Skip to content

Revamp secretsmanager module #8

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 18 commits into from
Closed

Revamp secretsmanager module #8

wants to merge 18 commits into from

Conversation

JonRoma
Copy link
Collaborator

@JonRoma JonRoma commented May 13, 2025

No description provided.

JonRoma and others added 6 commits October 29, 2020 14:22
* Relabel versions in reverse order to try and prevent leaving versions unlabeled
* Add tagging functionality
* Remove default runtime environment setting
Upgrade to supported Python lambda runtimes.

*   Recent versions of Python re module demands r-strings instead
    of ordinary strings.

*   Update documentation to eliminate obsolete references to a
    default Python runtime. The runtime is determined when the
    infrastructure is deployed, and isn't baked into the module.
@JonRoma JonRoma self-assigned this May 13, 2025
@JonRoma JonRoma added enhancement New feature or request service:shibboleth-idp Shibboleth IdP labels May 13, 2025
JonRoma and others added 12 commits May 30, 2025 10:42
*   Replace one deprecated output variable.
*   Remove redundant output variable.
*   Streamline descriptions of other output variables.
*   Added support for disabling rotation of SecretsManager secrets.
    The previous iteration provided a default lambda function to do
    rotation whether it was desired or not.

*   Cleaned up legacy Terraform code by using `null` instead of empty
    string for some default variable declarations.

*   Some variables (the secret `name`) are now required, others are
    now optional.

*   Fixed `rotation_enabled` to accurately report when rotation is enabled.

*   Add `rotation_lambda_arn` to outputs.

*   When not assigning a lambda function to use rotation, avoid
    needless call to data source.

*   This module is not specific to the Shibboleth IdP data sealer.
    Remove all references in code and in README.md that implies
    that this module is specific to Shibboleth.

*   Created hierarchy of secret naming (e.g., "shibboleth-idp/data-sealer")
    so as to make it easier to find things contextually.

*   Renamed module and updated README.md to reflect new generic status
    of module.
*   Create submodules and move existing code, cleaning up in the process.

*   Support managing multiple secrets in a single directory, each
    secret having its own arguments -- namely, automatically_after_days,
    description, function_name, and recovery_window_in_days.

*   Rotation is optional since some secretsmanager use cases exist
    simply to take advantage of larger secrets that do not necessarily
    autorotate.

Some work on a policy is still needed.
NOTE:   This code was written for Shib-in-a-box; as such, it is probably
        no longer used and can be deleted if no future use is envisioned.

*   Import module source from the previous GitHub repository
    techservicesillinois/terraform-aws-aes128-key-rotation into
    this repo, under modules/lambda/rotate-aes128-key.

*   Get rid of default runtime. This should always require explicit
    selection.

*   Add tag support.
Fix error made during import of aes128-key-rotation-binary into this repo
wherein submodule's directory path was botched.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request service:shibboleth-idp Shibboleth IdP
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants