secrets-engines

devops-rob/secrets-engines/vault

Terraform Module HCL VAULT

A Terraform module to enable and configure HashiCorp Vault Secrets Engines

Install
module "secrets-engines" {
source = "devops-rob/secrets-engines/vault"
version = "0.1.2"
}
plain text: /constructs/tfmod-devops-rob-secrets-engines-vault/install.txt
⭐ Source on GitHub 📦 Registry page
README

Terraform Module: Vault Secrets Engine A Terraform module to enable and configure Vault secrets engines. Overview ![](images/secrets_engines.png) This module supports the following Vault Secrets Engines: - AWS - Azure - GCP - Consul - Transit - Database - PKI - SSH - RabbitMQ Requirements This module requires Terraform version 0.13.0 or newer and an accessible Vault instance. The Vault token used by Terraform will need the following Vault policy: `` shell script path "sys/mount*" { capabilities = ["create","read","update","delete","list"] } ` Usage `shell script module "secrets_engines" { source = "github.com/devops-rob/terraform-vault-secrets-engines" secrets_engines = [ "aws", "consul" ] # AWS config aws_backend_role_name = "test" aws_iam_groups = ["test"] # Consul config consul_token =

Inputs (50)
NameTypeDescriptionDefault
hana_root_rotation_statementslist(string)A list of database statements to be executed to rotate the root user's credentia required
mysql_allowed_roleslist(string)A list of roles that are allowed to use this connection. required
mysql_root_rotation_statementslist(string)A list of database statements to be executed to rotate the root user's credentia required
ssh_key_id_formatstringSpecifies a custom format for the key id of a signed certificate. required
azure_app_idstringApplication Object ID for an existing service principal that will be used instea required
cassandra_pem_bundlestringConcatenated PEM blocks configuring the certificate chain. required
mssql_allowed_roleslist(string)A list of roles that are allowed to use this connection. required
gcp_credentialsstringThe GCP service account credentials in JSON format. required
gcp_projectstringName of the GCP project that this roleset's service account will belong to. required
rabbitmq_usernamestringUsername for RabbitMQ instance. required
ssh_cidr_liststringThe comma-separated string of CIDR blocks for which this role is applicable. required
aws_policy_arnslist(string)List of AWS managed policy ARNs. The behavior depends on the credential type. Wi required
elasticsearch_allowed_roleslist(string)A list of roles that are allowed to use this connection. required
cassandra_seal_wrappingboolEnable seal wrapping for the DB secrets engine for cassandra.true
hana_max_idle_connectionsnumberThe maximum number of idle connections to maintain.360
rabbitmq_default_ttlnumberDefault TTL for RabbitMQ.3600
rabbitmq_configure_permissionsstringList of resources to grant configure permissions to.""
max_leasenumberMaximum lease for all secrets engines3600
cassandra_insecure_tlsboolWhether to skip verification of the server certificate when using TLS.true
pki_backend_mapslist(object({ path A list of PKI objects.[]
postgresql_external_entropy_accessboolBoolean flag that can be explicitly set to true to enable the secrets engine to true
ssh_allow_subdomainsboolSpecifies if host certificates that are requested are allowed to be subdomains otrue
azure_environmentstringThe Azure cloud environment to use."AzurePublicCloud"
postgresql_seal_wrappingboolEnable seal wrapping for the DB secrets engine for postgresql.true
rabbitmq_uristringConnection URI for RabbitMQ instance"http://localhost:15672"
default_leasenumberDefault lease for all secrets engines3600
seal_wrapboolEnable seal wrapping for secrets enginestrue
elasticsearch_seal_wrappingboolEnable seal wrapping for the DB secrets engine for elasticsearch.true
hana_verify_connectionboolWhether the connection should be verified on initial configuration or not.false
mongodb_max_connection_lifetimenumberThe maximum number of seconds to keep a connection alive for.360
mssql_max_open_connectionsnumberThe maximum number of open connections to use.360
mysql_pathstringVault path where the Database secrets engine for mysql will be mounted."mysql"
external_entropy_accessboolBoolean flag that can be explicitly set to true to enable the secrets engine to false
… and 10 more inputs
Outputs (10)
gcp_role_set_service_account_email
cassandra_mount_accessor
mongodb_mount_accessor
mssql_mount_accessor
postgresql_mount_accessor
elasticsearch_mount_accessor
ssh_mount_accessor
hana_mount_accessor
mysql_mount_accessor
oracle_mount_accessor
Resources (21)
vault_aws_secret_backendvault_aws_secret_backend_rolevault_azure_secret_backendvault_azure_secret_backend_rolevault_consul_secret_backendvault_consul_secret_backend_rolevault_database_secret_backend_connectionvault_database_secret_backend_rolevault_database_secret_backend_static_rolevault_gcp_secret_backendvault_gcp_secret_rolesetvault_mountvault_pki_secret_backend_config_cavault_pki_secret_backend_config_urlsvault_pki_secret_backend_rolevault_rabbitmq_secret_backendvault_rabbitmq_secret_backend_rolevault_ssh_secret_backend_cavault_ssh_secret_backend_rolevault_transit_secret_backend_keyvault_transit_secret_cache_config
Details
FrameworkTerraform Module
LanguageHCL
Version0.1.2
Cloud VAULT
★ Stars6
Forks3
Total downloads798
Inputs50
Outputs10
Resources21
Examples12
LicenseApache-2.0
Namespacedevops-rob
Updated