-
Notifications
You must be signed in to change notification settings - Fork 548
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vault_kv_secret_v2 does not support manual secret value management #1900
Comments
At our customer, we would also benefit from having this feature. (+1) |
+1 this would be a really nice change to have, it works like this for the generic_secret and similar behavior should be expected here. |
This feature will help us manage secret structure, not store real sensitive data in git. +1 |
@sjhuang93 You are not using this?
I think that is a key part of this feature. Value is fully managed by operators. |
@sjhuang93 Hello, I am sorry you are having trouble. If you are experiencing problems with this feature please open a new ticket with the relevant details and reproductions steps. Thanks! |
Hello,
We are trying to create Vault KV secret "stubs" with Terraform, ie. create the path of a KV secret and also manage it's metadata (but not the actual secret data).
For us, the actual secret data must always be outside of Terraform/TFState. This is because Vault is used to store the secrets, not Terraform (hcl/state) which is just used to configure the Vault. Secrets are placed into the Secret "stubs" via API/CLI/UI by our secret operators.
I believe this would be a valid use case for pretty much everyone using this resource, so it would be nice if this was supported as described.
Terraform Version
Terraform v1.4.6 on darwin_arm64
Vault 1.13.2
Affected Resource(s)
Please list the resources as a list, for example:
Terraform Configuration Files
Expected Behavior
Modifying the secret value (ie. creating a new version) should not affect the terraform resource. In other words, after creating a new version of a secret, terraform apply should report "No changes. Your infrastructure matches the configuration."
Note that metadata would be completely handled via TF+State, since it does not contain any actual secrets.
Actual Behavior
After a new secret version has been created manually, the resource always wants to update itself. Even when running apply multiple times, the resource always looks like this:
Steps to Reproduce
The text was updated successfully, but these errors were encountered: