Skip to content

ministryofjustice/cloud-platform-terraform-external-secrets-operator

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

cloud-platform-terraform-external-secrets-operator

Releases

This Terraform module will deploy Cloud Platform External Secrets Operator

Usage

module "eso" {
  source = "github.com/ministryofjustice/cloud-platfrom-terraform-external-secrets-operator?ref=version"
}

See the examples/ folder for more information.

Requirements

Name Version
terraform >= 1.2.5
aws >= 4.0.0
kubernetes >= 2.0.0

Providers

Name Version
aws >= 4.0.0
helm n/a
kubernetes >= 2.0.0

Modules

Name Source Version
external_secrets_iam_assumable_role terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc ~> 5.0

Resources

Name Type
aws_iam_policy.external_secrets resource
helm_release.external_secrets resource
kubernetes_namespace.external_secrets_operator resource
aws_caller_identity.current data source
aws_iam_policy_document.external_secrets data source
aws_region.current data source

Inputs

Name Description Type Default Required
cluster_domain_name The cluster domain used for externalDNS annotations and certmanager any n/a yes
eks_cluster_oidc_issuer_url If EKS variable is set to true this is going to be used when we create the IAM OIDC role string "" no
secrets_prefix Prefix for secrets in AWS Secrets Manager string n/a yes

Outputs

No outputs.

Reading Material

About

Terraform module that deploys cloud-platform external secrets operator

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

No packages published