Skip to content
Encrypted HashiCorp Vault secrets via Terraform that can be stored in SCM such as Git
Branch: master
Clone or download
Fetching latest commit…
Cannot retrieve the latest commit at this time.
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
.github Move up workflow Apr 12, 2019
provider Use latest `1.1.x` release Apr 19, 2019
.gitignore Add project Apr 12, 2019
.golangci.yml
.travis.yml Update TravisCI API key Apr 12, 2019
CHANGELOG.md Prepare 0.2.0 Apr 19, 2019
CODEOWNERS Add project Apr 12, 2019
CODE_OF_CONDUCT.md Add project Apr 12, 2019
CONTRIBUTING.md Add project Apr 12, 2019
FAQ.md Add project Apr 12, 2019
LICENSE Add project Apr 12, 2019
README.md Prepare 0.2.0 Apr 19, 2019
RELEASE_PROCESS.md Add project Apr 12, 2019
USAGE.md Re-order documentation Apr 12, 2019
USE_CASES.md Re-order documentation Apr 12, 2019
go.mod Extract Vault client to github.com/sumup-oss/go-pkgs Apr 19, 2019
go.sum Extract Vault client to github.com/sumup-oss/go-pkgs Apr 19, 2019
mage.go Add project Apr 12, 2019
magefile.go Use latest `1.1.x` release Apr 19, 2019
main.go Extract Vault client to github.com/sumup-oss/go-pkgs Apr 19, 2019

README.md

terraform-provider-vaulted

Build Status

Go Report Card

A terraform provider that utilizes https://github.com/sumup-oss/vaulted to provide https://github.com/hashicorp/terraform for https://github.com/hashicorp/vault encrypted secrets via resource.vaulted_vault_secret that:

  • are never stored as plaintext in your terraform state.
  • are never logged in stdout as plaintext.
  • can be safely stored in SCM such as Git in their encrypted payload format produced by https://github.com/sumup-oss/vaulted .

Tested and used against https://github.com/hashicorp/vault official docker image versions:

  • 0.9.x,
  • 0.11.6,
  • 1.0.3,
  • 1.1.0,
  • latest

Check magefile.go for up-to-date info what the test suite matrix uses.

Also shown at https://medium.com/@syndbg/provisioning-vault-encrypted-secrets-using-terraform-using-sumup-oss-vaulted-and-4aa9721d082c?source=friends_link&sk=9eabe1bbe6ba089fe176d94cf413862d

Typical Terraform workflow

Typical terraform workflow

Terraform workflow with usage of https://github.com/sumup/vaulted and this provider

Terraform workflow with vaulted

Installation

  1. Download latest GitHub release locally for your OS and architecture.
  2. Follow https://www.terraform.io/docs/configuration/providers.html#third-party-plugins
  3. Move downloaded release binary to local terraform plugin dir.

E.g installation on a Linux AMD64 host

# Assuming we already downloaded the binary at ~/Downloads/terraform-provider-vaulted_v0.2.0_linux_amd64
> mkdir -p ~/.terraform.d/plugins/linux_amd64
> mv ~/Downloads/terraform-provider-vaulted_v0.2.0_linux_amd64 ~/.terraform.d/plugins/linux_amd64/terraform-provider-vaulted

And we're ready to use it!

Use cases

Usage

Contributing

FAQ

About SumUp

SumUp is a mobile-point of sale provider.

It is our mission to make easy and fast card payments a reality across the entire world.

You can pay with SumUp in more than 30 countries, already.

Our engineers work in Berlin, Cologne, Sofia and Sāo Paulo.

They write code in JavaScript, Swift, Ruby, Go, Java, Erlang, Elixir and more.

Want to come work with us? Head to our careers page to find out more.

You can’t perform that action at this time.