Skip to main content

A Pulumi package for creating and managing HashiCorp Vault cloud resources.

Project description

Build Status

Hashicorp Vault Resource Provider

The Vault resource provider for Pulumi lets you manage Vault resources in your cloud programs. To use this package, please install the Pulumi CLI first.

Installing

This package is available in many languages in the standard packaging formats.

Node.js (Java/TypeScript)

To use from JavaScript or TypeScript in Node.js, install using either npm:

$ npm install @pulumi/vault

or yarn:

$ yarn add @pulumi/vault

Python

To use from Python, install using pip:

$ pip install pulumi_vault

Go

To use from Go, use go get to grab the latest version of the library

$ go get github.com/pulumi/pulumi-vault/sdk/v6

.NET

To use from .NET, install using dotnet add package:

$ dotnet add package Pulumi.Vault

Configuration

The following configuration points are available:

  • vault:address - (Required) Origin URL of the Vault server. This is a URL with a scheme, a hostname and a port but with no path. May be set via the VAULT_ADDR environment variable.
  • vault:token - (Required) Vault token that will be used by the provider to authenticate. May be set via the VAULT_TOKEN environment variable. If none is otherwise supplied, the provider will attempt to read it from ~/.vault-token (where the vault command stores its current token). The provider will issue itself a new token that is a child of the one given, with a short TTL to limit the exposure of any requested secrets. Note that the given token must have the update capability on the auth/token/create path in Vault in order to create child tokens.
  • vault:tokenName - (Optional) Token name to use for creating the Vault child token. May be set via the VAULT_TOKEN_NAME environment variable.
  • vault:ca_cert_file - (Optional) Path to a file on local disk that will be used to validate the certificate presented by the Vault server. May be set via the VAULT_CACERT environment variable.
  • vault:ca_cert_dir - (Optional) Path to a directory on local disk that contains one or more certificate files that will be used to validate the certificate presented by the Vault server. May be set via the VAULT_CAPATH environment variable.
  • vault:client_auth - (Optional) A configuration block, described below, that provides credentials used by the provider to authenticate with the Vault server. At present there is little reason to set this, because the provider does not support the TLS certificate authentication mechanism.
    • vault:cert_file - (Required) Path to a file on local disk that contains the PEM-encoded certificate to present to the server.
    • vault:key_file - (Required) Path to a file on local disk that contains the PEM-encoded private key for which the authentication certificate was issued.
  • vault:skip_tls_verify - (Optional) Set this to true to disable verification of the Vault server's TLS certificate. This is strongly discouraged except in prototype or development environments, since it exposes the possibility that the provider can be tricked into writing secrets to a server controlled by an intruder. May be set via the VAULT_SKIP_VERIFY environment variable.
  • vault:max_lease_ttl_seconds - (Optional) Used as the duration for the intermediate Vault token the provider issues itself, which in turn limits the duration of secret leases issued by Vault. Defaults to 20 minutes and may be set via the TERRAFORM_VAULT_MAX_TTL environment variable. See the section above on Using Vault credentials in the provider configuration for the implications of this setting.
  • vault:max_retries - (Optional) Used as the maximum number of retries when a 5xx error code is encountered. Defaults to 2 retries and may be set via the VAULT_MAX_RETRIES environment variable.
  • vault:namespace - (Optional) Set the namespace to use. May be set via the VAULT_NAMESPACE environment variable. Available only for Vault Enterprise.

Reference

For further information, please visit the Vault provider docs or for detailed reference documentation, please visit the API docs.

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pulumi_vault-6.4.0.tar.gz (493.1 kB view details)

Uploaded Source

Built Distribution

pulumi_vault-6.4.0-py3-none-any.whl (743.2 kB view details)

Uploaded Python 3

File details

Details for the file pulumi_vault-6.4.0.tar.gz.

File metadata

  • Download URL: pulumi_vault-6.4.0.tar.gz
  • Upload date:
  • Size: 493.1 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.11.8

File hashes

Hashes for pulumi_vault-6.4.0.tar.gz
Algorithm Hash digest
SHA256 81226ab5e800ef49ee61c8b038d6bdc4829aa6200dbc53d2399f9a02e76d8cb6
MD5 4d49fe223006987d39f6d184fbd00362
BLAKE2b-256 40b9d46ebcf1466908902535a00d08f121012ef53c20e33b08f72736187245aa

See more details on using hashes here.

File details

Details for the file pulumi_vault-6.4.0-py3-none-any.whl.

File metadata

  • Download URL: pulumi_vault-6.4.0-py3-none-any.whl
  • Upload date:
  • Size: 743.2 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/5.1.1 CPython/3.11.8

File hashes

Hashes for pulumi_vault-6.4.0-py3-none-any.whl
Algorithm Hash digest
SHA256 a65d8b36eac385be0da7e31f37ac85c62796a517aca0203d5d7910826dac0cad
MD5 f463039f3d785a484eee44c2ee2ba29f
BLAKE2b-256 59254710b88716861cabeb985685da4f47df97ac4c59f3fed0457b7fe5555cb4

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page