From ae5b0f051805fd4684f859d4acac40b59be95ffb Mon Sep 17 00:00:00 2001 From: John Cherian <42749436+JohnChe88@users.noreply.github.com> Date: Mon, 17 Apr 2023 12:38:21 -0400 Subject: [PATCH] Update secrets.tf Adding the force_destroy argument to delete the AWS secrets forcefully when encountered a roll back. The manual deletion is required if there is the argument is not present. --- sm-project-tf-gitlab/service-catalog-setup/secrets.tf | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/sm-project-tf-gitlab/service-catalog-setup/secrets.tf b/sm-project-tf-gitlab/service-catalog-setup/secrets.tf index 9983ceac..6a4fe725 100644 --- a/sm-project-tf-gitlab/service-catalog-setup/secrets.tf +++ b/sm-project-tf-gitlab/service-catalog-setup/secrets.tf @@ -6,6 +6,7 @@ resource "aws_secretsmanager_secret" "git_repo_secret" { name = "${local.cmn_res_name}-gitlab-token" description = "Secret for ML Gitlab private token" + force_destroy = true } resource "aws_secretsmanager_secret_version" "git_repo_secret_version" { @@ -21,6 +22,7 @@ resource "aws_secretsmanager_secret_version" "git_repo_secret_version" { resource "aws_secretsmanager_secret" "git_iam_access_key_secret" { name = "${local.cmn_res_name}-gitlab-iam-access-key" description = "Secret for ML Gitlab IAM Access Key" + force_destroy = true } resource "aws_secretsmanager_secret_version" "git_iam_access_key_version" { @@ -36,6 +38,7 @@ resource "aws_secretsmanager_secret_version" "git_iam_access_key_version" { resource "aws_secretsmanager_secret" "git_iam_secret_key_secret" { name = "${local.cmn_res_name}-gitlab-iam-secret-key" description = "Secret for ML Gitlab IAM Secret Key" + force_destroy = true } resource "aws_secretsmanager_secret_version" "git_iam_secret_key_version" { @@ -52,9 +55,10 @@ resource "aws_secretsmanager_secret_version" "git_iam_secret_key_version" { resource "aws_secretsmanager_secret" "gitlab_user_creds" { name = "${local.cmn_res_name}-gitlab-creds" description = "Secret for ML Github repo creds" + force_destroy = true } resource "aws_secretsmanager_secret_version" "gitlab_user_creds_version" { secret_id = aws_secretsmanager_secret.gitlab_user_creds.id secret_string = jsonencode({ username = var.gitlab_user_name, password = var.gitlab_private_token }) -} \ No newline at end of file +}