SlugEnt.VaultAgent
1.2.1
See the version list below for details.
dotnet add package SlugEnt.VaultAgent --version 1.2.1
NuGet\Install-Package SlugEnt.VaultAgent -Version 1.2.1
<PackageReference Include="SlugEnt.VaultAgent" Version="1.2.1" />
paket add SlugEnt.VaultAgent --version 1.2.1
#r "nuget: SlugEnt.VaultAgent, 1.2.1"
// Install SlugEnt.VaultAgent as a Cake Addin #addin nuget:?package=SlugEnt.VaultAgent&version=1.2.1 // Install SlugEnt.VaultAgent as a Cake Tool #tool nuget:?package=SlugEnt.VaultAgent&version=1.2.1
VaultAgent
VaultAgent is a C# library that provides an opinionated access to the HashiCorp Vault API Interface. It has extensive unit tests for each of the implemented API methods and backends as well as robust error handling and plenty of documentation. C# classes that map to JSON objects are always used to return information to the caller.
It has been Unit tested against Vault version 1.11.1 (Latest as of July 2022).
Release Notes
Version 1.2
- ListSecrets methods replaced with a single method --> ListSecrets
- ListSecrets functionality is now controled by a KV2ListSecretSettings object
- ListSecrets has ability to return an entire tree hierarchy of secrets, full path names, Just parent secrets or just child secrets and more
- DeleteSecrets now will fully traverse the requested secrets tree and delete all child secrets. This is the only way in vault to ensure a secret with children is deleted.
Implemented Functionality
This library implements several key parts of vault
System Backend
- Mounts - Fully Implemented
- Auth - Fully Implemented
- Audit - (Partial - no hash)
- Capabilities (Partial)
- Policy / Policies - Fully Implemented
App Role Backend (95% implemented, just a couple of the accessor and other minor functions not implemented.)
LDAP Auth Backend (85%)
- Login - Implemented
- Group To Policy Mapping - Implemented
- Save / Read LDAP Engine Config - Implemented
- Some user methods implemented Mainly missing delete group method
Token Auth Backend (95%)
- All important methods and most informational methods implemented.
Identity Secret Engine (60%)
- All Entity and Entity Alias methods implemented
- Missing Group information.
KeyValue V2 (100%)
- Fully implemented.
KeyValue V1 (90%)
Transit (90%)
Next Steps
- Finish the LDAP and Identity backends.
Usage
To test the library you will need to have a local instance of the Vault binary installed somewhere. In the Solution Folder there is a RunVaultDev.bat script that you can use as a sample for starting your own Vault instance up. Both the Unit Test and the VaultClient sample require a Vault Instance with the following configuration.
- IP Address: 127.0.0.1
- Port: 16100
- Root Token: tokenA
The RunVaultDev.bat file will automatically start a development instance of Vault up with the above settings. These Vault Settings are hardcoded in 2 places in the test/sample projects:
- VaultClient - VaultClient_Main
- VaultAgent.Test - VaultServerSetup.cs:InitTestingSetup
VaultClient
At the moment this pretty much needs to be re-written with some real samples. At the present it is wired for an Active Directory Login and thus nothing will work without this.
This needs to be replaced.
The Transit samples work
#!CSharp
// The following are all examples of use
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net7.0 is compatible. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net7.0
- Newtonsoft.Json (>= 13.0.3)
- SlugEnt.TimeUnit (>= 2.0.0)
- System.Collections.Specialized (>= 4.3.0)
NuGet packages
This package is not used by any NuGet packages.
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
1.3.0 | 196 | 4/3/2024 |
1.2.1 | 221 | 7/5/2023 |
1.2.0 | 438 | 7/23/2022 |
1.2.0-alpha-0001b | 180 | 7/9/2022 |
1.2.0-alpha-0000 | 231 | 10/23/2021 |
1.1.0 | 502 | 3/30/2021 |
1.0.0 | 445 | 8/28/2020 |
1.0.0-rc-243 | 385 | 8/14/2020 |
1.0.0-rc-242 | 407 | 8/1/2020 |
1.0.0-rc-241 | 330 | 7/31/2020 |
1.0.0-rc-239 | 331 | 7/30/2020 |
1.0.0-rc-237 | 442 | 7/25/2020 |
1.0.0-rc-235 | 332 | 7/2/2020 |
1.0.0-rc-233 | 293 | 7/2/2020 |
1.0.0-rc-232 | 338 | 7/2/2020 |
1.0.0-rc-231 | 311 | 6/24/2020 |
1.0.0-rc-227 | 407 | 6/23/2020 |
1.0.0-rc-224 | 339 | 6/23/2020 |
1.0.0-rc-219 | 368 | 6/23/2020 |
1.0.0-rc-218 | 360 | 6/23/2020 |
1.0.0-rc-216 | 399 | 6/22/2020 |
1.0.0-rc-213 | 350 | 6/4/2020 |
1.0.0-rc-212 | 338 | 6/1/2020 |
1.0.0-rc-210 | 327 | 6/1/2020 |
1.0.0-rc-209 | 355 | 5/5/2020 |
1.0.0-rc-208 | 362 | 4/30/2020 |
1.0.0-rc-205 | 328 | 4/26/2020 |
1.0.0-rc-201 | 312 | 4/22/2020 |
1.0.0-rc-187 | 327 | 4/20/2020 |
1.0.0-rc-186 | 348 | 4/16/2020 |
1.0.0-rc-183 | 326 | 4/15/2020 |
1.0.0-rc-181 | 350 | 4/1/2020 |
1.0.0-rc-172 | 351 | 4/1/2020 |
1.0.0-rc-167 | 353 | 4/1/2020 |
1.0.0-rc-164 | 372 | 3/11/2020 |
1.0.0-rc-126 | 321 | 3/6/2020 |
1.0.0-rc-124 | 467 | 2/1/2020 |
1.0.0-rc-118 | 414 | 1/31/2020 |
1.0.0-rc-114 | 371 | 1/30/2020 |
1.0.0-rc-113 | 374 | 1/28/2020 |
1.0.0-rc-112 | 367 | 1/28/2020 |
1.0.0-rc-110 | 402 | 1/27/2020 |
1.0.0-rc-103 | 445 | 1/26/2020 |
1.0.0-rc-01 | 504 | 1/19/2020 |
0.1.0 | 905 | 1/14/2019 |
Supports Token, LDAP, AppRole, System, Transit, Identity, Keyvalue1 and KeyValue2 backends.