You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: The DA has been locked down to only support private only instances. So the existing_secrets_endpoint_type and allowed_network inputs have been removed. (#259)
Copy file name to clipboardexpand all lines: modules/fscloud/README.md
+2
Original file line number
Diff line number
Diff line change
@@ -51,13 +51,15 @@ No resources.
51
51
| <aname="input_enable_event_notification"></a> [enable\_event\_notification](#input\_enable\_event\_notification)| Set this to true to enable lifecycle notifications for your Secrets Manager instance by connecting an Event Notifications service. When setting this to true, a value must be passed for `existing_en_instance_crn` variable. |`bool`|`false`| no |
52
52
| <aname="input_existing_en_instance_crn"></a> [existing\_en\_instance\_crn](#input\_existing\_en\_instance\_crn)| The CRN of the Event Notifications service to enable lifecycle notifications for your Secrets Manager instance. |`string`|`null`| no |
53
53
| <aname="input_existing_kms_instance_guid"></a> [existing\_kms\_instance\_guid](#input\_existing\_kms\_instance\_guid)| The GUID of the Hyper Protect Crypto Services instance in which the key specified in `kms_key_crn` is coming from. |`string`| n/a | yes |
54
+
| <aname="input_existing_sm_instance_crn"></a> [existing\_sm\_instance\_crn](#input\_existing\_sm\_instance\_crn)| The CRN of an existing Secrets Manager instance. If not supplied, a new instance is created. |`string`|`null`| no |
54
55
| <aname="input_kms_key_crn"></a> [kms\_key\_crn](#input\_kms\_key\_crn)| The root key CRN of Hyper Protect Crypto Services (HPCS) that you want to use for encryption. |`string`| n/a | yes |
55
56
| <aname="input_region"></a> [region](#input\_region)| The region to provision the Secrets Manager instance to. |`string`| n/a | yes |
56
57
| <aname="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id)| The ID of the resource group to provision the Secrets Manager instance to. |`string`| n/a | yes |
| <aname="input_secrets_manager_name"></a> [secrets\_manager\_name](#input\_secrets\_manager\_name)| The name to give the Secrets Manager instance. |`string`| n/a | yes |
59
60
| <aname="input_service_plan"></a> [service\_plan](#input\_service\_plan)| The Secrets Manager plan to provision. |`string`|`"standard"`| no |
60
61
| <aname="input_skip_en_iam_authorization_policy"></a> [skip\_en\_iam\_authorization\_policy](#input\_skip\_en\_iam\_authorization\_policy)| Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances (scoped to the resource group) an 'Event Source Manager' role to the given Event Notifications instance passed in the `existing_en_instance_crn` input variable. In addition, no policy is created if `enable_event_notification` is set to false. |`bool`|`false`| no |
62
+
| <aname="input_skip_kms_iam_authorization_policy"></a> [skip\_kms\_iam\_authorization\_policy](#input\_skip\_kms\_iam\_authorization\_policy)| Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances in the resource group to read the encryption key from the KMS instance. If set to false, pass in a value for the KMS instance in the `existing_kms_instance_crn` variable. If a value is specified for `ibmcloud_kms_api_key`, the policy is created in the KMS account. |`bool`|`false`| no |
61
63
| <aname="input_sm_tags"></a> [sm\_tags](#input\_sm\_tags)| The list of resource tags that you want to associate with your Secrets Manager instance. |`list(string)`|`[]`| no |
Copy file name to clipboardexpand all lines: modules/fscloud/variables.tf
+12
Original file line number
Diff line number
Diff line change
@@ -29,6 +29,18 @@ variable "sm_tags" {
29
29
default=[]
30
30
}
31
31
32
+
variable"existing_sm_instance_crn" {
33
+
type=string
34
+
description="The CRN of an existing Secrets Manager instance. If not supplied, a new instance is created."
35
+
default=null
36
+
}
37
+
38
+
variable"skip_kms_iam_authorization_policy" {
39
+
type=bool
40
+
description="Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances in the resource group to read the encryption key from the KMS instance. If set to false, pass in a value for the KMS instance in the `existing_kms_instance_crn` variable. If a value is specified for `ibmcloud_kms_api_key`, the policy is created in the KMS account."
error_message="Only \"public\" and \"private\" are allowed values for 'existing_secrets_endpoint_type'."
68
-
}
69
-
}
70
-
71
61
variable"service_plan" {
72
62
type=string
73
63
description="The pricing plan to use when provisioning a Secrets Manager instance. Possible values: `standard`, `trial`. Applies only if `provision_sm_instance` is set to `true`."
@@ -78,16 +68,6 @@ variable "service_plan" {
78
68
}
79
69
}
80
70
81
-
variable"allowed_network" {
82
-
type=string
83
-
description="The types of service endpoints to set on the Secrets Manager instance. Possible values: `private-only`, `public-and-private`."
0 commit comments