pulumi-vault


Namepulumi-vault JSON
Version 6.4.0 PyPI version JSON
download
home_pageNone
SummaryA Pulumi package for creating and managing HashiCorp Vault cloud resources.
upload_time2024-11-20 11:26:53
maintainerNone
docs_urlNone
authorNone
requires_python>=3.8
licenseApache-2.0
keywords pulumi vault
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            [![Build Status](https://travis-ci.com/pulumi/pulumi-vault.svg?token=eHg7Zp5zdDDJfTjY8ejq&branch=master)](https://travis-ci.com/pulumi/pulumi-vault)

# Hashicorp Vault Resource Provider

The Vault resource provider for Pulumi lets you manage Vault resources in your cloud programs. To use
this package, please [install the Pulumi CLI first](https://pulumi.io/).

## Installing

This package is available in many languages in the standard packaging formats.

### Node.js (Java/TypeScript)

To use from JavaScript or TypeScript in Node.js, install using either `npm`:

    $ npm install @pulumi/vault

or `yarn`:

    $ yarn add @pulumi/vault

### Python

To use from Python, install using `pip`:

    $ pip install pulumi_vault

### Go

To use from Go, use `go get` to grab the latest version of the library

    $ go get github.com/pulumi/pulumi-vault/sdk/v6

### .NET

To use from .NET, install using `dotnet add package`:

    $ dotnet add package Pulumi.Vault

## Configuration

The following configuration points are available:

- `vault:address` - (Required) Origin URL of the Vault server. This is a URL with a scheme, a hostname and a port but with no path.
  May be set via the `VAULT_ADDR` environment variable.
- `vault:token` - (Required) Vault token that will be used by the provider to authenticate. May be set via the `VAULT_TOKEN`
  environment variable. If none is otherwise supplied, the provider will attempt to read it from ~/.vault-token (where the vault
  command stores its current token). The provider will issue itself a new token that is a child of the one given, with a short TTL
  to limit the exposure of any requested secrets. Note that the given token must have the update capability on the `auth/token/create`
  path in Vault in order to create child tokens.
- `vault:tokenName` - (Optional) Token name to use for creating the Vault child token. May be set via the `VAULT_TOKEN_NAME`
  environment variable. 
- `vault:ca_cert_file` - (Optional) Path to a file on local disk that will be used to validate the certificate presented by
  the Vault server. May be set via the `VAULT_CACERT` environment variable.
- `vault:ca_cert_dir` - (Optional) Path to a directory on local disk that contains one or more certificate files that will
  be used to validate the certificate presented by the Vault server. May be set via the `VAULT_CAPATH` environment variable.
- `vault:client_auth` - (Optional) A configuration block, described below, that provides credentials used by the provider
  to authenticate with the Vault server. At present there is little reason to set this, because the provider does not 
  support the TLS certificate authentication mechanism.
    - `vault:cert_file` - (Required) Path to a file on local disk that contains the PEM-encoded certificate to present to the server.
    - `vault:key_file` - (Required) Path to a file on local disk that contains the PEM-encoded private key for which the 
    authentication certificate was issued.
- `vault:skip_tls_verify` - (Optional) Set this to true to disable verification of the Vault server's TLS certificate. This
  is strongly discouraged except in prototype or development environments, since it exposes the possibility that the provider
  can be tricked into writing secrets to a server controlled by an intruder. May be set via the `VAULT_SKIP_VERIFY` environment variable.
- `vault:max_lease_ttl_seconds` - (Optional) Used as the duration for the intermediate Vault token the provider issues itself,
  which in turn limits the duration of secret leases issued by Vault. Defaults to `20` minutes and may be set via the 
  `TERRAFORM_VAULT_MAX_TTL` environment variable. See the section above on Using Vault credentials in the provider configuration
  for the implications of this setting.
- `vault:max_retries` - (Optional) Used as the maximum number of retries when a 5xx error code is encountered. Defaults to `2`
  retries and may be set via the VAULT_MAX_RETRIES environment variable.
- `vault:namespace` - (Optional) Set the namespace to use. May be set via the `VAULT_NAMESPACE` environment variable. Available
  only for Vault Enterprise.

## Reference

For further information, please visit [the Vault provider docs](https://www.pulumi.com/docs/intro/cloud-providers/vault) or for detailed reference documentation, please visit [the API docs](https://www.pulumi.com/docs/reference/pkg/vault).

            

