Skip to content

Commit 26724ab

Browse files
fix: Disable endpoint creation when setting create_proxy = false (#12)
Co-authored-by: Bryant Biggs <bryantbiggs@gmail.com>
1 parent 8c1720c commit 26724ab

File tree

6 files changed

+7
-7
lines changed

6 files changed

+7
-7
lines changed

.pre-commit-config.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
repos:
22
- repo: https://github.com/antonbabenko/pre-commit-terraform
3-
rev: v1.68.1
3+
rev: v1.74.1
44
hooks:
55
- id: terraform_fmt
66
- id: terraform_validate
@@ -23,7 +23,7 @@ repos:
2323
- '--args=--only=terraform_standard_module_structure'
2424
- '--args=--only=terraform_workspace_remote'
2525
- repo: https://github.com/pre-commit/pre-commit-hooks
26-
rev: v4.2.0
26+
rev: v4.3.0
2727
hooks:
2828
- id: check-merge-conflict
2929
- id: end-of-file-fixer

examples/mysql_iam_cluster/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ module "rds_proxy" {
4747
}
4848

4949
secrets = {
50-
"${local.db_username}" = {
50+
(local.db_username) = {
5151
description = aws_secretsmanager_secret.superuser.description
5252
arn = aws_secretsmanager_secret.superuser.arn
5353
kms_key_id = aws_secretsmanager_secret.superuser.kms_key_id

examples/mysql_iam_instance/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ module "rds_proxy" {
4747
}
4848

4949
secrets = {
50-
"${local.db_username}" = {
50+
(local.db_username) = {
5151
description = aws_secretsmanager_secret.superuser.description
5252
arn = aws_secretsmanager_secret.superuser.arn
5353
kms_key_id = aws_secretsmanager_secret.superuser.kms_key_id

examples/postgresql_iam_cluster/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ module "rds_proxy" {
4747
}
4848

4949
secrets = {
50-
"${local.db_username}" = {
50+
(local.db_username) = {
5151
description = aws_secretsmanager_secret.superuser.description
5252
arn = aws_secretsmanager_secret.superuser.arn
5353
kms_key_id = aws_secretsmanager_secret.superuser.kms_key_id

examples/postgresql_iam_instance/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ module "rds_proxy" {
4747
}
4848

4949
secrets = {
50-
"${local.db_username}" = {
50+
(local.db_username) = {
5151
description = aws_secretsmanager_secret.superuser.description
5252
arn = aws_secretsmanager_secret.superuser.arn
5353
kms_key_id = aws_secretsmanager_secret.superuser.kms_key_id

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -68,7 +68,7 @@ resource "aws_db_proxy_target" "db_cluster" {
6868
}
6969

7070
resource "aws_db_proxy_endpoint" "this" {
71-
for_each = var.db_proxy_endpoints
71+
for_each = { for k, v in var.db_proxy_endpoints : k => v if var.create_proxy }
7272

7373
db_proxy_name = aws_db_proxy.this[0].name
7474
db_proxy_endpoint_name = each.value.name

0 commit comments

Comments
 (0)