@@ -18,7 +18,6 @@ locals {
1818
1919
2020 sm_region = var. existing_sm_instance_region == null ? var. region : var. existing_sm_instance_region
21- sm_acct_id = var. existing_sm_instance_guid == null ? module. iam_secrets_engine [0 ]. acct_secret_group_id : module. secrets_manager_group_acct [0 ]. secret_group_id
2221 es_namespace_apikey = " es-operator" # pragma: allowlist secret
2322 eso_namespace = " apikeynspace1"
2423}
@@ -279,30 +278,11 @@ resource "ibm_resource_instance" "secrets_manager" {
279278module "secrets_manager_group_acct" {
280279 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
281280 version = " 1.3.2"
282- count = var. existing_sm_instance_guid == null ? 0 : 1
283281 region = local. sm_region
284282 secrets_manager_guid = local. sm_guid
285283 # tfsec:ignore:general-secrets-no-plaintext-exposure
286284 secret_group_name = " ${ var . prefix } -account-secret-group" # checkov:skip=CKV_SECRET_6: does not require high entropy string as is static value
287285 secret_group_description = " Secret-Group for storing account credentials" # tfsec:ignore:general-secrets-no-plaintext-exposure
288- depends_on = [module . iam_secrets_engine ]
289- providers = {
290- ibm = ibm.ibm- sm
291- }
292- }
293-
294- # Configure instance with IAM engine
295- module "iam_secrets_engine" {
296- count = var. existing_sm_instance_guid == null ? 1 : 0
297- source = " terraform-ibm-modules/secrets-manager-iam-engine/ibm"
298- version = " 1.2.11"
299- region = local. sm_region
300- secrets_manager_guid = ibm_resource_instance. secrets_manager [0 ]. guid
301- iam_secret_generator_service_id_name = " ${ var . prefix } -sid:0.0.1:${ ibm_resource_instance . secrets_manager [0 ]. name } -iam-secret-generator:automated:simple-service:secret-manager:"
302- iam_secret_generator_apikey_name = " ${ var . prefix } -iam-secret-generator-apikey"
303- new_secret_group_name = " ${ var . prefix } -account-secret-group"
304- iam_secret_generator_apikey_secret_name = " ${ var . prefix } -iam-secret-generator-apikey-secret"
305- iam_engine_name = " iam-engine"
306286 providers = {
307287 ibm = ibm.ibm- sm
308288 }
@@ -327,7 +307,7 @@ resource "ibm_iam_service_policy" "secret_puller_policy" {
327307 service = " secrets-manager"
328308 resource_instance_id = local. sm_guid
329309 resource_type = " secret-group"
330- resource = local . sm_acct_id
310+ resource = module . secrets_manager_group_acct . secret_group_id
331311 }
332312}
333313
@@ -353,8 +333,8 @@ module "dynamic_serviceid_apikey1" {
353333 sm_iam_secret_description = " Example of dynamic IAM secret / apikey" # tfsec:ignore:general-secrets-no-plaintext-exposure
354334 serviceid_id = ibm_iam_service_id. secret_puller . id
355335 secrets_manager_guid = local. sm_guid
356- secret_group_id = local . sm_acct_id
357- depends_on = [module . iam_secrets_engine , ibm_iam_service_policy . secret_puller_policy , ibm_iam_service_id . secret_puller ]
336+ secret_group_id = module . secrets_manager_group_acct . secret_group_id
337+ depends_on = [ibm_iam_service_policy . secret_puller_policy , ibm_iam_service_id . secret_puller ]
358338 providers = {
359339 ibm = ibm.ibm- sm
360340 }
@@ -403,7 +383,7 @@ module "sm_userpass_secret" {
403383 version = " 1.7.0"
404384 region = local. sm_region
405385 secrets_manager_guid = local. sm_guid
406- secret_group_id = local . sm_acct_id
386+ secret_group_id = module . secrets_manager_group_acct . secret_group_id
407387 # tfsec:ignore:general-secrets-no-plaintext-exposure
408388 secret_name = " ${ var . prefix } -usernamepassword-secret" # checkov:skip=CKV_SECRET_6
409389 secret_description = " example secret in existing secret manager instance" # tfsec:ignore:general-secrets-no-plaintext-exposure # checkov:skip=CKV_SECRET_6
0 commit comments