vault.gcp.SecretRoleset
Explore with Pulumi AI
Creates a Roleset in the GCP Secrets Engine for Vault.
Each Roleset is tied to a Service Account, and can have one or more bindings associated with it.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as std from "@pulumi/std";
import * as vault from "@pulumi/vault";
const project = "my-awesome-project";
const gcp = new vault.gcp.SecretBackend("gcp", {
    path: "gcp",
    credentials: std.file({
        input: "credentials.json",
    }).then(invoke => invoke.result),
});
const roleset = new vault.gcp.SecretRoleset("roleset", {
    backend: gcp.path,
    roleset: "project_viewer",
    secretType: "access_token",
    project: project,
    tokenScopes: ["https://www.googleapis.com/auth/cloud-platform"],
    bindings: [{
        resource: `//cloudresourcemanager.googleapis.com/projects/${project}`,
        roles: ["roles/viewer"],
    }],
});
import pulumi
import pulumi_std as std
import pulumi_vault as vault
project = "my-awesome-project"
gcp = vault.gcp.SecretBackend("gcp",
    path="gcp",
    credentials=std.file(input="credentials.json").result)
roleset = vault.gcp.SecretRoleset("roleset",
    backend=gcp.path,
    roleset="project_viewer",
    secret_type="access_token",
    project=project,
    token_scopes=["https://www.googleapis.com/auth/cloud-platform"],
    bindings=[{
        "resource": f"//cloudresourcemanager.googleapis.com/projects/{project}",
        "roles": ["roles/viewer"],
    }])
package main
import (
	"fmt"
	"github.com/pulumi/pulumi-std/sdk/go/std"
	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/gcp"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		project := "my-awesome-project"
		invokeFile, err := std.File(ctx, &std.FileArgs{
			Input: "credentials.json",
		}, nil)
		if err != nil {
			return err
		}
		gcp, err := gcp.NewSecretBackend(ctx, "gcp", &gcp.SecretBackendArgs{
			Path:        pulumi.String("gcp"),
			Credentials: pulumi.String(invokeFile.Result),
		})
		if err != nil {
			return err
		}
		_, err = gcp.NewSecretRoleset(ctx, "roleset", &gcp.SecretRolesetArgs{
			Backend:    gcp.Path,
			Roleset:    pulumi.String("project_viewer"),
			SecretType: pulumi.String("access_token"),
			Project:    pulumi.String(project),
			TokenScopes: pulumi.StringArray{
				pulumi.String("https://www.googleapis.com/auth/cloud-platform"),
			},
			Bindings: gcp.SecretRolesetBindingArray{
				&gcp.SecretRolesetBindingArgs{
					Resource: pulumi.Sprintf("//cloudresourcemanager.googleapis.com/projects/%v", project),
					Roles: pulumi.StringArray{
						pulumi.String("roles/viewer"),
					},
				},
			},
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Std = Pulumi.Std;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() => 
{
    var project = "my-awesome-project";
    var gcp = new Vault.Gcp.SecretBackend("gcp", new()
    {
        Path = "gcp",
        Credentials = Std.File.Invoke(new()
        {
            Input = "credentials.json",
        }).Apply(invoke => invoke.Result),
    });
    var roleset = new Vault.Gcp.SecretRoleset("roleset", new()
    {
        Backend = gcp.Path,
        Roleset = "project_viewer",
        SecretType = "access_token",
        Project = project,
        TokenScopes = new[]
        {
            "https://www.googleapis.com/auth/cloud-platform",
        },
        Bindings = new[]
        {
            new Vault.Gcp.Inputs.SecretRolesetBindingArgs
            {
                Resource = $"//cloudresourcemanager.googleapis.com/projects/{project}",
                Roles = new[]
                {
                    "roles/viewer",
                },
            },
        },
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.gcp.SecretBackend;
import com.pulumi.vault.gcp.SecretBackendArgs;
import com.pulumi.std.StdFunctions;
import com.pulumi.std.inputs.FileArgs;
import com.pulumi.vault.gcp.SecretRoleset;
import com.pulumi.vault.gcp.SecretRolesetArgs;
import com.pulumi.vault.gcp.inputs.SecretRolesetBindingArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        final var project = "my-awesome-project";
        var gcp = new SecretBackend("gcp", SecretBackendArgs.builder()
            .path("gcp")
            .credentials(StdFunctions.file(FileArgs.builder()
                .input("credentials.json")
                .build()).result())
            .build());
        var roleset = new SecretRoleset("roleset", SecretRolesetArgs.builder()
            .backend(gcp.path())
            .roleset("project_viewer")
            .secretType("access_token")
            .project(project)
