Skip to content

Commit e29709f

Browse files
committed
removed extra secret confih
1 parent 0d080c7 commit e29709f

File tree

2 files changed

+0
-35
lines changed

2 files changed

+0
-35
lines changed

README.md

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -83,7 +83,6 @@ No requirements.
8383

8484
| Name | Version |
8585
|------|---------|
86-
| <a name="provider_aws"></a> [aws](#provider\_aws) | n/a |
8786
| <a name="provider_helm"></a> [helm](#provider\_helm) | n/a |
8887
| <a name="provider_kubernetes"></a> [kubernetes](#provider\_kubernetes) | n/a |
8988
| <a name="provider_random"></a> [random](#provider\_random) | n/a |
@@ -99,8 +98,6 @@ No requirements.
9998

10099
| Name | Type |
101100
|------|------|
102-
| [aws_secretsmanager_secret.mysql_user_password](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/secretsmanager_secret) | resource |
103-
| [aws_secretsmanager_secret_version.mysql_user_password](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/secretsmanager_secret_version) | resource |
104101
| [helm_release.mysqldb](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource |
105102
| [helm_release.mysqldb_backup](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource |
106103
| [helm_release.mysqldb_restore](https://registry.terraform.io/providers/hashicorp/helm/latest/docs/resources/release) | resource |

main.tf

Lines changed: 0 additions & 32 deletions
Original file line numberDiff line numberDiff line change
@@ -24,38 +24,6 @@ resource "random_password" "mysqldb_exporter_user_password" {
2424
special = false
2525
}
2626

27-
resource "aws_secretsmanager_secret" "mysql_user_password" {
28-
count = var.mysqldb_config.store_password_to_secret_manager ? 1 : 0
29-
name = format("%s/%s/%s", var.mysqldb_config.environment, var.mysqldb_config.name, "mysql")
30-
recovery_window_in_days = var.recovery_window_aws_secret
31-
}
32-
33-
resource "aws_secretsmanager_secret_version" "mysql_user_password" {
34-
count = var.mysqldb_config.store_password_to_secret_manager ? 1 : 0
35-
secret_id = aws_secretsmanager_secret.mysql_user_password[0].id
36-
secret_string = var.mysqldb_custom_credentials_enabled ? jsonencode(
37-
{
38-
"root_user" : "${var.mysqldb_custom_credentials_config.root_user}",
39-
"root_password" : "${var.mysqldb_custom_credentials_config.root_password}",
40-
"custom_username" : "${var.mysqldb_custom_credentials_config.custom_username}",
41-
"custom_user_password" : "${var.mysqldb_custom_credentials_config.custom_user_password}",
42-
"replication_user" : "${var.mysqldb_custom_credentials_config.replication_user}",
43-
"replication_password" : "${var.mysqldb_custom_credentials_config.replication_password}",
44-
"exporter_user" : "${var.mysqldb_custom_credentials_config.exporter_user}",
45-
"exporter_password" : "${var.mysqldb_custom_credentials_config.exporter_password}"
46-
}) : jsonencode(
47-
{
48-
"root_user" : "root",
49-
"root_password" : "${random_password.mysqldb_root_password[0].result}",
50-
"custom_username" : "${var.mysqldb_config.custom_user_username}",
51-
"custom_user_password" : "${random_password.mysqldb_custom_user_password[0].result}",
52-
"replication_user" : "replicator",
53-
"replication_password" : "${random_password.mysqldb_replication_user_password[0].result}",
54-
"exporter_user" : "mysqld_exporter",
55-
"exporter_password" : "${random_password.mysqldb_exporter_user_password[0].result}"
56-
})
57-
}
58-
5927
resource "kubernetes_namespace" "mysqldb" {
6028
count = var.create_namespace ? 1 : 0
6129
metadata {

0 commit comments

Comments
 (0)