Skip to content

Commit 67c1bf7

Browse files
Aashiq-Jocofaigh
andauthored
feat: remove all code to create a secrets manager instance - use the [terraform-ibm-secrets-manager](https://github.com/terraform-ibm-modules/terraform-ibm-secrets-manager) module instead (#660)
Co-authored-by: Conall Ó Cofaigh <[email protected]>
1 parent 71ccb55 commit 67c1bf7

File tree

29 files changed

+1
-278
lines changed

29 files changed

+1
-278
lines changed

README.md

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -885,13 +885,11 @@ module "cluster_pattern" {
885885
| [ibm_resource_group.resource_groups](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/resource_group) | resource |
886886
| [ibm_resource_instance.appid](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/resource_instance) | resource |
887887
| [ibm_resource_instance.cos](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/resource_instance) | resource |
888-
| [ibm_resource_instance.secrets_manager](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/resource_instance) | resource |
889888
| [ibm_resource_key.appid_key](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/resource_key) | resource |
890889
| [ibm_resource_key.key](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/resource_key) | resource |
891890
| [ibm_resource_tag.bucket_tag](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/resource_tag) | resource |
892891
| [ibm_resource_tag.cluster_tag](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/resource_tag) | resource |
893892
| [ibm_resource_tag.cos_tag](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/resource_tag) | resource |
894-
| [ibm_resource_tag.secrets_manager_tag](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/resource_tag) | resource |
895893
| [ibm_tg_connection.connection](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/tg_connection) | resource |
896894
| [ibm_tg_gateway.transit_gateway](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/resources/tg_gateway) | resource |
897895
| [random_string.random_cos_suffix](https://registry.terraform.io/providers/hashicorp/random/latest/docs/resources/string) | resource |
@@ -922,7 +920,6 @@ module "cluster_pattern" {
922920
| <a name="input_prefix"></a> [prefix](#input\_prefix) | A unique identifier for resources. Must begin with a letter and end with a letter or number. This prefix will be prepended to any resources provisioned by this template. Prefixes must be 16 or fewer characters. | `string` | n/a | yes |
923921
| <a name="input_region"></a> [region](#input\_region) | Region where VPC will be created. To find your VPC region, use `ibmcloud is regions` command to find available regions. | `string` | n/a | yes |
924922
| <a name="input_resource_groups"></a> [resource\_groups](#input\_resource\_groups) | Object describing resource groups to create or reference | <pre>list(<br> object({<br> name = string<br> create = optional(bool)<br> use_prefix = optional(bool)<br> })<br> )</pre> | n/a | yes |
925-
| <a name="input_secrets_manager"></a> [secrets\_manager](#input\_secrets\_manager) | Map describing an optional secrets manager deployment | <pre>object({<br> use_secrets_manager = bool<br> name = optional(string)<br> kms_key_name = optional(string)<br> resource_group = optional(string)<br> access_tags = optional(list(string), [])<br> })</pre> | <pre>{<br> "use_secrets_manager": false<br>}</pre> | no |
926923
| <a name="input_security_groups"></a> [security\_groups](#input\_security\_groups) | Security groups for VPC | <pre>list(<br> object({<br> name = string<br> vpc_name = string<br> resource_group = optional(string)<br> access_tags = optional(list(string), [])<br> rules = list(<br> object({<br> name = string<br> direction = string<br> source = string<br> tcp = optional(<br> object({<br> port_max = number<br> port_min = number<br> })<br> )<br> udp = optional(<br> object({<br> port_max = number<br> port_min = number<br> })<br> )<br> icmp = optional(<br> object({<br> type = number<br> code = number<br> })<br> )<br> })<br> )<br> })<br> )</pre> | `[]` | no |
927924
| <a name="input_service_endpoints"></a> [service\_endpoints](#input\_service\_endpoints) | Service endpoints. Can be `public`, `private`, or `public-and-private` | `string` | `"private"` | no |
928925
| <a name="input_ssh_keys"></a> [ssh\_keys](#input\_ssh\_keys) | SSH keys to use to provision a VSI. Must be an RSA key with a key size of either 2048 bits or 4096 bits (recommended). If `public_key` is not provided, the named key will be looked up from data. If a resource group name is added, it must be included in `var.resource_groups`. See https://cloud.ibm.com/docs/vpc?topic=vpc-ssh-keys. | <pre>list(<br> object({<br> name = string<br> public_key = optional(string)<br> resource_group = optional(string)<br> })<br> )</pre> | n/a | yes |
@@ -966,7 +963,6 @@ module "cluster_pattern" {
966963
| <a name="output_placement_groups"></a> [placement\_groups](#output\_placement\_groups) | List of placement groups. |
967964
| <a name="output_resource_group_data"></a> [resource\_group\_data](#output\_resource\_group\_data) | List of resource groups data used within landing zone. |
968965
| <a name="output_resource_group_names"></a> [resource\_group\_names](#output\_resource\_group\_names) | List of resource groups names used within landing zone. |
969-
| <a name="output_secrets_manager_data"></a> [secrets\_manager\_data](#output\_secrets\_manager\_data) | Secrets manager instance |
970966
| <a name="output_security_group_data"></a> [security\_group\_data](#output\_security\_group\_data) | List of security group data |
971967
| <a name="output_security_group_names"></a> [security\_group\_names](#output\_security\_group\_names) | List of security group names |
972968
| <a name="output_service_authorization_data"></a> [service\_authorization\_data](#output\_service\_authorization\_data) | List of service authorization data |