            .tokenScopes("https://www.googleapis.com/auth/cloud-platform")
            .bindings(SecretRolesetBindingArgs.builder()
                .resource(String.format("//cloudresourcemanager.googleapis.com/projects/%s", project))
                .roles("roles/viewer")
                .build())
            .build());
    }
}
resources:
  gcp:
    type: vault:gcp:SecretBackend
    properties:
      path: gcp
      credentials:
        fn::invoke:
          function: std:file
          arguments:
            input: credentials.json
          return: result
  roleset:
    type: vault:gcp:SecretRoleset
    properties:
      backend: ${gcp.path}
      roleset: project_viewer
      secretType: access_token
      project: ${project}
      tokenScopes:
        - https://www.googleapis.com/auth/cloud-platform
      bindings:
        - resource: //cloudresourcemanager.googleapis.com/projects/${project}
          roles:
            - roles/viewer
variables:
  project: my-awesome-project
Create SecretRoleset Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecretRoleset(name: string, args: SecretRolesetArgs, opts?: CustomResourceOptions);@overload
def SecretRoleset(resource_name: str,
                  args: SecretRolesetArgs,
                  opts: Optional[ResourceOptions] = None)
@overload
def SecretRoleset(resource_name: str,
                  opts: Optional[ResourceOptions] = None,
                  backend: Optional[str] = None,
                  bindings: Optional[Sequence[SecretRolesetBindingArgs]] = None,
                  project: Optional[str] = None,
                  roleset: Optional[str] = None,
                  namespace: Optional[str] = None,
                  secret_type: Optional[str] = None,
                  token_scopes: Optional[Sequence[str]] = None)func NewSecretRoleset(ctx *Context, name string, args SecretRolesetArgs, opts ...ResourceOption) (*SecretRoleset, error)public SecretRoleset(string name, SecretRolesetArgs args, CustomResourceOptions? opts = null)
public SecretRoleset(String name, SecretRolesetArgs args)
public SecretRoleset(String name, SecretRolesetArgs args, CustomResourceOptions options)
type: vault:gcp:SecretRoleset
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecretRolesetArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecretRolesetArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecretRolesetArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecretRolesetArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecretRolesetArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var secretRolesetResource = new Vault.Gcp.SecretRoleset("secretRolesetResource", new()
{
    Backend = "string",
    Bindings = new[]
    {
        new Vault.Gcp.Inputs.SecretRolesetBindingArgs
        {
            Resource = "string",
            Roles = new[]
            {
                "string",
            },
        },
    },
    Project = "string",
    Roleset = "string",
    Namespace = "string",
    SecretType = "string",
    TokenScopes = new[]
    {
        "string",
    },
});
example, err := gcp.NewSecretRoleset(ctx, "secretRolesetResource", &gcp.SecretRolesetArgs{
	Backend: pulumi.String("string"),
	Bindings: gcp.SecretRolesetBindingArray{
		&gcp.SecretRolesetBindingArgs{
			Resource: pulumi.String("string"),
			Roles: pulumi.StringArray{
				pulumi.String("string"),
			},
		},
	},
	Project:    pulumi.String("string"),
	Roleset:    pulumi.String("string"),
	Namespace:  pulumi.String("string"),
	SecretType: pulumi.String("string"),
	TokenScopes: pulumi.StringArray{
		pulumi.String("string"),
	},
})
var secretRolesetResource = new SecretRoleset("secretRolesetResource", SecretRolesetArgs.builder()
    .backend("string")
    .bindings(SecretRolesetBindingArgs.builder()
        .resource("string")
        .roles("string")
        .build())
    .project("string")
    .roleset("string")
    .namespace("string")
    .secretType("string")
    .tokenScopes("string")
    .build());
secret_roleset_resource = vault.gcp.SecretRoleset("secretRolesetResource",
    backend="string",
    bindings=[{
        "resource": "string",
        "roles": ["string"],
    }],
    project="string",
    roleset="string",
    namespace="string",
    secret_type="string",
    token_scopes=["string"])
const secretRolesetResource = new vault.gcp.SecretRoleset("secretRolesetResource", {
    backend: "string",
    bindings: [{
        resource: "string",
        roles: ["string"],
    }],
    project: "string",
    roleset: "string",
    namespace: "string",
