Browse Source

Disables the Secrets Manager for VMRay

We are using an Ubuntu Pro instance in AWS instead of using ua.

To be tagged v3.1.9
Fred Damstra [afs macbook] 3 năm trước cách đây
mục cha
commit
c34ad59fb5
1 tập tin đã thay đổi với 16 bổ sung13 xóa
  1. 16 13
      base/vmray_instances/server.tf

+ 16 - 13
base/vmray_instances/server.tf

@@ -156,23 +156,26 @@ resource "aws_instance" "vmray-server-instance" {
   volume_tags = merge( var.standard_tags, var.tags, { Name = "vmray-server" })
 }
 
+# Disabling this since we don't actually use it, but leaving this in here as 
+# an example for future engineers, hopefully.
+#
 # Secrets example:
 #  1. Find the secret
 #  2. Get the secret
 #  3. Decode the json
-data "aws_secretsmanager_secret" "ubuntu" {
-  name = "Ubuntu"
-  provider = aws.c2
-}
-
-data "aws_secretsmanager_secret_version" "ubuntu" {
-  secret_id = data.aws_secretsmanager_secret.ubuntu.id
-  provider = aws.c2
-}
-
-locals {
-  secret_ubuntu = jsondecode(data.aws_secretsmanager_secret_version.ubuntu.secret_string)
-}
+#data "aws_secretsmanager_secret" "ubuntu" {
+#  name = "Ubuntu"
+#  provider = aws.c2
+#}
+#
+#data "aws_secretsmanager_secret_version" "ubuntu" {
+#  secret_id = data.aws_secretsmanager_secret.ubuntu.id
+#  provider = aws.c2
+#}
+#
+#locals {
+#  secret_ubuntu = jsondecode(data.aws_secretsmanager_secret_version.ubuntu.secret_string)
+#}
 
 # Render a multi-part cloud-init config making use of the part
 # above, and other source files