Skip to content

Commit ecc276f

Browse files
committed
feat: Upgrade AWS provider to 6.0
1 parent f7749e2 commit ecc276f

File tree

10 files changed

+43
-7
lines changed

10 files changed

+43
-7
lines changed

README.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -124,14 +124,14 @@ Examples codified under the [`examples`](https://github.com/terraform-aws-module
124124
| Name | Version |
125125
|------|---------|
126126
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0 |
127-
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0 |
127+
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 6.0 |
128128
| <a name="requirement_random"></a> [random](#requirement\_random) | >= 3.0 |
129129

130130
## Providers
131131

132132
| Name | Version |
133133
|------|---------|
134-
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 5.0 |
134+
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 6.0 |
135135
| <a name="provider_random"></a> [random](#provider\_random) | >= 3.0 |
136136

137137
## Modules
@@ -170,6 +170,7 @@ No modules.
170170
| <a name="input_random_password_length"></a> [random\_password\_length](#input\_random\_password\_length) | The length of the generated random password | `number` | `32` | no |
171171
| <a name="input_random_password_override_special"></a> [random\_password\_override\_special](#input\_random\_password\_override\_special) | Supply your own list of special characters to use for string generation. This overrides the default character list in the special argument | `string` | `"!@#$%&*()-_=+[]{}<>:?"` | no |
172172
| <a name="input_recovery_window_in_days"></a> [recovery\_window\_in\_days](#input\_recovery\_window\_in\_days) | Number of days that AWS Secrets Manager waits before it can delete the secret. This value can be `0` to force deletion without recovery or range from `7` to `30` days. The default value is `30` | `number` | `null` | no |
173+
| <a name="input_region"></a> [region](#input\_region) | Region where the resource(s) will be managed. Defaults to the Region set in the provider configuration | `string` | `null` | no |
173174
| <a name="input_replica"></a> [replica](#input\_replica) | Configuration block to support secret replication | `map(any)` | `{}` | no |
174175
| <a name="input_rotation_lambda_arn"></a> [rotation\_lambda\_arn](#input\_rotation\_lambda\_arn) | Specifies the ARN of the Lambda function that can rotate the secret | `string` | `""` | no |
175176
| <a name="input_rotation_rules"></a> [rotation\_rules](#input\_rotation\_rules) | A structure that defines the rotation configuration for this secret | `map(any)` | `{}` | no |
@@ -187,6 +188,7 @@ No modules.
187188
| <a name="output_secret_binary"></a> [secret\_binary](#output\_secret\_binary) | The secret binary |
188189
| <a name="output_secret_id"></a> [secret\_id](#output\_secret\_id) | The ID of the secret |
189190
| <a name="output_secret_name"></a> [secret\_name](#output\_secret\_name) | The name of the secret |
191+
| <a name="output_secret_region"></a> [secret\_region](#output\_secret\_region) | The region of the secret |
190192
| <a name="output_secret_replica"></a> [secret\_replica](#output\_secret\_replica) | Attributes of the replica created |
191193
| <a name="output_secret_string"></a> [secret\_string](#output\_secret\_string) | The secret string |
192194
| <a name="output_secret_version_id"></a> [secret\_version\_id](#output\_secret\_version\_id) | The unique identifier of the version of the secret |

examples/complete/README.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,20 +29,21 @@ Note that this example may create resources which will incur monetary charges on
2929
| Name | Version |
3030
|------|---------|
3131
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0 |
32-
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 5.0 |
32+
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 6.0 |
3333

3434
## Providers
3535

3636
| Name | Version |
3737
|------|---------|
38-
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 5.0 |
38+
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 6.0 |
3939

4040
## Modules
4141

4242
| Name | Source | Version |
4343
|------|--------|---------|
4444
| <a name="module_lambda"></a> [lambda](#module\_lambda) | terraform-aws-modules/lambda/aws | ~> 6.0 |
4545
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
46+
| <a name="module_secrets_manager_another_region"></a> [secrets\_manager\_another\_region](#module\_secrets\_manager\_another\_region) | ../.. | n/a |
4647
| <a name="module_secrets_manager_disabled"></a> [secrets\_manager\_disabled](#module\_secrets\_manager\_disabled) | ../.. | n/a |
4748
| <a name="module_secrets_manager_rotate"></a> [secrets\_manager\_rotate](#module\_secrets\_manager\_rotate) | ../.. | n/a |
4849

examples/complete/main.tf

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -123,6 +123,17 @@ module "secrets_manager_disabled" {
123123
create = false
124124
}
125125

126+
module "secrets_manager_another_region" {
127+
source = "../.."
128+
129+
region = "us-east-1"
130+
name_prefix = local.name
131+
132+
create_random_password = true
133+
134+
tags = local.tags
135+
}
136+
126137
################################################################################
127138
# Supporting Resources
128139
################################################################################

examples/complete/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
aws = {
66
source = "hashicorp/aws"
7-
version = ">= 5.0"
7+
version = ">= 6.0"
88
}
99
}
1010
}

main.tf

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,8 @@
66
resource "aws_secretsmanager_secret" "this" {
77
count = var.create ? 1 : 0
88

9+
region = var.region
10+
911
description = var.description
1012
force_overwrite_replica_secret = var.force_overwrite_replica_secret
1113
kms_key_id = var.kms_key_id
@@ -80,6 +82,8 @@ data "aws_iam_policy_document" "this" {
8082
resource "aws_secretsmanager_secret_policy" "this" {
8183
count = var.create && var.create_policy ? 1 : 0
8284

85+
region = var.region
86+
8387
secret_arn = aws_secretsmanager_secret.this[0].arn
8488
policy = data.aws_iam_policy_document.this[0].json
8589
block_public_policy = var.block_public_policy
@@ -92,6 +96,8 @@ resource "aws_secretsmanager_secret_policy" "this" {
9296
resource "aws_secretsmanager_secret_version" "this" {
9397
count = var.create && !(var.enable_rotation || var.ignore_secret_changes) ? 1 : 0
9498

99+
region = var.region
100+
95101
secret_id = aws_secretsmanager_secret.this[0].id
96102
secret_string = var.create_random_password ? random_password.this[0].result : var.secret_string
97103
secret_binary = var.secret_binary
@@ -101,6 +107,8 @@ resource "aws_secretsmanager_secret_version" "this" {
101107
resource "aws_secretsmanager_secret_version" "ignore_changes" {
102108
count = var.create && (var.enable_rotation || var.ignore_secret_changes) ? 1 : 0
103109

110+
region = var.region
111+
104112
secret_id = aws_secretsmanager_secret.this[0].id
105113
secret_string = var.create_random_password ? random_password.this[0].result : var.secret_string
106114
secret_binary = var.secret_binary
@@ -130,6 +138,8 @@ resource "random_password" "this" {
130138
resource "aws_secretsmanager_secret_rotation" "this" {
131139
count = var.create && var.enable_rotation ? 1 : 0
132140

141+
region = var.region
142+
133143
rotation_lambda_arn = var.rotation_lambda_arn
134144

135145
dynamic "rotation_rules" {

outputs.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,11 @@ output "secret_binary" {
3434
value = try(aws_secretsmanager_secret_version.this[0].secret_binary, aws_secretsmanager_secret_version.ignore_changes[0].secret_binary, null)
3535
}
3636

37+
output "secret_region" {
38+
description = "The region of the secret"
39+
value = try(aws_secretsmanager_secret.this[0].region, null)
40+
}
41+
3742
################################################################################
3843
# Version
3944
################################################################################

variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,12 @@ variable "create" {
44
default = true
55
}
66

7+
variable "region" {
8+
description = "Region where the resource(s) will be managed. Defaults to the Region set in the provider configuration"
9+
type = string
10+
default = null
11+
}
12+
713
variable "tags" {
814
description = "A map of tags to add to all resources"
915
type = map(string)

versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
aws = {
66
source = "hashicorp/aws"
7-
version = ">= 5.0"
7+
version = ">= 6.0"
88
}
99
random = {
1010
source = "hashicorp/random"

wrappers/main.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,7 @@ module "wrapper" {
1919
random_password_length = try(each.value.random_password_length, var.defaults.random_password_length, 32)
2020
random_password_override_special = try(each.value.random_password_override_special, var.defaults.random_password_override_special, "!@#$%&*()-_=+[]{}<>:?")
2121
recovery_window_in_days = try(each.value.recovery_window_in_days, var.defaults.recovery_window_in_days, null)
22+
region = try(each.value.region, var.defaults.region, null)
2223
replica = try(each.value.replica, var.defaults.replica, {})
2324
rotation_lambda_arn = try(each.value.rotation_lambda_arn, var.defaults.rotation_lambda_arn, "")
2425
rotation_rules = try(each.value.rotation_rules, var.defaults.rotation_rules, {})

wrappers/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
aws = {
66
source = "hashicorp/aws"
7-
version = ">= 5.0"
7+
version = ">= 6.0"
88
}
99
random = {
1010
source = "hashicorp/random"

0 commit comments

Comments
 (0)