-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
T-Systems MMS
committed
Dec 16, 2021
1 parent
7f8834f
commit 8f03e4b
Showing
2 changed files
with
89 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
# Changelog | ||
|
||
## [0.0.1](https://github.com/T-Systems-MMS/terraform-keyvault/tree/0.0.1) (2021-12-16) | ||
|
||
[Full Changelog](https://github.com/T-Systems-MMS/terraform-keyvault/compare/57bb4ef2e50d80a7c6fd0a4aba232c93d8a7b0df...0.0.1) | ||
|
||
|
||
|
||
\* *This Changelog was automatically generated by [github_changelog_generator](https://github.com/github-changelog-generator/github-changelog-generator)* |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,80 @@ | ||
<!-- BEGIN_TF_DOCS --> | ||
# keyvault | ||
|
||
This module manages Azure Keyvault Configuration. | ||
|
||
<-- This file is autogenerated, please do not change. --> | ||
|
||
## Requirements | ||
|
||
| Name | Version | | ||
|------|---------| | ||
| terraform | >=0.12 | | ||
| azurerm | >=2.19.0 | | ||
|
||
## Providers | ||
|
||
| Name | Version | | ||
|------|---------| | ||
| azurerm | >=2.19.0 | | ||
|
||
## Resources | ||
|
||
| Name | Type | | ||
|------|------| | ||
| azurerm_key_vault.keyvault | resource | | ||
|
||
## Inputs | ||
|
||
| Name | Description | Type | Default | Required | | ||
|------|-------------|------|---------|:--------:| | ||
| location | location where the resource should be created | `string` | n/a | yes | | ||
| keyvault | resource definition, default settings are defined within locals and merged with var settings | `any` | `{}` | no | | ||
| keyvault_config | resource configuration, default settings are defined within locals and merged with var settings | `any` | `{}` | no | | ||
| resource_name | Azure Keyvault | `set(string)` | `[]` | no | | ||
| tags | mapping of tags to assign, default settings are defined within locals and merged with var settings | `any` | `{}` | no | | ||
|
||
## Outputs | ||
|
||
| Name | Description | | ||
|------|-------------| | ||
| keyvault | azurerm_keyvault results | | ||
|
||
## Examples | ||
|
||
```hcl | ||
module "keyvault" { | ||
source = "../terraform-keyvault" | ||
location = "westeurope" | ||
resource_name = [ | ||
"service-mgmt-kv", | ||
] | ||
keyvault = { | ||
resource_group_name = "service-mgmt-rg" | ||
tenant_id = data.azurerm_subscription.current.tenant_id | ||
} | ||
keyvault_config = { | ||
mgmt = { | ||
access_policies = { | ||
frontdoor = { | ||
object_id = data.azuread_service_principal.frontdoor.object_id | ||
key_permissions = [] | ||
certificate_permissions = ["get", ] | ||
secret_permissions = ["get", ] | ||
} | ||
} | ||
} | ||
env = { | ||
access_policies = { | ||
admin = { | ||
object_id = data.azuread_group.grp-admin.object_id | ||
} | ||
} | ||
} | ||
} | ||
tags = { | ||
service = "service_name" | ||
} | ||
} | ||
``` | ||
<!-- END_TF_DOCS --> |