dynamic_values.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,6 @@ module "dynamic_values" {
3030
teleport_domain = tostring(var.teleport_config_data.domain)
3131
f5_vsi = var.f5_vsi
3232
f5_template_data = var.f5_template_data
33-
secrets_manager = var.secrets_manager
3433
add_kms_block_storage_s2s = var.add_kms_block_storage_s2s
3534
atracker_cos_bucket = var.atracker.add_route == true ? var.atracker.collector_bucket_name : null
3635
}

dynamic_values/config_modules/service_authorizations/service_authorizations.tf

Lines changed: 0 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -18,10 +18,6 @@ variable "cos" {
1818
description = "COS variable"
1919
}
2020

21-
variable "secrets_manager" {
22-
description = "Secrets Manager config"
23-
}
24-
2521
variable "add_kms_block_storage_s2s" {
2622
description = "Add kms to block storage s2s"
2723
}
@@ -93,22 +89,6 @@ module "flow_logs_to_cos" {
9389
]
9490
}
9591

96-
module "secrets_manager_to_cos" {
97-
source = "../list_to_map"
98-
list = [
99-
for instance in(var.secrets_manager.use_secrets_manager ? ["secrets-manager-to-kms"] : []) :
100-
{
101-
name = instance
102-
source_service_name = "secrets-manager"
103-
source_resource_group_id = var.secrets_manager.resource_group
104-
description = "Allow secrets manager to read from Key Management"
105-
roles = ["Reader"]
106-
target_service_name = local.target_key_management_service
107-
target_resource_instance_id = var.key_management_guid
108-
} if local.target_key_management_service != null
109-
]
110-
}
111-
11292
##############################################################################
11393

11494
##############################################################################
@@ -150,7 +130,6 @@ output "authorizations" {
150130
module.kms_to_block_storage.value,
151131
module.cos_to_key_management.value,
152132
module.flow_logs_to_cos.value,
153-
module.secrets_manager_to_cos.value,
154133
module.atracker_to_cos.value
155134
)
156135
}

dynamic_values/service_authorizations.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,6 @@ module "service_authorizations" {
88
key_management_guid = var.key_management_guid
99
cos = var.cos
1010
cos_instance_ids = local.cos_instance_ids
11-
secrets_manager = var.secrets_manager
1211
add_kms_block_storage_s2s = var.add_kms_block_storage_s2s
1312
atracker_cos_bucket = var.atracker_cos_bucket
1413
}

dynamic_values/variables.tf

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -186,16 +186,6 @@ variable "f5_template_data" {
186186

187187
##############################################################################
188188

