Simple secret module for AWS secretsmanager
module "secret" {
source = "rhythmictech/secretsmanager-secret/aws"
version = "0.2.0"
name = "my-secret-string"
value = var.my_secret_string
tags = {
encoding = "none"
type = "string"
}
}
module "secret" {
source = "rhythmictech/secretsmanager-secret/aws"
version = "0.2.0"
name = "my-secret-file-base64-encoded"
value = base64encode(var.my_secret_file)
tags = {
encoding = "base64"
type = "file"
}
}
Name | Version |
---|---|
terraform | >= 0.12 |
Name | Version |
---|---|
aws | n/a |
Name | Description | Type | Default | Required |
---|---|---|---|---|
description | n/a | string |
"terraform-managed secret" |
no |
kms_key_id | Optional. The KMS Key ID to encrypt the secret. KMS key arn or alias can be used. | any |
null |
no |
name | Name of secret to store | string |
n/a | yes |
policy | Optional. The resource policy which controls access to the secret. | any |
null |
no |
tags | User-Defined tags | map(string) |
{} |
no |
value | Secret value to store | string |
n/a | yes |
Name | Description |
---|---|
arn | AWS SecretManager Secret ARN |
id | AWS SecretManager Secret ARN |
secret | AWS SecretManager Secret resource |
secret_version | AWS SecretManager Secret Version resource |
- pre-commit.com/
- terraform.io/
- github.com/tfutils/tfenv
- github.com/segmentio/terraform-docs