import * as pulumi from "@pulumi/pulumi";
import * as inputs from "./types/input";
import * as outputs from "./types/output";
/**
 * A SecretStore is a server where resource secrets (passwords, keys) are stored.
 *  Coming soon support for HashiCorp Vault and AWS Secret Store.
 * This resource can be imported using the import command.
 *
 * ## Import
 *
 * A SecretStore can be imported using the id, e.g.,
 *
 * ```sh
 * $ pulumi import sdm:index/secretStore:SecretStore example se-12345678
 * ```
 */
export declare class SecretStore extends pulumi.CustomResource {
    /**
     * Get an existing SecretStore resource's state with the given name, ID, and optional extra
     * properties used to qualify the lookup.
     *
     * @param name The _unique_ name of the resulting resource.
     * @param id The _unique_ provider ID of the resource to lookup.
     * @param state Any extra arguments used during the lookup.
     * @param opts Optional settings to control the behavior of the CustomResource.
     */
    static get(name: string, id: pulumi.Input<pulumi.ID>, state?: SecretStoreState, opts?: pulumi.CustomResourceOptions): SecretStore;
    /**
     * Returns true if the given object is an instance of SecretStore.  This is designed to work even
     * when multiple copies of the Pulumi SDK have been loaded into the same process.
     */
    static isInstance(obj: any): obj is SecretStore;
    readonly activeDirectoryStore: pulumi.Output<outputs.SecretStoreActiveDirectoryStore | undefined>;
    readonly aws: pulumi.Output<outputs.SecretStoreAws | undefined>;
    readonly awsCertX509: pulumi.Output<outputs.SecretStoreAwsCertX509 | undefined>;
    readonly azureStore: pulumi.Output<outputs.SecretStoreAzureStore | undefined>;
    readonly cyberarkConjur: pulumi.Output<outputs.SecretStoreCyberarkConjur | undefined>;
    readonly cyberarkPam: pulumi.Output<outputs.SecretStoreCyberarkPam | undefined>;
    /**
     * CyberarkPAMExperimentalStore is currently unstable, and its API may change, or it may be removed, without a major
     * version bump.
     */
    readonly cyberarkPamExperimental: pulumi.Output<outputs.SecretStoreCyberarkPamExperimental | undefined>;
    readonly delineaStore: pulumi.Output<outputs.SecretStoreDelineaStore | undefined>;
    readonly gcpCertX509Store: pulumi.Output<outputs.SecretStoreGcpCertX509Store | undefined>;
    readonly gcpStore: pulumi.Output<outputs.SecretStoreGcpStore | undefined>;
    readonly keyfactorSshStore: pulumi.Output<outputs.SecretStoreKeyfactorSshStore | undefined>;
    readonly keyfactorX509Store: pulumi.Output<outputs.SecretStoreKeyfactorX509Store | undefined>;
    readonly vaultApprole: pulumi.Output<outputs.SecretStoreVaultApprole | undefined>;
    readonly vaultApproleCertSsh: pulumi.Output<outputs.SecretStoreVaultApproleCertSsh | undefined>;
    readonly vaultApproleCertX509: pulumi.Output<outputs.SecretStoreVaultApproleCertX509 | undefined>;
    readonly vaultAwsEc2: pulumi.Output<outputs.SecretStoreVaultAwsEc2 | undefined>;
    readonly vaultAwsIam: pulumi.Output<outputs.SecretStoreVaultAwsIam | undefined>;
    readonly vaultTls: pulumi.Output<outputs.SecretStoreVaultTls | undefined>;
    readonly vaultTlsCertSsh: pulumi.Output<outputs.SecretStoreVaultTlsCertSsh | undefined>;
    readonly vaultTlsCertX509: pulumi.Output<outputs.SecretStoreVaultTlsCertX509 | undefined>;
    readonly vaultToken: pulumi.Output<outputs.SecretStoreVaultToken | undefined>;
    readonly vaultTokenCertSsh: pulumi.Output<outputs.SecretStoreVaultTokenCertSsh | undefined>;
    readonly vaultTokenCertX509: pulumi.Output<outputs.SecretStoreVaultTokenCertX509 | undefined>;
    /**
     * Create a SecretStore resource with the given unique name, arguments, and options.
     *
     * @param name The _unique_ name of the resource.
     * @param args The arguments to use to populate this resource's properties.
     * @param opts A bag of options that control this resource's behavior.
     */
    constructor(name: string, args?: SecretStoreArgs, opts?: pulumi.CustomResourceOptions);
}
/**
 * Input properties used for looking up and filtering SecretStore resources.
