-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathproviders.tf
32 lines (28 loc) · 911 Bytes
/
providers.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
terraform {
required_providers {
rediscloud = {
source = "RedisLabs/rediscloud"
version = "1.9.0"
}
}
}
provider "rediscloud" {
# Configuration if we lose the VAULT SERVER
#api_key = var.redis_global_api_key
#secret_key = var.redis_global_secret_key
# Config with Vault Server running and with the right expected schema.
# I am afraid of conventions, but I guess this is the best approach for a DEMO.
#api_key = data.vault_generic_secret.redis_secrets.data["global_api_key"]
#secret_key = data.vault_generic_secret.redis_secrets.data["global_secret_key"]
api_key = var.redis_global_api_key
secret_key = var.redis_global_secret_key
}
# USE THIS IF YOU WANT TO USE THE VAULT SECRETS ENGINE
/*
provider "vault" {
address = var.vault_full_addr
// Token or other authentication method
// initial root token bc this is a lab.
token = var.vault_root_token
}
*/