Raw data

            {
    "_id": null,
    "home_page": null,
    "name": "pulumi-vault",
    "maintainer": null,
    "docs_url": null,
    "requires_python": ">=3.8",
    "maintainer_email": null,
    "keywords": "pulumi, vault",
    "author": null,
    "author_email": null,
    "download_url": "https://files.pythonhosted.org/packages/40/b9/d46ebcf1466908902535a00d08f121012ef53c20e33b08f72736187245aa/pulumi_vault-6.4.0.tar.gz",
    "platform": null,
    "description": "[![Build Status](https://travis-ci.com/pulumi/pulumi-vault.svg?token=eHg7Zp5zdDDJfTjY8ejq&branch=master)](https://travis-ci.com/pulumi/pulumi-vault)\n\n# Hashicorp Vault Resource Provider\n\nThe Vault resource provider for Pulumi lets you manage Vault resources in your cloud programs. To use\nthis package, please [install the Pulumi CLI first](https://pulumi.io/).\n\n## Installing\n\nThis package is available in many languages in the standard packaging formats.\n\n### Node.js (Java/TypeScript)\n\nTo use from JavaScript or TypeScript in Node.js, install using either `npm`:\n\n    $ npm install @pulumi/vault\n\nor `yarn`:\n\n    $ yarn add @pulumi/vault\n\n### Python\n\nTo use from Python, install using `pip`:\n\n    $ pip install pulumi_vault\n\n### Go\n\nTo use from Go, use `go get` to grab the latest version of the library\n\n    $ go get github.com/pulumi/pulumi-vault/sdk/v6\n\n### .NET\n\nTo use from .NET, install using `dotnet add package`:\n\n    $ dotnet add package Pulumi.Vault\n\n## Configuration\n\nThe following configuration points are available:\n\n- `vault:address` - (Required) Origin URL of the Vault server. This is a URL with a scheme, a hostname and a port but with no path.\n  May be set via the `VAULT_ADDR` environment variable.\n- `vault:token` - (Required) Vault token that will be used by the provider to authenticate. May be set via the `VAULT_TOKEN`\n  environment variable. If none is otherwise supplied, the provider will attempt to read it from ~/.vault-token (where the vault\n  command stores its current token). The provider will issue itself a new token that is a child of the one given, with a short TTL\n  to limit the exposure of any requested secrets. Note that the given token must have the update capability on the `auth/token/create`\n  path in Vault in order to create child tokens.\n- `vault:tokenName` - (Optional) Token name to use for creating the Vault child token. May be set via the `VAULT_TOKEN_NAME`\n  environment variable. \n- `vault:ca_cert_file` - (Optional) Path to a file on local disk that will be used to validate the certificate presented by\n  the Vault server. May be set via the `VAULT_CACERT` environment variable.\n- `vault:ca_cert_dir` - (Optional) Path to a directory on local disk that contains one or more certificate files that will\n  be used to validate the certificate presented by the Vault server. May be set via the `VAULT_CAPATH` environment variable.\n- `vault:client_auth` - (Optional) A configuration block, described below, that provides credentials used by the provider\n  to authenticate with the Vault server. At present there is little reason to set this, because the provider does not \n  support the TLS certificate authentication mechanism.\n    - `vault:cert_file` - (Required) Path to a file on local disk that contains the PEM-encoded certificate to present to the server.\n    - `vault:key_file` - (Required) Path to a file on local disk that contains the PEM-encoded private key for which the \n    authentication certificate was issued.\n- `vault:skip_tls_verify` - (Optional) Set this to true to disable verification of the Vault server's TLS certificate. This\n  is strongly discouraged except in prototype or development environments, since it exposes the possibility that the provider\n  can be tricked into writing secrets to a server controlled by an intruder. May be set via the `VAULT_SKIP_VERIFY` environment variable.\n- `vault:max_lease_ttl_seconds` - (Optional) Used as the duration for the intermediate Vault token the provider issues itself,\n  which in turn limits the duration of secret leases issued by Vault. Defaults to `20` minutes and may be set via the \n  `TERRAFORM_VAULT_MAX_TTL` environment variable. See the section above on Using Vault credentials in the provider configuration\n  for the implications of this setting.\n- `vault:max_retries` - (Optional) Used as the maximum number of retries when a 5xx error code is encountered. Defaults to `2`\n  retries and may be set via the VAULT_MAX_RETRIES environment variable.\n- `vault:namespace` - (Optional) Set the namespace to use. May be set via the `VAULT_NAMESPACE` environment variable. Available\n  only for Vault Enterprise.\n\n## Reference\n\nFor further information, please visit [the Vault provider docs](https://www.pulumi.com/docs/intro/cloud-providers/vault) or for detailed reference documentation, please visit [the API docs](https://www.pulumi.com/docs/reference/pkg/vault).\n",
    "bugtrack_url": null,
    "license": "Apache-2.0",
    "summary": "A Pulumi package for creating and managing HashiCorp Vault cloud resources.",
    "version": "6.4.0",
    "project_urls": {
        "Homepage": "https://pulumi.io",
        "Repository": "https://github.com/pulumi/pulumi-vault"
    },
    "split_keywords": [
        "pulumi",
        " vault"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "59254710b88716861cabeb985685da4f47df97ac4c59f3fed0457b7fe5555cb4",
                "md5": "f463039f3d785a484eee44c2ee2ba29f",
                "sha256": "a65d8b36eac385be0da7e31f37ac85c62796a517aca0203d5d7910826dac0cad"
            },
            "downloads": -1,
            "filename": "pulumi_vault-6.4.0-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "f463039f3d785a484eee44c2ee2ba29f",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": ">=3.8",
            "size": 743239,
            "upload_time": "2024-11-20T11:26:51",
            "upload_time_iso_8601": "2024-11-20T11:26:51.520984Z",
            "url": "https://files.pythonhosted.org/packages/59/25/4710b88716861cabeb985685da4f47df97ac4c59f3fed0457b7fe5555cb4/pulumi_vault-6.4.0-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "40b9d46ebcf1466908902535a00d08f121012ef53c20e33b08f72736187245aa",
                "md5": "4d49fe223006987d39f6d184fbd00362",
                "sha256": "81226ab5e800ef49ee61c8b038d6bdc4829aa6200dbc53d2399f9a02e76d8cb6"
            },
            "downloads": -1,
            "filename": "pulumi_vault-6.4.0.tar.gz",
            "has_sig": false,
            "md5_digest": "4d49fe223006987d39f6d184fbd00362",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": ">=3.8",
            "size": 493103,
            "upload_time": "2024-11-20T11:26:53",
            "upload_time_iso_8601": "2024-11-20T11:26:53.320920Z",
            "url": "https://files.pythonhosted.org/packages/40/b9/d46ebcf1466908902535a00d08f121012ef53c20e33b08f72736187245aa/pulumi_vault-6.4.0.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-11-20 11:26:53",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "pulumi",
    "github_project": "pulumi-vault",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": true,
    "lcname": "pulumi-vault"
}
        
Elapsed time: 0.47525s