and managing Amazon Web Services (AWS) cloud resources.

132 lines 5.62 kB
"use strict"; // *** WARNING: this file was generated by pulumi-language-nodejs. *** // *** Do not edit by hand unless you're certain you know what you are doing! *** Object.defineProperty(exports, "__esModule", { value: true }); exports.BucketServerSideEncryptionConfiguration = void 0; const pulumi = require("@pulumi/pulumi"); const utilities = require("../utilities"); /** * Provides a S3 bucket server-side encryption configuration resource. * * > **NOTE:** Destroying an `aws.s3.BucketServerSideEncryptionConfiguration` resource resets the bucket to [Amazon S3 bucket default encryption](https://docs.aws.amazon.com/AmazonS3/latest/userguide/default-encryption-faq.html). * * ## Example Usage * * ```typescript * import * as pulumi from "@pulumi/pulumi"; * import * as aws from "@pulumi/aws"; * * const mykey = new aws.kms.Key("mykey", { * description: "This key is used to encrypt bucket objects", * deletionWindowInDays: 10, * }); * const mybucket = new aws.s3.Bucket("mybucket", {bucket: "mybucket"}); * const example = new aws.s3.BucketServerSideEncryptionConfiguration("example", { * bucket: mybucket.id, * rules: [{ * applyServerSideEncryptionByDefault: { * kmsMasterKeyId: mykey.arn, * sseAlgorithm: "aws:kms", * }, * }], * }); * ``` * * ## Import * * ### Identity Schema * * #### Required * * * `bucket` (String) S3 bucket name. * * #### Optional * * * `account_id` (String) AWS Account where this resource is managed. * * * `expected_bucket_owner` (String) Account ID of the expected bucket owner. * * * `region` (String) Region where this resource is managed. * * If the owner (account ID) of the source bucket differs from the account used to configure the AWS Provider, import using the `bucket` and `expected_bucket_owner` separated by a comma (`,`): * * terraform * * import { * * to = aws_s3_bucket_server_side_encryption_configuration.example * * id = "bucket-name,123456789012" * * } * * **Using `pulumi import` to import** S3 bucket server-side encryption configuration using the `bucket` or using the `bucket` and `expected_bucket_owner` separated by a comma (`,`). For example: * * If the owner (account ID) of the source bucket is the same account used to configure the AWS Provider, import using the `bucket`: * * console * * % pulumi import aws_s3_bucket_server_side_encryption_configuration.example bucket-name * * If the owner (account ID) of the source bucket differs from the account used to configure the AWS Provider, import using the `bucket` and `expected_bucket_owner` separated by a comma (`,`): * * console * * % pulumi import aws_s3_bucket_server_side_encryption_configuration.example bucket-name,123456789012 */ class BucketServerSideEncryptionConfiguration extends pulumi.CustomResource { /** * Get an existing BucketServerSideEncryptionConfiguration resource's state with the given name, ID, and optional extra * properties used to qualify the lookup. * * @param name The _unique_ name of the resulting resource. * @param id The _unique_ provider ID of the resource to lookup. * @param state Any extra arguments used during the lookup. * @param opts Optional settings to control the behavior of the CustomResource. */ static get(name, id, state, opts) { return new BucketServerSideEncryptionConfiguration(name, state, { ...opts, id: id }); } /** * Returns true if the given object is an instance of BucketServerSideEncryptionConfiguration. This is designed to work even * when multiple copies of the Pulumi SDK have been loaded into the same process. */ static isInstance(obj) { if (obj === undefined || obj === null) { return false; } return obj['__pulumiType'] === BucketServerSideEncryptionConfiguration.__pulumiType; } constructor(name, argsOrState, opts) { let resourceInputs = {}; opts = opts || {}; if (opts.id) { const state = argsOrState; resourceInputs["bucket"] = state?.bucket; resourceInputs["expectedBucketOwner"] = state?.expectedBucketOwner; resourceInputs["region"] = state?.region; resourceInputs["rules"] = state?.rules; } else { const args = argsOrState; if (args?.bucket === undefined && !opts.urn) { throw new Error("Missing required property 'bucket'"); } if (args?.rules === undefined && !opts.urn) { throw new Error("Missing required property 'rules'"); } resourceInputs["bucket"] = args?.bucket; resourceInputs["expectedBucketOwner"] = args?.expectedBucketOwner; resourceInputs["region"] = args?.region; resourceInputs["rules"] = args?.rules; } opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts); const aliasOpts = { aliases: [{ type: "aws:s3/bucketServerSideEncryptionConfigurationV2:BucketServerSideEncryptionConfigurationV2" }] }; opts = pulumi.mergeOptions(opts, aliasOpts); super(BucketServerSideEncryptionConfiguration.__pulumiType, name, resourceInputs, opts); } } exports.BucketServerSideEncryptionConfiguration = BucketServerSideEncryptionConfiguration; /** @internal */ BucketServerSideEncryptionConfiguration.__pulumiType = 'aws:s3/bucketServerSideEncryptionConfiguration:BucketServerSideEncryptionConfiguration'; //# sourceMappingURL=bucketServerSideEncryptionConfiguration.js.map