diff --git a/modules/security_identity_compliance/secretsmanager-secret/README.md b/modules/security_identity_compliance/secretsmanager-secret/README.md new file mode 100644 index 0000000..fc4b87b --- /dev/null +++ b/modules/security_identity_compliance/secretsmanager-secret/README.md @@ -0,0 +1,16 @@ +# secretsmanager-secret module +This module creates an entry in secretsmanager, attaching a default access policy if one is +not provided from root module. A random suffix is assigned to every secret, as AWS may delay +creation of secrets with the same name, after the old one has been destroyed that is. + +To tag resources, please use provider default_tags. + +## Example +```hcl +module secret_item { + source = "../../modules/security_identity_compliance/secretsmanager-secret" + + secret_description = "test-secret-desc" + secret_value = "test-secret-value" +} +``` \ No newline at end of file diff --git a/modules/security_identity_compliance/secretsmanager-secret/provider.tf b/modules/security_identity_compliance/secretsmanager-secret/provider.tf index 6f10a6e..6bdf7d8 100644 --- a/modules/security_identity_compliance/secretsmanager-secret/provider.tf +++ b/modules/security_identity_compliance/secretsmanager-secret/provider.tf @@ -1,7 +1,3 @@ -provider "aws" { - region = var.aws-region -} - terraform { required_version = ">= 1.3.0" required_providers { @@ -10,6 +6,4 @@ terraform { version = ">= 4.40" } } -} - -resource time_static current_time {} \ No newline at end of file +} \ No newline at end of file diff --git a/modules/security_identity_compliance/secretsmanager-secret/variables.tf b/modules/security_identity_compliance/secretsmanager-secret/variables.tf index 355a827..4a943dc 100644 --- a/modules/security_identity_compliance/secretsmanager-secret/variables.tf +++ b/modules/security_identity_compliance/secretsmanager-secret/variables.tf @@ -1,4 +1,3 @@ -variable "aws-region" {} variable "secret_description" {} variable "secret_value" {} variable "secret_policy" {