--- /dev/null
+module "fdio-logs" {
+ # fdio logs iam
+ source = "../"
+ name = "dynamic-aws-creds-vault-fdio-logs"
+}
+
+module "fdio-docs" {
+ # fdio docs iam
+ source = "../"
+ name = "dynamic-aws-creds-vault-fdio-docs"
+}
+
+module "fdio-csit-jenkins" {
+ # fdio csit jenkins iam
+ source = "../"
+ name = "dynamic-aws-creds-vault-fdio-csit-jenkins"
+}
--- /dev/null
+provider "vault" {
+ address = var.vault_provider_address
+ skip_tls_verify = var.vault_provider_skip_tls_verify
+ token = var.vault_provider_token
+}
\ No newline at end of file
--- /dev/null
+variable "vault_provider_address" {
+ description = "Vault cluster address."
+ type = string
+ default = "http://10.30.51.28:8200"
+}
+
+variable "vault_provider_skip_tls_verify" {
+ description = "Verification of the Vault server's TLS certificate"
+ type = bool
+ default = false
+}
+
+variable "vault_provider_token" {
+ description = "Vault root token"
+ type = string
+ sensitive = true
+}
--- /dev/null
+terraform {
+ backend "consul" {
+ address = "consul.service.consul:8500"
+ scheme = "http"
+ path = "fdio/terraform/1n/nomad"
+ }
+ required_providers {
+ vault = {
+ version = ">= 3.2.1"
+ }
+ }
+ required_version = ">= 1.1.4"
+}
+++ /dev/null
-provider "vault" {
- address = "http://10.30.51.28:8200"
- skip_tls_verify = true
- token = var.token
-}
}
variable "name" {
- default = "dynamic-aws-creds-vault-fdio"
+ default = "dynamic-aws-creds-vault"
description = "Vault path"
type = string
}
-
-variable "token" {
- description = "Vault root token"
- type = string
- sensitive = true
-}
terraform {
- backend "consul" {
- address = "consul.service.consul:8500"
- scheme = "http"
- path = "fdio/terraform/1n/nomad"
- }
required_providers {
vault = {
version = ">=2.22.1"
}
}
- required_version = ">= 1.0.3"
+ required_version = ">= 1.1.4"
}