From df53a837924d830c0cb1704e11258ffc06de3879 Mon Sep 17 00:00:00 2001 From: John Nolan Date: Mon, 2 Dec 2024 17:02:46 +0000 Subject: [PATCH] Adds `ms_teams_webhook_url` secret --- .../secrets_production.tf | 13 +++++++++++++ 1 file changed, 13 insertions(+) diff --git a/modules/secrets-staff-infrastructure-certificate-services/secrets_production.tf b/modules/secrets-staff-infrastructure-certificate-services/secrets_production.tf index 3627e5a..1cc3ffa 100644 --- a/modules/secrets-staff-infrastructure-certificate-services/secrets_production.tf +++ b/modules/secrets-staff-infrastructure-certificate-services/secrets_production.tf @@ -206,3 +206,16 @@ resource "aws_secretsmanager_secret_version" "production_alz_cidr_block" { secret_string = "XXXX_NOT_REAL_VALUE_XXXX" lifecycle { ignore_changes = [secret_string] } } + +resource "aws_secretsmanager_secret" "production_ms_teams_webhook_url" { + name = "${local.supported-application}/production/ms_teams_webhook_url" + description = "Production MS Teams Webhook URL" + tags = merge(local.tag_secrets_staff_infrastructure_certificate_services_production, { env_var = "TF_VAR_ms_teams_webhook_url" }, { tf_var = "ms_teams_webhook_url" }) + lifecycle { prevent_destroy = true } +} + +resource "aws_secretsmanager_secret_version" "production_ms_teams_webhook_url" { + secret_id = aws_secretsmanager_secret.production_ms_teams_webhook_url.id + secret_string = "XXXX_NOT_REAL_VALUE_XXXX" + lifecycle { ignore_changes = [secret_string] } +}