    secretType: "string",
    tokenScopes: ["string"],
});
type: vault:gcp:SecretRoleset
properties:
    backend: string
    bindings:
        - resource: string
          roles:
            - string
    namespace: string
    project: string
    roleset: string
    secretType: string
    tokenScopes:
        - string
SecretRoleset Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecretRoleset resource accepts the following input properties:
- Backend string
- Path where the GCP Secrets Engine is mounted
- Bindings
List<SecretRoleset Binding> 
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- Project string
- Name of the GCP project that this roleset's service account will belong to.
- Roleset string
- Name of the Roleset to create
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- SecretType string
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- TokenScopes List<string>
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
- Backend string
- Path where the GCP Secrets Engine is mounted
- Bindings
[]SecretRoleset Binding Args 
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- Project string
- Name of the GCP project that this roleset's service account will belong to.
- Roleset string
- Name of the Roleset to create
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- SecretType string
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- TokenScopes []string
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
- backend String
- Path where the GCP Secrets Engine is mounted
- bindings
List<SecretRoleset Binding> 
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- project String
- Name of the GCP project that this roleset's service account will belong to.
- roleset String
- Name of the Roleset to create
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- secretType String
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- tokenScopes List<String>
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
- backend string
- Path where the GCP Secrets Engine is mounted
- bindings
SecretRoleset Binding[] 
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- project string
- Name of the GCP project that this roleset's service account will belong to.
- roleset string
- Name of the Roleset to create
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- secretType string
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- tokenScopes string[]
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
- backend str
- Path where the GCP Secrets Engine is mounted
- bindings
Sequence[SecretRoleset Binding Args] 
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- project str
- Name of the GCP project that this roleset's service account will belong to.
- roleset str
- Name of the Roleset to create
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- secret_type str
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- token_scopes Sequence[str]
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
- backend String
- Path where the GCP Secrets Engine is mounted
- bindings List<Property Map>
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- project String
- Name of the GCP project that this roleset's service account will belong to.
- roleset String
- Name of the Roleset to create
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- secretType String
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- tokenScopes List<String>
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
Outputs
All input properties are implicitly available as output properties. Additionally, the SecretRoleset resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- ServiceAccount stringEmail 
- Email of the service account created by Vault for this Roleset.
- Id string
- The provider-assigned unique ID for this managed resource.
- ServiceAccount stringEmail 
- Email of the service account created by Vault for this Roleset.
- id String
- The provider-assigned unique ID for this managed resource.
- serviceAccount StringEmail 
- Email of the service account created by Vault for this Roleset.
- id string
- The provider-assigned unique ID for this managed resource.
- serviceAccount stringEmail 
- Email of the service account created by Vault for this Roleset.
- id str
- The provider-assigned unique ID for this managed resource.
- service_account_ stremail 
- Email of the service account created by Vault for this Roleset.
- id String
- The provider-assigned unique ID for this managed resource.
- serviceAccount StringEmail 
- Email of the service account created by Vault for this Roleset.
