Skip to content

A Terraform module to enable and configure HashiCorp Vault Secrets Engines

License

Notifications You must be signed in to change notification settings

devops-rob/terraform-vault-secrets-engines

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Terraform Module: Vault Secrets Engine

A Terraform module to enable and configure Vault secrets engines.

Overview

This module supports the following Vault Secrets Engines:

  • AWS
  • Azure
  • GCP
  • Consul
  • Transit
  • Database
  • PKI
  • SSH
  • RabbitMQ

Requirements

This module requires Terraform version 0.13.0 or newer and an accessible Vault instance.

The Vault token used by Terraform will need the following Vault policy:

path "sys/mount*" {
  capabilities = ["create","read","update","delete","list"]
}

Usage

module "secrets_engines" {
  source = "github.com/devops-rob/terraform-vault-secrets-engines"

  secrets_engines = [
    "aws",
    "consul"
  ] 

  # AWS config
  aws_backend_role_name = "test"
  aws_iam_groups        = ["test"]
  
  # Consul config
  consul_token             = "acl-token"
  consul_backend_role_name = "test"

  consul_policies = [
    "test-policy",
    "test-policy-2"
  ]
}

License

Licensed under the Apache License, Version 2.0 (the "License").

You may obtain a copy of the License at apache.org/licenses/LICENSE-2.0.

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" basis, without WARRANTIES or conditions of any kind, either express or implied.

See the License for the specific language governing permissions and limitations under the License.

About

A Terraform module to enable and configure HashiCorp Vault Secrets Engines

Resources

License

Stars

Watchers

Forks

Packages

No packages published