Terraform resource: aws iam access key

From wikieduonline
Revision as of 11:39, 8 March 2024 by Welcome (talk | contribs)
Jump to navigation Jump to search

Examples

resource "aws_iam_user" "test" {
  name = "test"
  path = "/test/"
}

resource "aws_iam_access_key" "test" {
  user = aws_iam_user.test.name
}

output "aws_iam_smtp_password_v4" {
  value = aws_iam_access_key.test.ses_smtp_password_v4
}


resource "aws_iam_access_key" "your_lb" {
  user    = aws_iam_user.lb.name
  pgp_key = "keybase:some_person_that_exists"
}
resource "aws_iam_access_key" "your_lb" {
  user    = aws_iam_user.lb.name
  secret[2] = XXX
}


secret
Secret access key. This attribute is not available for imported resources. Note that this will be written to the state file. If you use this, please protect your backend state file judiciously. Alternatively, you may supply a pgp_key instead, which will prevent the secret from being stored in plaintext, at the cost of preventing the use of the secret key in automation.
terraform state pull | jq '.resources[] | select(.type == "aws_iam_access_key") | .instances[0].attributes' [3]

Related

See also

Advertising: