project

kiwicom/project/vault

Terraform Module HCL VAULT

Vault resources for Gitlab project.

Install
module "project" {
source = "kiwicom/project/vault"
version = "2.0.6"
}
plain text: /constructs/tfmod-kiwicom-project-vault/install.txt
⭐ Source on GitHub 📦 Registry page
README

terraform-vault-project Vault resources for Gitlab project. Runtime secrets - creates "use" and "maintainers" policies for the path kw/secret/[GITLAB_PATH]/runtime/ in this case: kw/secret/automation/granny/runtime/ with same name (eventually with -maintainers suffix for maintainer policy) - if runtime_maintainer_groups or maintainer_groups are specified they will get the runtime maintainer policy assigned - if runtime_use_groups is specified the groups will get "use" policy assigned - it usually does not make sense to assign policies here - we have special module for this - let's say the application will run in test-tom cluster in tom-based-app namespace, so we assign kw/secret/automation/granny/runtime to the namespace ``hcl module "project_automation_granny" { source = "kiwicom/project/

Inputs (13)
NameTypeDescriptionDefault
project_idstringGitLab project ID required
group_idstringGitLab project ID required
create_runtimestringShould be runtime policy createdtrue
runtime_use_groupslistUsually developers needs to access runtime secrets for development.[]
runtime_maintainer_groupslistYou can have different maintainers of Runtime and CICD secrets.[]
cicd_variable_prefixstringPrefix for Gitlab CICD variables"TF_VAR_VAULT_ENTERPRISE_"
main_module_switchstringAll resource creation is optional.true
cicd_use_groupslistUsually you do not want this. But you can allow some group to act as an CICD.[]
cicd_maintainer_groupslistYou can have different maintainers of Runtime and CICD secrets.[]
provided_rolesmapApp as secrets manager{}
bad_practice_cicd_static_pathstringShould be CICD policies and resources created - mostly bad practicefalse
maintainer_groupslistWhom to assign permissions to manage Runtime and CICD secrets[]
cicd_additional_policieslistAdditional policies to assign to CICD of the project[]
Outputs (3)
roles_policies
cicd_role_id
cicd_secret_id
Resources (6)
gitlab_group_variablegitlab_project_variablevault_approle_auth_backend_rolevault_approle_auth_backend_role_secret_idvault_identity_group_policiesvault_policy
Details
FrameworkTerraform Module
LanguageHCL
Version2.0.6
Cloud VAULT
Total downloads15.6k
Inputs13
Outputs3
Resources6
Namespacekiwicom
Updated