Skip to content

Commit

Permalink
v0.0.45
Browse files Browse the repository at this point in the history
  • Loading branch information
benyboy84 committed Mar 19, 2024
1 parent 37d9803 commit d29abb6
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 4 deletions.
6 changes: 3 additions & 3 deletions docs/README_header.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,8 +21,8 @@ instead of a user token.

### Hashicorp Vault Secrets Permissions

To read secrets from Hashicorp Vault Secrets, provide a client ID and a key
from a service principals with the secret `reader` role.
To read and create secrets in Hashicorp Vault Secrets, provide a client ID and a key
from a service principals with the secret `contributor` role.

### GitHub Permissions

Expand Down Expand Up @@ -83,7 +83,7 @@ GITHUB_APP_PEM_FILE, and GITHUB_OWNER environment variables to authenticate.
* branches protection
* repositories secrets
* teams
* Read secrets from Hashicorp Vault Secrets
* Read and write secrets in Hashicorp Vault Secrets

## Prerequisite

Expand Down
2 changes: 1 addition & 1 deletion resources_hcp_vault_secrets.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,6 +3,6 @@
resource "hcp_vault_secrets_secret" "this" {
for_each = nonsensitive({ for team in local.tfc_teams : team.name => team if try(team.token, false) == true })
app_name = "TerraformCloud"
secret_name = "TFC_API_TOKEN_${lower(replace(each.value.name, "/\\W|_|\\s/", "_"))}"
secret_name = lower(replace(each.value.name, "/\\W|_|\\s/", "_"))
secret_value = module.tfe_teams[each.value.name].token
}

0 comments on commit d29abb6

Please sign in to comment.