» vault_gcp_secret_backend
Creates an GCP Secret Backend for Vault. GCP secret backends can then issue GCP OAuth token or Service Account keys, once a role has been added to the backend.
Important All data provided in the resource configuration will be written in cleartext to state and plan files generated by Terraform, and will appear in the console output when Terraform runs. Protect these artifacts accordingly. See the main provider documentation for more details.
» Example Usage
resource "vault_gcp_secret_backend" "gcp" {
credentials = "${file("credentials.json")}"
}
» Argument Reference
The following arguments are supported:
-
credentials
- (Optional) The GCP service account credentails in JSON format.
Important Because Vault does not support reading the configured
credentials back from the API, Terraform cannot detect and correct drift
on credentials
. Changing the values, however, will overwrite the
previously stored values.
-
path
- (Optional) The unique path this backend should be mounted at. Must not begin or end with a/
. Defaults togcp
. -
description
- (Optional) A human-friendly description for this backend. -
default_lease_ttl_seconds
- (Optional) The default TTL for credentials issued by this backend. Defaults to '3600'. -
max_lease_ttl_seconds
- (Optional) The maximum TTL that can be requested for credentials issued by this backend. Defaults to '86400'.
» Attributes Reference
No additional attributes are exported by this resource.