Skip to content

Commit 27688a4

Browse files
Rahul-4480vjdhama
authored andcommitted
fix: indentation of the code in the blog
1 parent dadcea2 commit 27688a4

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

content/blog/terraform_secrets_management_guide.md

Lines changed: 12 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -43,12 +43,12 @@ Use these variables in your resource definitions. Here’s an example of an AWS
4343

4444
```hcl
4545
resource "aws_db_instance" "example" {
46-
identifier = "mydbinstance"
46+
identifier = "mydbinstance"
4747
engine = "mysql"
4848
instance_class = "db.t3.micro"
4949
allocated_storage = 10
5050
publicly_accessible = true
51-
skip_final_snapshot = true
51+
skip_final_snapshot = true
5252
username = var.db_username
5353
password = var.db_password
5454
}
@@ -170,7 +170,7 @@ Use the `aws_secretsmanager_secret_version` data source in your Terraform config
170170

171171
```hcl
172172
data "aws_secretsmanager_secret_version" "creds" {
173-
secret_id = aws_secretsmanager_secret.db_creds.id
173+
secret_id = aws_secretsmanager_secret.db_creds.id
174174
depends_on = [aws_secretsmanager_secret.db_creds, aws_secretsmanager_secret_version.db_creds_version]
175175
}
176176
@@ -185,14 +185,14 @@ Use the decrypted credentials in your resource definitions. Here’s an example
185185

186186
```hcl
187187
resource "aws_db_instance" "example" {
188-
identifier = "mydbinstance"
188+
identifier = "mydbinstance"
189189
engine = "mysql"
190190
instance_class = "db.t3.micro"
191191
allocated_storage = 10
192192
publicly_accessible = true
193-
skip_final_snapshot = true
194-
username = local.db_cred.db_username
195-
password = local.db_cred.db_password
193+
skip_final_snapshot = true
194+
username = var.db_username
195+
password = var.db_password
196196
}
197197
```
198198

@@ -267,7 +267,7 @@ Use the `aws_secretsmanager_secret_version` data source to fetch the secret from
267267

268268
```hcl
269269
data "aws_secretsmanager_secret_version" "creds" {
270-
secret_id = aws_secretsmanager_secret.mysql_cred.id
270+
secret_id = aws_secretsmanager_secret.mysql_cred.id
271271
depends_on = [aws_secretsmanager_secret.mysql_cred, aws_secretsmanager_secret_version.mysql_cred_version]
272272
}
273273
@@ -282,14 +282,14 @@ Use the retrieved credentials in your resource definitions. Here’s an example
282282

283283
```hcl
284284
resource "aws_db_instance" "example" {
285-
identifier = "mydbinstance"
285+
identifier = "mydbinstance"
286286
engine = "mysql"
287287
instance_class = "db.t3.micro"
288288
allocated_storage = 10
289289
publicly_accessible = true
290-
skip_final_snapshot = true
291-
username = local.db_cred.db_username
292-
password = local.db_cred.db_password
290+
skip_final_snapshot = true
291+
username = var.db_username
292+
password = var.db_password
293293
}
294294
```
295295

0 commit comments

Comments
 (0)