Look up Existing SecretRoleset Resource
Get an existing SecretRoleset resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecretRolesetState, opts?: CustomResourceOptions): SecretRoleset@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        backend: Optional[str] = None,
        bindings: Optional[Sequence[SecretRolesetBindingArgs]] = None,
        namespace: Optional[str] = None,
        project: Optional[str] = None,
        roleset: Optional[str] = None,
        secret_type: Optional[str] = None,
        service_account_email: Optional[str] = None,
        token_scopes: Optional[Sequence[str]] = None) -> SecretRolesetfunc GetSecretRoleset(ctx *Context, name string, id IDInput, state *SecretRolesetState, opts ...ResourceOption) (*SecretRoleset, error)public static SecretRoleset Get(string name, Input<string> id, SecretRolesetState? state, CustomResourceOptions? opts = null)public static SecretRoleset get(String name, Output<String> id, SecretRolesetState state, CustomResourceOptions options)resources:  _:    type: vault:gcp:SecretRoleset    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Backend string
- Path where the GCP Secrets Engine is mounted
- Bindings
List<SecretRoleset Binding> 
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Project string
- Name of the GCP project that this roleset's service account will belong to.
- Roleset string
- Name of the Roleset to create
- SecretType string
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- ServiceAccount stringEmail 
- Email of the service account created by Vault for this Roleset.
- TokenScopes List<string>
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
- Backend string
- Path where the GCP Secrets Engine is mounted
- Bindings
[]SecretRoleset Binding Args 
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Project string
- Name of the GCP project that this roleset's service account will belong to.
- Roleset string
- Name of the Roleset to create
- SecretType string
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- ServiceAccount stringEmail 
- Email of the service account created by Vault for this Roleset.
- TokenScopes []string
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
- backend String
- Path where the GCP Secrets Engine is mounted
- bindings
List<SecretRoleset Binding> 
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- project String
- Name of the GCP project that this roleset's service account will belong to.
- roleset String
- Name of the Roleset to create
- secretType String
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- serviceAccount StringEmail 
- Email of the service account created by Vault for this Roleset.
- tokenScopes List<String>
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
- backend string
- Path where the GCP Secrets Engine is mounted
- bindings
SecretRoleset Binding[] 
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- project string
- Name of the GCP project that this roleset's service account will belong to.
- roleset string
- Name of the Roleset to create
- secretType string
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- serviceAccount stringEmail 
- Email of the service account created by Vault for this Roleset.
- tokenScopes string[]
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
- backend str
- Path where the GCP Secrets Engine is mounted
- bindings
Sequence[SecretRoleset Binding Args] 
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- project str
- Name of the GCP project that this roleset's service account will belong to.
- roleset str
- Name of the Roleset to create
- secret_type str
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- service_account_ stremail 
- Email of the service account created by Vault for this Roleset.
- token_scopes Sequence[str]
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
- backend String
- Path where the GCP Secrets Engine is mounted
- bindings List<Property Map>
- Bindings to create for this roleset. This can be specified multiple times for multiple bindings. Structure is documented below.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- project String
- Name of the GCP project that this roleset's service account will belong to.
- roleset String
- Name of the Roleset to create
- secretType String
- Type of secret generated for this role set. Accepted values: access_token,service_account_key. Defaults toaccess_token.
- serviceAccount StringEmail 
- Email of the service account created by Vault for this Roleset.
- tokenScopes List<String>
- List of OAuth scopes to assign to access_tokensecrets generated under this role set (access_tokenrole sets only).
Supporting Types
SecretRolesetBinding, SecretRolesetBindingArgs      
- Resource string
- Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different formats.
- Roles List<string>
- List of GCP IAM roles for the resource.
- Resource string
- Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different formats.
- Roles []string
- List of GCP IAM roles for the resource.
- resource String
- Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different formats.
- roles List<String>
- List of GCP IAM roles for the resource.
- resource string
- Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different formats.
- roles string[]
- List of GCP IAM roles for the resource.
- resource str
- Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different formats.
- roles Sequence[str]
- List of GCP IAM roles for the resource.
- resource String
- Resource or resource path for which IAM policy information will be bound. The resource path may be specified in a few different formats.
- roles List<String>
- List of GCP IAM roles for the resource.
Import
A roleset can be imported using its Vault Path. For example, referencing the example above,
$ pulumi import vault:gcp/secretRoleset:SecretRoleset roleset gcp/roleset/project_viewer
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the vaultTerraform Provider.