rhythmictech / terraform-aws-secretsmanager-secret

Simple secret module for AWS Secrets Manager
https://registry.terraform.io/modules/rhythmictech/secretsmanager-secret/aws
MIT License
10 stars 19 forks source link

Getting error while executing the code with command "terraform plan", getting the below exception. #15

Open swagat2020 opened 2 years ago

swagat2020 commented 2 years ago

While doing the plan its asking for few parameters like:

var.name Name of secret to store

I've passed the value as default-secret

var.value Secret value to store Error

Enter a value: I've passed the value as- password.

I'm getting the below exception, can you pls kindly help me here?

swagat2020 commented 2 years ago

Any update?

sdickenson commented 2 years ago

@swagat2020 for the time being you can fix this by removing the secret_version output from the outputs.tf file, or you can update the secret_version output resource to include the parameter sensitive = true. This should fix your issue while we get this pushed into the mainline code.

swagat2020 commented 2 years ago

Thanks mate, it works :) changed it to output "secret_version" { description = "AWS SecretManager Secret Version resource" value = aws_secretsmanager_secret_version.secret sensitive = true }

On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson @.***> wrote:

@swagat2020 https://github.com/swagat2020 for the time being you can fix this by removing the secret_version output from the outputs.tf file, or you can update the secret_version output resource to include the parameter sensitive = true. This should fix your issue while we get this pushed into the mainline code.

— Reply to this email directly, view it on GitHub https://github.com/rhythmictech/terraform-aws-secretsmanager-secret/issues/15#issuecomment-1203293765, or unsubscribe https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA . You are receiving this because you were mentioned.Message ID: <rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@ github.com>

swagat2020 commented 2 years ago

One more help I want, actually we're using the terratest framework, do you have the golang code for the same template? It'll be helpful :)

On Wed, Aug 3, 2022 at 11:36 AM swagat biswal @.***> wrote:

Thanks mate, it works :) changed it to output "secret_version" { description = "AWS SecretManager Secret Version resource" value = aws_secretsmanager_secret_version.secret sensitive = true }

On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson @.***> wrote:

@swagat2020 https://github.com/swagat2020 for the time being you can fix this by removing the secret_version output from the outputs.tf file, or you can update the secret_version output resource to include the parameter sensitive = true. This should fix your issue while we get this pushed into the mainline code.

— Reply to this email directly, view it on GitHub https://github.com/rhythmictech/terraform-aws-secretsmanager-secret/issues/15#issuecomment-1203293765, or unsubscribe https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA . You are receiving this because you were mentioned.Message ID: <rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@ github.com>

swagat2020 commented 2 years ago

I want to bypass the secret name and value in runtime, how can I do that? Can you guide me on the same please.

On Wed, Aug 3, 2022 at 11:36 AM swagat biswal @.***> wrote:

Thanks mate, it works :) changed it to output "secret_version" { description = "AWS SecretManager Secret Version resource" value = aws_secretsmanager_secret_version.secret sensitive = true }

On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson @.***> wrote:

@swagat2020 https://github.com/swagat2020 for the time being you can fix this by removing the secret_version output from the outputs.tf file, or you can update the secret_version output resource to include the parameter sensitive = true. This should fix your issue while we get this pushed into the mainline code.

— Reply to this email directly, view it on GitHub https://github.com/rhythmictech/terraform-aws-secretsmanager-secret/issues/15#issuecomment-1203293765, or unsubscribe https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA . You are receiving this because you were mentioned.Message ID: <rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@ github.com>

swagat2020 commented 2 years ago

Dear Team,

Thanks for being able to implement the terraform template using the github repository code.

Can you pls help me with, replica & rotation enabled under terraform template for secret manager secret.

Regards, Swagat

On Wed, Aug 3, 2022 at 4:30 AM Steven Dickenson @.***> wrote:

@swagat2020 https://github.com/swagat2020 for the time being you can fix this by removing the secret_version output from the outputs.tf file, or you can update the secret_version output resource to include the parameter sensitive = true. This should fix your issue while we get this pushed into the mainline code.

— Reply to this email directly, view it on GitHub https://github.com/rhythmictech/terraform-aws-secretsmanager-secret/issues/15#issuecomment-1203293765, or unsubscribe https://github.com/notifications/unsubscribe-auth/APQZZAUG6HQL7GPOSJEFP7TVXGSBJANCNFSM55FF7INA . You are receiving this because you were mentioned.Message ID: <rhythmictech/terraform-aws-secretsmanager-secret/issues/15/1203293765@ github.com>