 */
export interface SecretStoreState {
    activeDirectoryStore?: pulumi.Input<inputs.SecretStoreActiveDirectoryStore>;
    aws?: pulumi.Input<inputs.SecretStoreAws>;
    awsCertX509?: pulumi.Input<inputs.SecretStoreAwsCertX509>;
    azureStore?: pulumi.Input<inputs.SecretStoreAzureStore>;
    cyberarkConjur?: pulumi.Input<inputs.SecretStoreCyberarkConjur>;
    cyberarkPam?: pulumi.Input<inputs.SecretStoreCyberarkPam>;
    /**
     * CyberarkPAMExperimentalStore is currently unstable, and its API may change, or it may be removed, without a major
     * version bump.
     */
    cyberarkPamExperimental?: pulumi.Input<inputs.SecretStoreCyberarkPamExperimental>;
    delineaStore?: pulumi.Input<inputs.SecretStoreDelineaStore>;
    gcpCertX509Store?: pulumi.Input<inputs.SecretStoreGcpCertX509Store>;
    gcpStore?: pulumi.Input<inputs.SecretStoreGcpStore>;
    keyfactorSshStore?: pulumi.Input<inputs.SecretStoreKeyfactorSshStore>;
    keyfactorX509Store?: pulumi.Input<inputs.SecretStoreKeyfactorX509Store>;
    vaultApprole?: pulumi.Input<inputs.SecretStoreVaultApprole>;
    vaultApproleCertSsh?: pulumi.Input<inputs.SecretStoreVaultApproleCertSsh>;
    vaultApproleCertX509?: pulumi.Input<inputs.SecretStoreVaultApproleCertX509>;
    vaultAwsEc2?: pulumi.Input<inputs.SecretStoreVaultAwsEc2>;
    vaultAwsIam?: pulumi.Input<inputs.SecretStoreVaultAwsIam>;
    vaultTls?: pulumi.Input<inputs.SecretStoreVaultTls>;
    vaultTlsCertSsh?: pulumi.Input<inputs.SecretStoreVaultTlsCertSsh>;
    vaultTlsCertX509?: pulumi.Input<inputs.SecretStoreVaultTlsCertX509>;
    vaultToken?: pulumi.Input<inputs.SecretStoreVaultToken>;
    vaultTokenCertSsh?: pulumi.Input<inputs.SecretStoreVaultTokenCertSsh>;
    vaultTokenCertX509?: pulumi.Input<inputs.SecretStoreVaultTokenCertX509>;
}
/**
 * The set of arguments for constructing a SecretStore resource.
 */
export interface SecretStoreArgs {
    activeDirectoryStore?: pulumi.Input<inputs.SecretStoreActiveDirectoryStore>;
    aws?: pulumi.Input<inputs.SecretStoreAws>;
    awsCertX509?: pulumi.Input<inputs.SecretStoreAwsCertX509>;
    azureStore?: pulumi.Input<inputs.SecretStoreAzureStore>;
    cyberarkConjur?: pulumi.Input<inputs.SecretStoreCyberarkConjur>;
    cyberarkPam?: pulumi.Input<inputs.SecretStoreCyberarkPam>;
    /**
     * CyberarkPAMExperimentalStore is currently unstable, and its API may change, or it may be removed, without a major
     * version bump.
     */
    cyberarkPamExperimental?: pulumi.Input<inputs.SecretStoreCyberarkPamExperimental>;
    delineaStore?: pulumi.Input<inputs.SecretStoreDelineaStore>;
    gcpCertX509Store?: pulumi.Input<inputs.SecretStoreGcpCertX509Store>;
    gcpStore?: pulumi.Input<inputs.SecretStoreGcpStore>;
    keyfactorSshStore?: pulumi.Input<inputs.SecretStoreKeyfactorSshStore>;
    keyfactorX509Store?: pulumi.Input<inputs.SecretStoreKeyfactorX509Store>;
    vaultApprole?: pulumi.Input<inputs.SecretStoreVaultApprole>;
    vaultApproleCertSsh?: pulumi.Input<inputs.SecretStoreVaultApproleCertSsh>;
    vaultApproleCertX509?: pulumi.Input<inputs.SecretStoreVaultApproleCertX509>;
    vaultAwsEc2?: pulumi.Input<inputs.SecretStoreVaultAwsEc2>;
    vaultAwsIam?: pulumi.Input<inputs.SecretStoreVaultAwsIam>;
    vaultTls?: pulumi.Input<inputs.SecretStoreVaultTls>;
    vaultTlsCertSsh?: pulumi.Input<inputs.SecretStoreVaultTlsCertSsh>;
    vaultTlsCertX509?: pulumi.Input<inputs.SecretStoreVaultTlsCertX509>;
    vaultToken?: pulumi.Input<inputs.SecretStoreVaultToken>;
    vaultTokenCertSsh?: pulumi.Input<inputs.SecretStoreVaultTokenCertSsh>;
    vaultTokenCertX509?: pulumi.Input<inputs.SecretStoreVaultTokenCertX509>;
}
