-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
drop zoom oauth refresh token #819
base: rc-v0.5.0
Are you sure you want to change the base?
Changes from all commits
ec50fc2
a888e6d
a227baf
0bf8dd0
1157e85
17c7a28
8b498cc
c6d53b8
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -13,21 +13,18 @@ locals { | |
|
||
externally_managed_secrets = { for k, spec in var.secrets : k => spec if !(spec.value_managed_by_tf) } | ||
terraform_managed_secrets = { for k, spec in var.secrets : k => spec if spec.value_managed_by_tf } | ||
|
||
tf_management_description_appendix = "Value managed by a Terraform configuration; changes outside Terraform may be overwritten by subsequent 'terraform apply' runs" | ||
} | ||
|
||
# see: https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ssm_parameter | ||
resource "aws_ssm_parameter" "secret" { | ||
for_each = local.terraform_managed_secrets | ||
|
||
name = "${local.path_prefix}${each.key}" | ||
# Due https://github.com/hashicorp/terraform-provider-aws/issues/31267 | ||
# all are added as secureString | ||
type = "SecureString" | ||
description = each.value.description | ||
value = sensitive(coalesce(each.value.value, local.PLACEHOLDER_VALUE)) | ||
key_id = coalesce(var.kms_key_id, "alias/aws/ssm") | ||
name = "${local.path_prefix}${each.key}" | ||
type = each.value.sensitive ? "SecureString" : "String" | ||
description = each.value.description | ||
value = each.value.sensitive ? sensitive(coalesce(each.value.value, local.PLACEHOLDER_VALUE)) : null | ||
insecure_value = each.value.sensitive ? null : coalesce(each.value.value, local.PLACEHOLDER_VALUE) | ||
key_id = coalesce(var.kms_key_id, "alias/aws/ssm") | ||
|
||
lifecycle { | ||
ignore_changes = [ | ||
|
@@ -41,17 +38,17 @@ resource "aws_ssm_parameter" "secret" { | |
resource "aws_ssm_parameter" "secret_with_externally_managed_value" { | ||
for_each = local.externally_managed_secrets | ||
|
||
name = "${local.path_prefix}${each.key}" | ||
# Due https://github.com/hashicorp/terraform-provider-aws/issues/31267 | ||
# all are added as secureString | ||
type = "SecureString" | ||
description = each.value.description | ||
value = sensitive(coalesce(each.value.value, local.PLACEHOLDER_VALUE)) | ||
key_id = coalesce(var.kms_key_id, "alias/aws/ssm") | ||
name = "${local.path_prefix}${each.key}" | ||
type = each.value.sensitive ? "SecureString" : "String" | ||
description = each.value.description | ||
value = each.value.sensitive ? sensitive(coalesce(each.value.value, local.PLACEHOLDER_VALUE)) : null | ||
insecure_value = each.value.sensitive ? null : coalesce(each.value.value, local.PLACEHOLDER_VALUE) | ||
key_id = coalesce(var.kms_key_id, "alias/aws/ssm") | ||
|
||
lifecycle { | ||
ignore_changes = [ | ||
value, # key difference here; we don't want to overwrite values filled by the external process | ||
insecure_value, | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. What happens if for example There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. if this is in lifecycle, then TF shouldn't change resource even if it believes changes are needed in EITHER |
||
tags | ||
] | ||
} | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe you can include an screenshot like this on this step too: