1. Docs
  2. Pulumi Cloud
  3. Pulumi ESC
  4. Providers
  5. vault-login

vault-login

    The vault-login provider enables you to log in to HashiCorp Vault using OpenID Connect or by providing static credentials. The provider will return a set of credentials that can be used to fetch secrets using the vault-secrets provider.

    The namespaces functionality of Vault is not currently supported. More specifically, this configuration will only work for the root namespace. This means that this configuration will only work with Vault OSS at this time (Vault HCP and Enterprise are not supported).

    Example

      vault:
        login:
          fn::open::vault-login:
            address: https://127.0.0.1:8200/
            jwt:
              role: example-role
    

    Configuring OIDC

    To learn how to configure OpenID Connect (OIDC) between Pulumi Cloud and Vault, see the OpenID Connect integration documentation.

    Inputs

    PropertyTypeDescription
    addressstringThe URL of the Vault server. Must contain a scheme and hostname, but no path.
    jwtVaultLoginJWT[Optional] Options for JWT login. JWT login uses an OIDC token issued by the Pulumi Cloud to generate an ephemeral token.
    tokenVaultLoginToken[Optional] Options for token login. Token login creates an ephemeral child token.

    VaultLoginJWT

    PropertyTypeDescription
    rolestringThe name of the role to use for login.
    mountstring[Optional] - The name of the authentication engine mount. Defaults to jwt.

    VaultLoginToken

    PropertyTypeDescription
    tokenstringThe parent token.
    displayNamestring[Optional] - The display name of the ephemeral token. Defaults to ‘pulumi’.
    maxTtlstring[Optional] - The maximum TTL of the ephemeral token.

    Outputs

    PropertyTypeDescription
    addressstringThe URL of the vault server.
    tokenstringThe ephemeral token generated for the session.
      Pulumi AI - What cloud infrastructure would you like to build? Generate Program