Create a Hashicorp Vault secret-store context.
Secret-Store context are used during pipeline execution as API to resolve variables that are parse of Codefresh.
codefresh create context secret-store hashicorp-vault <name>
Option | Alias | Type | Default | Description |
---|---|---|---|---|
--sharing-policy | string | AccountAdmins | Set the sharing policy for secret-store context Possible values: - AccountAdmins - AllUsersInAccount |
|
--help | Print help information | |||
--behind-firewall | boolean | false | Set to true to mark this context with behind firewall flag | |
--api-url | -a | string | URL of the vault server. required |
|
--login-path | string | Path for given auth method. Leave out to use the default path for the type. | ||
--namespace | -n | string | Namespace is only valid for Vault Enterprise instances | |
--token | -t | string | Token | |
--username | -u | string | Username | |
--password | -p | string | Password | |
--role-id | -r | string | Role Id | |
--secret-id | -s | string | Secret Id | |
--gcp-role | string | GCP Role | ||
--kubernetes-role | string | Kubernetes Role | ||
--kubernetes-jwt | string | Kubernetes Role |