display_name | description | icon | maintainer_github | partner_github | verified | tags | |||||
---|---|---|---|---|---|---|---|---|---|---|---|
HCP Vault Secrets |
Fetch secrets from HCP Vault |
../.icons/vault.svg |
coder |
hashicorp |
true |
|
This module lets you fetch all or selective secrets from a HCP Vault Secrets app into your Coder workspaces. It makes use of the hcp_vault_secrets_app
data source from the HCP provider.
module "vault" {
source = "registry.coder.com/modules/hcp-vault-secrets/coder"
version = "1.0.7"
agent_id = coder_agent.example.id
app_name = "demo-app"
project_id = "aaa-bbb-ccc"
}
To configure the HCP Vault Secrets module, follow these steps,
- Create secrets in HCP Vault Secrets
- Create an HCP Service Principal from the HCP Vault Secrets app in the HCP console. This will give you the
HCP_CLIENT_ID
andHCP_CLIENT_SECRET
that you need to authenticate with HCP Vault Secrets. - Set
HCP_CLIENT_ID
andHCP_CLIENT_SECRET
variables on the coder provisioner (recommended) or supply them as input to the module. - Set the
project_id
. This is the ID of the project where the HCP Vault Secrets app is running.
See the HCP Vault Secrets documentation for more information.
To fetch all secrets from the HCP Vault Secrets app, skip the secrets
input.
module "vault" {
source = "registry.coder.com/modules/hcp-vault-secrets/coder"
version = "1.0.7"
agent_id = coder_agent.example.id
app_name = "demo-app"
project_id = "aaa-bbb-ccc"
}
To fetch selective secrets from the HCP Vault Secrets app, set the secrets
input.
module "vault" {
source = "registry.coder.com/modules/hcp-vault-secrets/coder"
version = "1.0.7"
agent_id = coder_agent.example.id
app_name = "demo-app"
project_id = "aaa-bbb-ccc"
secrets = ["MY_SECRET_1", "MY_SECRET_2"]
}
Set client_id
and client_secret
as module inputs.
module "vault" {
source = "registry.coder.com/modules/hcp-vault-secrets/coder"
version = "1.0.7"
agent_id = coder_agent.example.id
app_name = "demo-app"
project_id = "aaa-bbb-ccc"
client_id = "HCP_CLIENT_ID"
client_secret = "HCP_CLIENT_SECRET"
}