pulumi-esc
专注于Pulumi ESC(环境、密钥和配置),提供集中式服务来管理云基础设施和应用中的环境、密钥和配置。
npx skills add pulumi/agent-skills --skill pulumi-escBefore / After 效果对比
1 组在多个云环境和应用程序中,秘密(secrets)和配置分散在不同的文件中、环境变量或云服务中,管理复杂,容易出现配置漂移和安全漏洞。
通过Pulumi ESC技能,团队可以集中管理所有环境、秘密和配置。它允许通过导入和分层配置来组合环境,并通过OIDC生成动态凭证,显著提高了配置管理的效率、安全性和一致性。
description SKILL.md
pulumi-esc
Pulumi ESC (Environments, Secrets, and Configuration) Pulumi ESC is a centralized service for managing environments, secrets, and configuration across cloud infrastructure and applications. What is ESC? ESC enables teams to: Centralize secrets and configuration in one secure location Compose environments by importing and layering configuration Generate dynamic credentials via OIDC for AWS, Azure, GCP Integrate external secret stores (AWS Secrets Manager, Azure Key Vault, Vault, 1Password) Version and audit all configuration changes Control access with fine-grained RBAC Essential CLI Commands # Create a new environment pulumi env init // # Edit environment (opens in editor) pulumi env edit // # Set values pulumi env set // pulumi env set // --secret # View definition (secrets hidden) pulumi env get // # Open and resolve (reveals secrets) pulumi env open // # Run command with environment pulumi env run // -- # Link to Pulumi stack pulumi config env add / Key Concepts Command Distinctions pulumi env get: Shows static definition, secrets appear as [secret] pulumi env open: Resolves and reveals all values including secrets and dynamic credentials pulumi env run: Executes commands with environment variables loaded pulumi config env add: Only takes the / portion Environment Structure Environments are YAML documents with reserved top-level keys: imports: Import and compose other environments values: Define configuration and secrets Reserved sub-keys under values: environmentVariables: Map values to shell environment variables pulumiConfig: Configure Pulumi stack settings files: Generate files with environment data Basic Example imports: - common/base-config values: environment: production region: us-west-2 dbPassword: fn::secret: super-secure-password environmentVariables: AWS_REGION: ${region} DB_PASSWORD: ${dbPassword} pulumiConfig: aws:region: ${region} app:dbPassword: ${dbPassword} Working with the User For Simple Questions If the user asks basic questions like "How do I create an environment?" or "What's the difference between get and open?", answer directly using the information above. For Detailed Documentation When users need more information, use the web-fetch tool to get content from the official Pulumi ESC documentation: Complete YAML syntax and functions → https://www.pulumi.com/docs/esc/environments/syntax/ Provider integrations (AWS, Azure, GCP, Vault, 1Password): AWS: https://www.pulumi.com/docs/esc/integrations/dynamic-login-credentials/aws-login/ Azure: https://www.pulumi.com/docs/esc/integrations/dynamic-login-credentials/azure-login/ GCP: https://www.pulumi.com/docs/esc/integrations/dynamic-login-credentials/gcp-login/ Short-term credential (OIDC) providers: https://www.pulumi.com/docs/esc/integrations/dynamic-login-credentials/ Dynamic secret providers: https://www.pulumi.com/docs/esc/integrations/dynamic-secrets/ Getting started guide → https://www.pulumi.com/docs/esc/get-started/ CLI reference → https://www.pulumi.com/docs/esc/cli/commands/ Prefer using the pulumi env subcommands over esc CLI. Use the web-fetch tool with specific prompts to extract relevant information from these docs. For Complex Tasks When helping users: Understand the goal: Are they setting up new environments, migrating from stack config, or debugging? Check existing setup: Use pulumi env commands to list environments or read definitions Fetch relevant documentation: Use the web-fetch to get specific examples or syntax from the official docs Provide step-by-step guidance: Walk through the process with specific commands Validate: Help them test with pulumi env get or pulumi preview a. Only use pulumi env open when the full resolved values are needed, but use cautiously as it reveals secrets. Example: Helping with AWS OIDC Setup User: "How do I set up AWS OIDC credentials in ESC?" 1. Use the web-fetch tool to get AWS OIDC documentation from "https://www.pulumi.com/docs/esc/integrations/dynamic-login-credentials/aws-login/" 2. Provide the user with the configuration 3. Ask the user if they have a pre-defined role or need one created for them 4. Set up as much of the environment as possible, then guide them through any steps that you can't do for them 5. Help them test with pulumi env get or pulumi env open if necessary Common Workflows Creating an Environment pulumi env init my-org/my-project/dev-config # Edit environment (accepts new definition from a file, better for agents, more difficult for users) pulumi env edit --file /tmp/example.yml my-org/my-project/dev-config Linking to Stack pulumi config env add my-project/dev-config pulumi config # Verify environment values are accessible API Access (Rare) Always prefer CLI commands. Only use the API when absolutely necessary (e.g., bulk operations, automation). Available API endpoints include: GET /api/esc/environments/{orgName} - List environments GET /api/esc/environments/{orgName}/{projectName}/{envName} - Read environment definition GET /api/esc/providers?orgName={orgName} - List available providers Use call_pulumi_cloud_api() tool to make requests when needed. Best Practices Always use fn::secret for sensitive values Prefer OIDC over static keys Use descriptive names like /my-app/production-aws not /app/prod Layer environments: base → cloud-provider → stack-specific Verify that pulumi config shows expected values after linking an environment to a stack Prefer using pulumi env run for commands needing environment variables Only use pulumi env open when absolutely necessary, as it reveals secrets Quick Troubleshooting "Environment not found": Check permissions with pulumi env ls -o "Secret decryption failed": Use pulumi env open not pulumi env get "Stack can't read values": Verify pulumi config env ls to ensure the stack is listed. Ensure the environment is referenced only by the project-name/environment-name format. Get the specific environment definition with pulumi env get //. Verify the pulumiConfig key exists and is nested under the values key. Weekly Installs306Repositorypulumi/agent-skillsGitHub Stars28First SeenJan 28, 2026Security AuditsGen Agent Trust HubPassSocketPassSnykWarnInstalled onopencode262github-copilot259codex259gemini-cli250amp245kimi-cli244
forum用户评价 (0)
发表评价
暂无评价,来写第一条吧
统计数据
用户评分
为此 Skill 评分