https://github.com/telekom-mms/terraform-azurerm-key-vault
A Terraform module that manages the key-vault resources from the azurerm provider.
https://github.com/telekom-mms/terraform-azurerm-key-vault
azure azure-keyvault keyvault terraform terraform-module
Last synced: 2 months ago
JSON representation
A Terraform module that manages the key-vault resources from the azurerm provider.
- Host: GitHub
- URL: https://github.com/telekom-mms/terraform-azurerm-key-vault
- Owner: telekom-mms
- License: mpl-2.0
- Created: 2021-12-15T12:51:35.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2025-02-05T02:26:33.000Z (4 months ago)
- Last Synced: 2025-02-05T05:41:24.164Z (4 months ago)
- Topics: azure, azure-keyvault, keyvault, terraform, terraform-module
- Language: HCL
- Homepage:
- Size: 49.8 KB
- Stars: 0
- Watchers: 3
- Forks: 0
- Open Issues: 6
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- License: LICENSE
- Codeowners: CODEOWNERS
Awesome Lists containing this project
README
# key_vault
This module manages the hashicorp/azurerm key_vault resources.
For more information see https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs > key_vault_<-- This file is autogenerated, please do not change. -->_
## Requirements
| Name | Version |
|------|---------|
| terraform | >=1.4 |
| azurerm | >=3.51.0, <4.0 |## Providers
| Name | Version |
|------|---------|
| azurerm | >=3.51.0, <4.0 |## Resources
| Name | Type |
|------|------|
| azurerm_key_vault.key_vault | resource |
| azurerm_key_vault_secret.key_vault_secret | resource |## Inputs
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| key_vault | Resource definition, default settings are defined within locals and merged with var settings. For more information look at [Outputs](#Outputs). | `any` | `{}` | no |
| key_vault_secret | Resource definition, default settings are defined within locals and merged with var settings. For more information look at [Outputs](#Outputs). | `any` | `{}` | no |## Outputs
| Name | Description |
|------|-------------|
| key_vault | Outputs all attributes of resource_type. |
| key_vault_secret | Outputs all attributes of resource_type. |
| variables | Displays all configurable variables passed by the module. __default__ = predefined values per module. __merged__ = result of merging the default values and custom values passed to the module |## Examples
Minimal configuration to install the desired resources with the module
```hcl
data "azurerm_subscription" "current" {}resource "random_password" "password" {
for_each = toset(["mysql_root"])length = 16
special = false
}module "key_vault" {
source = "registry.terraform.io/telekom-mms/key-vault/azurerm"
key_vault = {
kv-mms = {
location = "westeurope"
resource_group_name = "rg-mms-github"
tenant_id = data.azurerm_subscription.current.tenant_id
}
}
key_vault_secret = {
mysql-root = {
value = random_password.password["mysql_root"].result
key_vault_id = module.key_vault.key_vault["kv-mms"].id
}
}
}
```Advanced configuration to install the desired resources with the module
```hcl
data "azurerm_subscription" "current" {}resource "random_password" "password" {
for_each = toset(["mysql_root"])length = 16
special = false
}module "key_vault" {
source = "registry.terraform.io/telekom-mms/key-vault/azurerm"
key_vault = {
kv-mms = {
location = "westeurope"
resource_group_name = "rg-mms-github"
tenant_id = data.azurerm_subscription.current.tenant_id
network_acls = {
bypass = "AzureServices"
ip_rules = ["172.0.0.2"]
}
tags = {
project = "mms-github"
environment = terraform.workspace
managed-by = "terraform"
}
}
}
key_vault_secret = {
mysql-root = {
value = random_password.password["mysql_root"].result
key_vault_id = module.key_vault.key_vault["kv-mms"].id
content_type = "password for mysql_root"
tags = {
project = "mms-github"
environment = terraform.workspace
managed-by = "terraform"
}
}
}
}
```