189-
##############################################################################
190-
# Secrets Manager Variables
191-
##############################################################################
192-
193-
variable "secrets_manager" {
194-
description = "Direct reference to secrets manager variable"
195-
}
196-
197-
##############################################################################
198-
199189
##############################################################################
200190
# Service Authorization Variables
201191
##############################################################################

examples/one-vpc-one-vsi/override.json

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -94,13 +94,6 @@
9494
"use_prefix": true
9595
}
9696
],
97-
"secrets_manager": {
98-
"access_tags": [],
99-
"kms_key_name": null,
100-
"name": null,
101-
"resource_group": null,
102-
"use_secrets_manager": false
103-
},
10497
"network_cidr": "10.0.0.0/8",
10598
"vpcs": [
10699
{

examples/override-example/override.json

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -168,13 +168,6 @@
168168
"use_prefix": true
169169
}
170170
],
171-
"secrets_manager": {
172-
"access_tags": [],
173-
"kms_key_name": null,
174-
"name": null,
175-
"resource_group": null,
176-
"use_secrets_manager": false
177-
},
178171
"network_cidr": "10.0.0.0/8",
179172
"vpcs": [
180173
{

ibm_catalog.json

Lines changed: 1 addition & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -265,10 +265,6 @@
265265
"hidden": true,
266266
"key": "tgstandby_url"
267267
},
268-
{
269-
"key": "create_secrets_manager",
270-
"hidden": true
271-
},
272268
{
273269
"hidden": true,
274270
"key": "f5_image_name"
@@ -849,10 +845,6 @@
849845
"key": "teleport_admin_email",
850846
"hidden": true
851847
},
852-
{
853-
"key": "create_secrets_manager",
854-
"hidden": true
855-
},
856848
{
857849
"key": "override",
858850
"hidden": true
@@ -1212,10 +1204,7 @@
12121204
"hidden": true,
12131205
"key": "use_existing_appid"
12141206
},
1215-
{
1216-
"key": "create_secrets_manager",
1217-
"hidden": true
1218-
},
1207+
12191208
{
12201209
"hidden": true,
12211210
"key": "teleport_version"

outputs.tf

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -253,16 +253,6 @@ output "resource_group_data" {
253253
value = local.resource_groups
254254
}
255255

256-
##############################################################################
257-
258-
##############################################################################
259-
# Secrets Manager Outputs
260-
##############################################################################
261-
262-
output "secrets_manager_data" {
263-
description = "Secrets manager instance"
264-
value = var.secrets_manager.use_secrets_manager ? ibm_resource_instance.secrets_manager[0] : null
265-
}
266256

267257
##############################################################################
268258

patterns/mixed/config.tf

Lines changed: 0 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -239,19 +239,6 @@ locals {
239239

240240
##############################################################################
241241

242-
##############################################################################
243-
# Secrets Manager Config
244-
##############################################################################
245-
246-
secrets_manager = {
247-
use_secrets_manager = var.create_secrets_manager
248-
name = var.create_secrets_manager ? "${var.prefix}-secrets-manager" : null
249-
resource_group = var.create_secrets_manager ? "${var.prefix}-service-rg" : null
250-
kms_key_name = var.create_secrets_manager ? "${var.prefix}-slz-key" : null
251-
}
252-
253-
##############################################################################
254-
255242
##############################################################################
256243
# Teleport Config Data
257244
##############################################################################
@@ -306,7 +293,6 @@ locals {
306293
iam_account_settings = lookup(local.override[local.override_type], "iam_account_settings", local.config.iam_account_settings)
307294
access_groups = lookup(local.override[local.override_type], "access_groups", local.config.access_groups)
308295
appid = lookup(local.override[local.override_type], "appid", local.config.appid)
309-
secrets_manager = lookup(local.override[local.override_type], "secrets_manager", local.config.secrets_manager)
310296
f5_vsi = lookup(local.override[local.override_type], "f5_vsi", local.config.f5_deployments)
311297
f5_template_data = {
312298
tmos_admin_password = lookup(local.override[local.override_type], "f5_template_data", null) == null ? var.tmos_admin_password : lookup(local.override[local.override_type].f5_template_data, "tmos_admin_password", var.tmos_admin_password)

0 commit comments

Comments
 (0)