@@ -8,10 +8,10 @@ resource "helm_release" "vault_cr_pwdpolicy" {
88 auth_path = " kubernetes_op"
99 auth_role = " policy-admin"
1010 resource_type = each.value.resource_type
11+ resource_name = each.value.resource_name
1112 namespace = kubernetes_namespace.stateful_namespace[each.value.resource_namespace].metadata[0 ].name
12- secret_password_policy = templatefile (" ${ path . module } /templates/password-policy.hcl.tpl" , { password_length = 20 , use_special_chars = false , special_char_list = " !@#$%^&* " })
13+ secret_password_policy = templatefile (" ${ path . module } /templates/password-policy.hcl.tpl" , { password_length = 20 , use_special_chars = var.password_policy_use_special_chars , special_char_list = var.password_policy_special_chars })
1314 vault_base_path = each.value.generate_secret_vault_base_path
14- resource_name = each.value.resource_name
1515 secret_name = each.value.generate_secret_name
1616 secret_keys_map = { for key in each . value . generate_secret_keys : key => " '{{ .dynamicsecret_${ replace (key, " -" , " _" )} .password }}'" }
1717 secret_namespaces = " [${ join (" ," , local. total_secret_namespaces [each . key ])} ]"
@@ -29,10 +29,10 @@ resource "helm_release" "vault_cr_randomsecret" {
2929 auth_path = " kubernetes_op"
3030 auth_role = " policy-admin"
3131 resource_type = each.value.resource_type
32+ resource_name = each.value.resource_name
3233 namespace = kubernetes_namespace.stateful_namespace[each.value.resource_namespace].metadata[0 ].name
33- secret_password_policy = templatefile (" ${ path . module } /templates/password-policy.hcl.tpl" , { password_length = 20 , use_special_chars = false , special_char_list = " !@#$%^&* " })
34+ secret_password_policy = templatefile (" ${ path . module } /templates/password-policy.hcl.tpl" , { password_length = 20 , use_special_chars = var.password_policy_use_special_chars , special_char_list = var.password_policy_special_chars })
3435 vault_base_path = each.value.generate_secret_vault_base_path
35- resource_name = each.value.resource_name
3636 secret_name = each.value.generate_secret_name
3737 secret_keys_map = { for key in each . value . generate_secret_keys : key => " '{{ .dynamicsecret_${ replace (key, " -" , " _" )} .password }}'" }
3838 secret_namespaces = " [${ join (" ," , local. total_secret_namespaces [each . key ])} ]"
@@ -53,10 +53,10 @@ resource "helm_release" "vault_cr_vaultsecret" {
5353 auth_path = " kubernetes_op"
5454 auth_role = " policy-admin"
5555 resource_type = each.value.resource_type
56+ resource_name = each.value.resource_name
5657 namespace = kubernetes_namespace.stateful_namespace[each.value.resource_namespace].metadata[0 ].name
57- secret_password_policy = templatefile (" ${ path . module } /templates/password-policy.hcl.tpl" , { password_length = 20 , use_special_chars = false , special_char_list = " !@#$%^&* " })
58+ secret_password_policy = templatefile (" ${ path . module } /templates/password-policy.hcl.tpl" , { password_length = 20 , use_special_chars = var.password_policy_use_special_chars , special_char_list = var.password_policy_special_chars })
5859 vault_base_path = each.value.generate_secret_vault_base_path
59- resource_name = each.value.resource_name
6060 secret_name = each.value.generate_secret_name
6161 secret_keys_map = { for key in each . value . generate_secret_keys : key => " '{{ .dynamicsecret_${ replace (key, " -" , " _" )} .password }}'" }
6262 secret_namespaces = " [${ join (" ," , local. total_secret_namespaces [each . key ])} ]"
0 commit comments