This repository has been archived by the owner on Mar 11, 2021. It is now read-only.
/
databaseVulnerabilityAssessment.go
195 lines (171 loc) · 10.1 KB
/
databaseVulnerabilityAssessment.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
// *** WARNING: this file was generated by the Pulumi SDK Generator. ***
// *** Do not edit by hand unless you're certain you know what you are doing! ***
package v20200801preview
import (
"context"
"reflect"
"github.com/pkg/errors"
"github.com/pulumi/pulumi/sdk/v2/go/pulumi"
)
// A database vulnerability assessment.
type DatabaseVulnerabilityAssessment struct {
pulumi.CustomResourceState
// Resource name.
Name pulumi.StringOutput `pulumi:"name"`
// The recurring scans settings
RecurringScans VulnerabilityAssessmentRecurringScansPropertiesResponsePtrOutput `pulumi:"recurringScans"`
// Specifies the identifier key of the storage account for vulnerability assessment scan results. If 'StorageContainerSasKey' isn't specified, storageAccountAccessKey is required.
StorageAccountAccessKey pulumi.StringPtrOutput `pulumi:"storageAccountAccessKey"`
// A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/). It is required if server level vulnerability assessment policy doesn't set
StorageContainerPath pulumi.StringPtrOutput `pulumi:"storageContainerPath"`
// A shared access signature (SAS Key) that has write access to the blob container specified in 'storageContainerPath' parameter. If 'storageAccountAccessKey' isn't specified, StorageContainerSasKey is required.
StorageContainerSasKey pulumi.StringPtrOutput `pulumi:"storageContainerSasKey"`
// Resource type.
Type pulumi.StringOutput `pulumi:"type"`
}
// NewDatabaseVulnerabilityAssessment registers a new resource with the given unique name, arguments, and options.
func NewDatabaseVulnerabilityAssessment(ctx *pulumi.Context,
name string, args *DatabaseVulnerabilityAssessmentArgs, opts ...pulumi.ResourceOption) (*DatabaseVulnerabilityAssessment, error) {
if args == nil {
return nil, errors.New("missing one or more required arguments")
}
if args.DatabaseName == nil {
return nil, errors.New("invalid value for required argument 'DatabaseName'")
}
if args.ResourceGroupName == nil {
return nil, errors.New("invalid value for required argument 'ResourceGroupName'")
}
if args.ServerName == nil {
return nil, errors.New("invalid value for required argument 'ServerName'")
}
if args.VulnerabilityAssessmentName == nil {
return nil, errors.New("invalid value for required argument 'VulnerabilityAssessmentName'")
}
aliases := pulumi.Aliases([]pulumi.Alias{
{
Type: pulumi.String("azure-nextgen:sql/v20170301preview:DatabaseVulnerabilityAssessment"),
},
{
Type: pulumi.String("azure-nextgen:sql/v20200202preview:DatabaseVulnerabilityAssessment"),
},
})
opts = append(opts, aliases)
var resource DatabaseVulnerabilityAssessment
err := ctx.RegisterResource("azure-nextgen:sql/v20200801preview:DatabaseVulnerabilityAssessment", name, args, &resource, opts...)
if err != nil {
return nil, err
}
return &resource, nil
}
// GetDatabaseVulnerabilityAssessment gets an existing DatabaseVulnerabilityAssessment resource's state with the given name, ID, and optional
// state properties that are used to uniquely qualify the lookup (nil if not required).
func GetDatabaseVulnerabilityAssessment(ctx *pulumi.Context,
name string, id pulumi.IDInput, state *DatabaseVulnerabilityAssessmentState, opts ...pulumi.ResourceOption) (*DatabaseVulnerabilityAssessment, error) {
var resource DatabaseVulnerabilityAssessment
err := ctx.ReadResource("azure-nextgen:sql/v20200801preview:DatabaseVulnerabilityAssessment", name, id, state, &resource, opts...)
if err != nil {
return nil, err
}
return &resource, nil
}
// Input properties used for looking up and filtering DatabaseVulnerabilityAssessment resources.
type databaseVulnerabilityAssessmentState struct {
// Resource name.
Name *string `pulumi:"name"`
// The recurring scans settings
RecurringScans *VulnerabilityAssessmentRecurringScansPropertiesResponse `pulumi:"recurringScans"`
// Specifies the identifier key of the storage account for vulnerability assessment scan results. If 'StorageContainerSasKey' isn't specified, storageAccountAccessKey is required.
StorageAccountAccessKey *string `pulumi:"storageAccountAccessKey"`
// A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/). It is required if server level vulnerability assessment policy doesn't set
StorageContainerPath *string `pulumi:"storageContainerPath"`
// A shared access signature (SAS Key) that has write access to the blob container specified in 'storageContainerPath' parameter. If 'storageAccountAccessKey' isn't specified, StorageContainerSasKey is required.
StorageContainerSasKey *string `pulumi:"storageContainerSasKey"`
// Resource type.
Type *string `pulumi:"type"`
}
type DatabaseVulnerabilityAssessmentState struct {
// Resource name.
Name pulumi.StringPtrInput
// The recurring scans settings
RecurringScans VulnerabilityAssessmentRecurringScansPropertiesResponsePtrInput
// Specifies the identifier key of the storage account for vulnerability assessment scan results. If 'StorageContainerSasKey' isn't specified, storageAccountAccessKey is required.
