@pulumi/aws
Version:
A Pulumi package for creating and managing Amazon Web Services (AWS) cloud resources.
132 lines • 5.62 kB
JavaScript
;
// *** WARNING: this file was generated by pulumi-language-nodejs. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
Object.defineProperty(exports, "__esModule", { value: true });
exports.BucketServerSideEncryptionConfiguration = void 0;
const pulumi = require("@pulumi/pulumi");
const utilities = require("../utilities");
/**
* Provides a S3 bucket server-side encryption configuration resource.
*
* > **NOTE:** Destroying an `aws.s3.BucketServerSideEncryptionConfiguration` resource resets the bucket to [Amazon S3 bucket default encryption](https://docs.aws.amazon.com/AmazonS3/latest/userguide/default-encryption-faq.html).
*
* ## Example Usage
*
* ```typescript
* import * as pulumi from "@pulumi/pulumi";
* import * as aws from "@pulumi/aws";
*
* const mykey = new aws.kms.Key("mykey", {
* description: "This key is used to encrypt bucket objects",
* deletionWindowInDays: 10,
* });
* const mybucket = new aws.s3.Bucket("mybucket", {bucket: "mybucket"});
* const example = new aws.s3.BucketServerSideEncryptionConfiguration("example", {
* bucket: mybucket.id,
* rules: [{
* applyServerSideEncryptionByDefault: {
* kmsMasterKeyId: mykey.arn,
* sseAlgorithm: "aws:kms",
* },
* }],
* });
* ```
*
* ## Import
*
* ### Identity Schema
*
* #### Required
*
* * `bucket` (String) S3 bucket name.
*
* #### Optional
*
* * `account_id` (String) AWS Account where this resource is managed.
*
* * `expected_bucket_owner` (String) Account ID of the expected bucket owner.
*
* * `region` (String) Region where this resource is managed.
*
* If the owner (account ID) of the source bucket differs from the account used to configure the AWS Provider, import using the `bucket` and `expected_bucket_owner` separated by a comma (`,`):
*
* terraform
*
* import {
*
* to = aws_s3_bucket_server_side_encryption_configuration.example
*
* id = "bucket-name,123456789012"
*
* }
*
* **Using `pulumi import` to import** S3 bucket server-side encryption configuration using the `bucket` or using the `bucket` and `expected_bucket_owner` separated by a comma (`,`). For example:
*
* If the owner (account ID) of the source bucket is the same account used to configure the AWS Provider, import using the `bucket`:
*
* console
*
* % pulumi import aws_s3_bucket_server_side_encryption_configuration.example bucket-name
*
* If the owner (account ID) of the source bucket differs from the account used to configure the AWS Provider, import using the `bucket` and `expected_bucket_owner` separated by a comma (`,`):
*
* console
*
* % pulumi import aws_s3_bucket_server_side_encryption_configuration.example bucket-name,123456789012
*/
class BucketServerSideEncryptionConfiguration extends pulumi.CustomResource {
/**
* Get an existing BucketServerSideEncryptionConfiguration resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name, id, state, opts) {
return new BucketServerSideEncryptionConfiguration(name, state, { ...opts, id: id });
}
/**
* Returns true if the given object is an instance of BucketServerSideEncryptionConfiguration. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj) {
if (obj === undefined || obj === null) {
return false;
}
return obj['__pulumiType'] === BucketServerSideEncryptionConfiguration.__pulumiType;
}
constructor(name, argsOrState, opts) {
let resourceInputs = {};
opts = opts || {};
if (opts.id) {
const state = argsOrState;
resourceInputs["bucket"] = state?.bucket;
resourceInputs["expectedBucketOwner"] = state?.expectedBucketOwner;
resourceInputs["region"] = state?.region;
resourceInputs["rules"] = state?.rules;
}
else {
const args = argsOrState;
if (args?.bucket === undefined && !opts.urn) {
throw new Error("Missing required property 'bucket'");
}
if (args?.rules === undefined && !opts.urn) {
throw new Error("Missing required property 'rules'");
}
resourceInputs["bucket"] = args?.bucket;
resourceInputs["expectedBucketOwner"] = args?.expectedBucketOwner;
resourceInputs["region"] = args?.region;
resourceInputs["rules"] = args?.rules;
}
opts = pulumi.mergeOptions(utilities.resourceOptsDefaults(), opts);
const aliasOpts = { aliases: [{ type: "aws:s3/bucketServerSideEncryptionConfigurationV2:BucketServerSideEncryptionConfigurationV2" }] };
opts = pulumi.mergeOptions(opts, aliasOpts);
super(BucketServerSideEncryptionConfiguration.__pulumiType, name, resourceInputs, opts);
}
}
exports.BucketServerSideEncryptionConfiguration = BucketServerSideEncryptionConfiguration;
/** @internal */
BucketServerSideEncryptionConfiguration.__pulumiType = 'aws:s3/bucketServerSideEncryptionConfiguration:BucketServerSideEncryptionConfiguration';
//# sourceMappingURL=bucketServerSideEncryptionConfiguration.js.map