vault_approle_auth_backend_role_secret_id
Manages an AppRole auth backend SecretID in a Vault server. See the Vault documentation for more information.
Example Usage
resource "vault_auth_backend" "approle" { type = "approle" } resource "vault_approle_auth_backend_role" "example" { backend = "${vault_auth_backend.approle.path}" role_name = "test-role" policies = ["default", "dev", "prod"] } resource "vault_approle_auth_backend_role_secret_id" "id" { backend = "${vault_auth_backend.approle.path}" role_name = "${vault_approle_auth_backend_role.example.role_name}" metadata = <<EOT { "hello": "world" } EOT }
Argument Reference
The following arguments are supported:
-
role_name
- (Required) The name of the role to create the SecretID for. -
metadata
- (Optional) A JSON-encoded string containing metadata in key-value pairs to be set on tokens issued with this SecretID. -
cidr_list
- (Optional) If set, specifies blocks of IP addresses which can perform the login operation using this SecretID. -
secret_id
- (Optional) The SecretID to be created. If set, uses "Push" mode. Defaults to Vault auto-generating SecretIDs.
Attributes Reference
In addition to the fields above, the following attributes are exported:
-
accessor
- The unique ID for this SecretID that can be safely logged.
© 2018 HashiCorpLicensed under the MPL 2.0 License.
https://www.terraform.io/docs/providers/vault/r/approle_auth_backend_role_secret_id.html