StorageAccountAccessKey pulumi.StringPtrInput
// A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/). It is required if server level vulnerability assessment policy doesn't set
StorageContainerPath pulumi.StringPtrInput
// A shared access signature (SAS Key) that has write access to the blob container specified in 'storageContainerPath' parameter. If 'storageAccountAccessKey' isn't specified, StorageContainerSasKey is required.
StorageContainerSasKey pulumi.StringPtrInput
// Resource type.
Type pulumi.StringPtrInput
}
func (DatabaseVulnerabilityAssessmentState) ElementType() reflect.Type {
return reflect.TypeOf((*databaseVulnerabilityAssessmentState)(nil)).Elem()
}
type databaseVulnerabilityAssessmentArgs struct {
// The name of the database for which the vulnerability assessment is defined.
DatabaseName string `pulumi:"databaseName"`
// The recurring scans settings
RecurringScans *VulnerabilityAssessmentRecurringScansProperties `pulumi:"recurringScans"`
// The name of the resource group that contains the resource. You can obtain this value from the Azure Resource Manager API or the portal.
ResourceGroupName string `pulumi:"resourceGroupName"`
// The name of the server.
ServerName string `pulumi:"serverName"`
// Specifies the identifier key of the storage account for vulnerability assessment scan results. If 'StorageContainerSasKey' isn't specified, storageAccountAccessKey is required.
StorageAccountAccessKey *string `pulumi:"storageAccountAccessKey"`
// A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/). It is required if server level vulnerability assessment policy doesn't set
StorageContainerPath *string `pulumi:"storageContainerPath"`
// A shared access signature (SAS Key) that has write access to the blob container specified in 'storageContainerPath' parameter. If 'storageAccountAccessKey' isn't specified, StorageContainerSasKey is required.
StorageContainerSasKey *string `pulumi:"storageContainerSasKey"`
// The name of the vulnerability assessment.
VulnerabilityAssessmentName string `pulumi:"vulnerabilityAssessmentName"`
}
// The set of arguments for constructing a DatabaseVulnerabilityAssessment resource.
type DatabaseVulnerabilityAssessmentArgs struct {
// The name of the database for which the vulnerability assessment is defined.
DatabaseName pulumi.StringInput
// The recurring scans settings
RecurringScans VulnerabilityAssessmentRecurringScansPropertiesPtrInput
// The name of the resource group that contains the resource. You can obtain this value from the Azure Resource Manager API or the portal.
ResourceGroupName pulumi.StringInput
// The name of the server.
ServerName pulumi.StringInput
// Specifies the identifier key of the storage account for vulnerability assessment scan results. If 'StorageContainerSasKey' isn't specified, storageAccountAccessKey is required.
StorageAccountAccessKey pulumi.StringPtrInput
// A blob storage container path to hold the scan results (e.g. https://myStorage.blob.core.windows.net/VaScans/). It is required if server level vulnerability assessment policy doesn't set
StorageContainerPath pulumi.StringPtrInput
// A shared access signature (SAS Key) that has write access to the blob container specified in 'storageContainerPath' parameter. If 'storageAccountAccessKey' isn't specified, StorageContainerSasKey is required.
StorageContainerSasKey pulumi.StringPtrInput
// The name of the vulnerability assessment.
VulnerabilityAssessmentName pulumi.StringInput
}
func (DatabaseVulnerabilityAssessmentArgs) ElementType() reflect.Type {
return reflect.TypeOf((*databaseVulnerabilityAssessmentArgs)(nil)).Elem()
}
type DatabaseVulnerabilityAssessmentInput interface {
pulumi.Input
ToDatabaseVulnerabilityAssessmentOutput() DatabaseVulnerabilityAssessmentOutput
ToDatabaseVulnerabilityAssessmentOutputWithContext(ctx context.Context) DatabaseVulnerabilityAssessmentOutput
}
func (*DatabaseVulnerabilityAssessment) ElementType() reflect.Type {
return reflect.TypeOf((*DatabaseVulnerabilityAssessment)(nil))
}
func (i *DatabaseVulnerabilityAssessment) ToDatabaseVulnerabilityAssessmentOutput() DatabaseVulnerabilityAssessmentOutput {
return i.ToDatabaseVulnerabilityAssessmentOutputWithContext(context.Background())
}
func (i *DatabaseVulnerabilityAssessment) ToDatabaseVulnerabilityAssessmentOutputWithContext(ctx context.Context) DatabaseVulnerabilityAssessmentOutput {
return pulumi.ToOutputWithContext(ctx, i).(DatabaseVulnerabilityAssessmentOutput)
}
type DatabaseVulnerabilityAssessmentOutput struct {
*pulumi.OutputState
}
func (DatabaseVulnerabilityAssessmentOutput) ElementType() reflect.Type {
return reflect.TypeOf((*DatabaseVulnerabilityAssessment)(nil))
}
func (o DatabaseVulnerabilityAssessmentOutput) ToDatabaseVulnerabilityAssessmentOutput() DatabaseVulnerabilityAssessmentOutput {
return o
}
func (o DatabaseVulnerabilityAssessmentOutput) ToDatabaseVulnerabilityAssessmentOutputWithContext(ctx context.Context) DatabaseVulnerabilityAssessmentOutput {
return o
}
func init() {
pulumi.RegisterOutputType(DatabaseVulnerabilityAssessmentOutput{})
}