Namespace Pulumi.Vault
Classes
Audit
Example Usage (file audit device)
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var test = new Vault.Audit("test", new Vault.AuditArgs
{
Options =
{
{ "file_path", "C:/temp/audit.txt" },
},
Type = "file",
});
}
}
Example Usage (socket audit device)
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var test = new Vault.Audit("test", new Vault.AuditArgs
{
Options =
{
{ "address", "127.0.0.1:8000" },
{ "description", "application x socket" },
{ "socket_type", "tcp" },
},
Path = "app_socket",
Type = "socket",
});
}
}
AuditArgs
AuditState
AuthBackend
Example Usage
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var example = new Vault.AuthBackend("example", new Vault.AuthBackendArgs
{
Tune = new Vault.Inputs.AuthBackendTuneArgs
{
ListingVisibility = "unauth",
MaxLeaseTtl = "90000s",
},
Type = "github",
});
}
}
AuthBackendArgs
AuthBackendState
CertAuthBackendRole
Provides a resource to create a role in an Cert auth backend within Vault.
Example Usage
using System.IO;
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var certAuthBackend = new Vault.AuthBackend("certAuthBackend", new Vault.AuthBackendArgs
{
Path = "cert",
Type = "cert",
});
var certCertAuthBackendRole = new Vault.CertAuthBackendRole("certCertAuthBackendRole", new Vault.CertAuthBackendRoleArgs
{
Certificate = File.ReadAllText("/path/to/certs/ca-cert.pem"),
Backend = certAuthBackend.Path,
AllowedNames =
{
"foo.example.org",
"baz.example.org",
},
TokenTtl = 300,
TokenMaxTtl = 600,
TokenPolicies =
{
"foo",
},
});
}
}
CertAuthBackendRoleArgs
CertAuthBackendRoleState
Config
Config.Types
Config.Types.AuthLogins
Config.Types.ClientAuths
Config.Types.Headers
EgpPolicy
Provides a resource to manage Endpoint Governing Policy (EGP) via Sentinel.
Note this feature is available only with Vault Enterprise.
Example Usage
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var allow_all = new Vault.EgpPolicy("allow-all", new Vault.EgpPolicyArgs
{
EnforcementLevel = "soft-mandatory",
Paths =
{
"*",
},
Policy = @"main = rule {
true
}
",
});
}
}
EgpPolicyArgs
EgpPolicyState
GetAuthBackend
GetAuthBackendArgs
GetAuthBackendResult
GetPolicyDocument
GetPolicyDocumentArgs
GetPolicyDocumentResult
MfaDuo
Provides a resource to manage Duo MFA.
Note this feature is available only with Vault Enterprise.
Example Usage
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var userpass = new Vault.AuthBackend("userpass", new Vault.AuthBackendArgs
{
Path = "userpass",
Type = "userpass",
});
var myDuo = new Vault.MfaDuo("myDuo", new Vault.MfaDuoArgs
{
ApiHostname = "api-2b5c39f5.duosecurity.com",
IntegrationKey = "BIACEUEAXI20BNWTEYXT",
MountAccessor = userpass.Accessor,
SecretKey = "8C7THtrIigh2rPZQMbguugt8IUftWhMRCOBzbuyz",
});
}
}
MfaDuoArgs
MfaDuoState
Mount
Example Usage
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var example = new Vault.Mount("example", new Vault.MountArgs
{
Description = "This is an example mount",
Path = "dummy",
Type = "generic",
});
}
}
MountArgs
MountState
Namespace
Provides a resource to manage Namespaces.
Note this feature is available only with Vault Enterprise.
Example Usage
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var ns1 = new Vault.Namespace("ns1", new Vault.NamespaceArgs
{
Path = "ns1",
});
}
}
NamespaceArgs
NamespaceState
Policy
Example Usage
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var example = new Vault.Policy("example", new Vault.PolicyArgs
{
Policy = @"path ""secret/my_app"" {
capabilities = [""write""]
}
",
});
}
}
PolicyArgs
PolicyState
Provider
The provider type for the vault package. By default, resources use package-wide configuration
settings, however an explicit Provider instance may be created and passed during resource
construction to achieve fine-grained programmatic control over provider settings. See the
documentation for more information.
ProviderArgs
RgpPolicy
Provides a resource to manage Role Governing Policy (RGP) via Sentinel.
Note this feature is available only with Vault Enterprise.
Example Usage
using Pulumi;
using Vault = Pulumi.Vault;
class MyStack : Stack
{
public MyStack()
{
var allow_all = new Vault.RgpPolicy("allow-all", new Vault.RgpPolicyArgs
{
EnforcementLevel = "soft-mandatory",
Policy = @"main = rule {
true
}
",
});
}
}