-
Notifications
You must be signed in to change notification settings - Fork 5
/
Copy pathsecrets.tf
31 lines (28 loc) · 949 Bytes
/
secrets.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
#tfsec:ignore:aws-ssm-secret-use-customer-key
resource "aws_secretsmanager_secret" "rds-postgresql-password" {
name = "Hyperglance-PostgreSQL-RDS-Password-${random_string.string.id}"
description = "Hyperglance DB password"
}
resource "aws_secretsmanager_secret_version" "rds-postgresql-password" {
secret_id = aws_secretsmanager_secret.rds-postgresql-password.id
secret_string = sensitive(random_string.rds-password.id)
}
resource "aws_secretsmanager_secret_policy" "rds-postgresql-password" {
secret_arn = aws_secretsmanager_secret.rds-postgresql-password.arn
policy = <<POLICY
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "GetSecretValue",
"Effect": "Allow",
"Principal": {
"AWS": "${aws_iam_role.hg_task_execution_role.arn}"
},
"Action": "secretsmanager:GetSecretValue",
"Resource": "${aws_secretsmanager_secret.rds-postgresql-password.arn}"
}
]
}
POLICY
}