@@ -18,11 +18,12 @@ resource "aws_secretsmanager_secret" "sm" {
18
18
}
19
19
20
20
resource "aws_secretsmanager_secret_version" "sm-sv" {
21
- for_each = { for k , v in var . secrets : k => v if ! var . unmanaged }
22
- secret_id = aws_secretsmanager_secret. sm [each . key ]. arn
23
- secret_string = lookup (each. value , " secret_string" , null ) != null ? lookup (each. value , " secret_string" , null ) : (lookup (each. value , " secret_key_value" , null ) != null ? jsonencode (lookup (each. value , " secret_key_value" , {})) : null )
24
- secret_binary = lookup (each. value , " secret_binary" , null ) != null ? base64encode (lookup (each. value , " secret_binary" )) : null
25
- depends_on = [aws_secretsmanager_secret . sm ]
21
+ for_each = { for k , v in var . secrets : k => v if ! var . unmanaged }
22
+ secret_id = aws_secretsmanager_secret. sm [each . key ]. arn
23
+ secret_string = lookup (each. value , " secret_string" , null ) != null ? lookup (each. value , " secret_string" , null ) : (lookup (each. value , " secret_key_value" , null ) != null ? jsonencode (lookup (each. value , " secret_key_value" , {})) : null )
24
+ secret_binary = lookup (each. value , " secret_binary" , null ) != null ? base64encode (lookup (each. value , " secret_binary" )) : null
25
+ version_stages = var. version_stages
26
+ depends_on = [aws_secretsmanager_secret . sm ]
26
27
lifecycle {
27
28
ignore_changes = [
28
29
secret_id ,
@@ -31,11 +32,12 @@ resource "aws_secretsmanager_secret_version" "sm-sv" {
31
32
}
32
33
33
34
resource "aws_secretsmanager_secret_version" "sm-svu" {
34
- for_each = { for k , v in var . secrets : k => v if var . unmanaged }
35
- secret_id = aws_secretsmanager_secret. sm [each . key ]. arn
36
- secret_string = lookup (each. value , " secret_string" , null ) != null ? lookup (each. value , " secret_string" ) : (lookup (each. value , " secret_key_value" , null ) != null ? jsonencode (lookup (each. value , " secret_key_value" , {})) : null )
37
- secret_binary = lookup (each. value , " secret_binary" , null ) != null ? base64encode (lookup (each. value , " secret_binary" )) : null
38
- depends_on = [aws_secretsmanager_secret . sm ]
35
+ for_each = { for k , v in var . secrets : k => v if var . unmanaged }
36
+ secret_id = aws_secretsmanager_secret. sm [each . key ]. arn
37
+ secret_string = lookup (each. value , " secret_string" , null ) != null ? lookup (each. value , " secret_string" ) : (lookup (each. value , " secret_key_value" , null ) != null ? jsonencode (lookup (each. value , " secret_key_value" , {})) : null )
38
+ secret_binary = lookup (each. value , " secret_binary" , null ) != null ? base64encode (lookup (each. value , " secret_binary" )) : null
39
+ version_stages = var. version_stages
40
+ depends_on = [aws_secretsmanager_secret . sm ]
39
41
40
42
lifecycle {
41
43
ignore_changes = [
@@ -60,11 +62,12 @@ resource "aws_secretsmanager_secret" "rsm" {
60
62
}
61
63
62
64
resource "aws_secretsmanager_secret_version" "rsm-sv" {
63
- for_each = { for k , v in var . rotate_secrets : k => v if ! var . unmanaged }
64
- secret_id = aws_secretsmanager_secret. rsm [each . key ]. arn
65
- secret_string = lookup (each. value , " secret_string" , null ) != null ? lookup (each. value , " secret_string" ) : (lookup (each. value , " secret_key_value" , null ) != null ? jsonencode (lookup (each. value , " secret_key_value" , {})) : null )
66
- secret_binary = lookup (each. value , " secret_binary" , null ) != null ? base64encode (lookup (each. value , " secret_binary" )) : null
67
- depends_on = [aws_secretsmanager_secret . rsm ]
65
+ for_each = { for k , v in var . rotate_secrets : k => v if ! var . unmanaged }
66
+ secret_id = aws_secretsmanager_secret. rsm [each . key ]. arn
67
+ secret_string = lookup (each. value , " secret_string" , null ) != null ? lookup (each. value , " secret_string" ) : (lookup (each. value , " secret_key_value" , null ) != null ? jsonencode (lookup (each. value , " secret_key_value" , {})) : null )
68
+ secret_binary = lookup (each. value , " secret_binary" , null ) != null ? base64encode (lookup (each. value , " secret_binary" )) : null
69
+ version_stages = var. version_stages
70
+ depends_on = [aws_secretsmanager_secret . rsm ]
68
71
lifecycle {
69
72
ignore_changes = [
70
73
secret_id ,
@@ -73,11 +76,12 @@ resource "aws_secretsmanager_secret_version" "rsm-sv" {
73
76
}
74
77
75
78
resource "aws_secretsmanager_secret_version" "rsm-svu" {
76
- for_each = { for k , v in var . rotate_secrets : k => v if var . unmanaged }
77
- secret_id = aws_secretsmanager_secret. rsm [each . key ]. arn
78
- secret_string = lookup (each. value , " secret_string" , null ) != null ? lookup (each. value , " secret_string" ) : (lookup (each. value , " secret_key_value" , null ) != null ? jsonencode (lookup (each. value , " secret_key_value" , {})) : null )
79
- secret_binary = lookup (each. value , " secret_binary" , null ) != null ? base64encode (lookup (each. value , " secret_binary" )) : null
80
- depends_on = [aws_secretsmanager_secret . rsm ]
79
+ for_each = { for k , v in var . rotate_secrets : k => v if var . unmanaged }
80
+ secret_id = aws_secretsmanager_secret. rsm [each . key ]. arn
81
+ secret_string = lookup (each. value , " secret_string" , null ) != null ? lookup (each. value , " secret_string" ) : (lookup (each. value , " secret_key_value" , null ) != null ? jsonencode (lookup (each. value , " secret_key_value" , {})) : null )
82
+ secret_binary = lookup (each. value , " secret_binary" , null ) != null ? base64encode (lookup (each. value , " secret_binary" )) : null
83
+ version_stages = var. version_stages
84
+ depends_on = [aws_secretsmanager_secret . rsm ]
81
85
82
86
lifecycle {
83
87
ignore_changes = [
0 commit comments