sondehub-infra/secrets.tf
Michaela Wheeler d3ca3cebfe
Pull secrets from secrets manager rather than S3 (#127)
Co-authored-by: xss <michaela@michaela.lgbt>
2023-10-22 15:49:32 +11:00

39 lines
890 B
HCL

resource "aws_secretsmanager_secret" "mqtt" {
name = "MQTT"
}
resource "aws_secretsmanager_secret_version" "mqtt" {
secret_id = aws_secretsmanager_secret.mqtt.id
secret_string = jsonencode(
{
HOST = join(",", local.websocket_host_addresses)
HOST_MOS_FORMAT = join(" ", [for x in local.websocket_host_addresses : "${x}:1883"])
PASSWORD = random_password.mqtt.result
USERNAME = "write"
}
)
}
resource "random_password" "mqtt" {
length = 18
special = false
lifecycle {
ignore_changes = [special]
}
}
resource "aws_secretsmanager_secret" "radiosondy" {
name = "RADIOSONDY"
}
resource "aws_secretsmanager_secret_version" "radiosondy" {
secret_id = aws_secretsmanager_secret.radiosondy.id
secret_string = jsonencode(
{
API_KEY = ""
}
)
lifecycle {
ignore_changes = [secret_string]
}
}