Skip to content

Commit 4803ebc

Browse files
fix: remove sm-crn and add sm-region (#41)
1 parent ffd8c93 commit 4803ebc

File tree

8 files changed

+20
-25
lines changed

8 files changed

+20
-25
lines changed

cra-config.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,5 +20,5 @@ CRA_TARGETS:
2020
TF_VAR_watson_machine_learning_instance_resource_name: "test-machine-learning-instance"
2121
TF_VAR_inventory_repo_url: "https://us-south.git.cloud.ibm.com/yada.yada/04181-inventory-repo.git"
2222
TF_VAR_signing_key: "dummy value"
23-
TF_VAR_secrets_manager_crn: "dummy crn"
2423
TF_VAR_secrets_manager_guid: "dummy guid"
24+
TF_VAR_secrets_manager_region: "us-south"

solutions/banking/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -32,11 +32,11 @@ module "cos" {
3232
# secrets manager secrets - IBM IAM API KEY
3333
module "secrets_manager_secret_ibm_iam" {
3434
providers = {
35-
ibm = ibm.ibm_resources
35+
ibm = ibm.sm_resources
3636
}
3737
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
3838
version = "1.3.0"
39-
region = var.toolchain_region
39+
region = var.secrets_manager_region
4040
secrets_manager_guid = var.secrets_manager_guid
4141
secret_name = "ibmcloud-api-key"
4242
secret_description = "IBM IAM Api key"
@@ -47,11 +47,11 @@ module "secrets_manager_secret_ibm_iam" {
4747
# secrets manager secrets - IBM signing key
4848
module "secrets_manager_secret_signing_key" {
4949
providers = {
50-
ibm = ibm.ibm_resources
50+
ibm = ibm.sm_resources
5151
}
5252
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
5353
version = "1.3.0"
54-
region = var.toolchain_region
54+
region = var.secrets_manager_region
5555
secrets_manager_guid = var.secrets_manager_guid
5656
secret_name = "signing-key"
5757
secret_description = "IBM Signing GPG key"

solutions/banking/outputs.tf

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,3 @@ output "discovery_project_id" {
3232
description = "WatsonX Discovery Project ID."
3333
value = data.external.discovery_project_id.result.discovery_project_id
3434
}
35-
36-
output "secrets_manager_crn" {
37-
description = "Secrets Manager CRN."
38-
value = var.secrets_manager_crn
39-
}

solutions/banking/provider.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,12 @@ provider "ibm" {
44
region = var.toolchain_region
55
}
66

7+
provider "ibm" {
8+
alias = "sm_resources"
9+
ibmcloud_api_key = var.ibmcloud_api_key
10+
region = var.secrets_manager_region
11+
}
12+
713
provider "ibm" {
814
ibmcloud_api_key = var.watsonx_admin_api_key != null ? var.watsonx_admin_api_key : var.ibmcloud_api_key
915
region = var.toolchain_region

solutions/banking/variables.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -101,12 +101,12 @@ variable "signing_key" {
101101
sensitive = true
102102
}
103103

104-
variable "secrets_manager_crn" {
105-
description = "Secrets Manager CRN where the API key and signing key will be stored."
104+
variable "secrets_manager_guid" {
105+
description = "Secrets Manager GUID where the API key and signing key will be stored."
106106
type = string
107107
}
108108

109-
variable "secrets_manager_guid" {
110-
description = "Secrets Manager GUID where the API key and signing key will be stored."
109+
variable "secrets_manager_region" {
110+
description = "The region where the Secrets Manager instance previously created reside."
111111
type = string
112112
}

tests/pr_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ func TestRunBankingSolutions(t *testing.T) {
7979
"watson_machine_learning_instance_guid": terraform.Output(t, existingTerraformOptions, "watson_machine_learning_instance_guid"),
8080
"watson_machine_learning_instance_resource_name": terraform.Output(t, existingTerraformOptions, "watson_machine_learning_instance_resource_name"),
8181
"secrets_manager_guid": terraform.Output(t, existingTerraformOptions, "secrets_manager_guid"),
82-
"secrets_manager_crn": terraform.Output(t, existingTerraformOptions, "secrets_manager_crn"),
82+
"secrets_manager_region": region,
8383
"signing_key": terraform.Output(t, existingTerraformOptions, "signing_key"),
8484
},
8585
})

tests/resources/existing-resources/outputs.tf

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -53,11 +53,6 @@ output "secrets_manager_guid" {
5353
description = "GUID of Secrets Manager instance."
5454
}
5555

56-
output "secrets_manager_crn" {
57-
value = module.secrets_manager.secrets_manager_crn
58-
description = "CRN of the Secrets Manager instance."
59-
}
60-
6156
output "signing_key" {
6257
value = local.signing_key_payload
6358
sensitive = true

tests/scripts/pre-validation.sh

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ TF_VARS_FILE="terraform.tfvars"
4242
use_existing_resource_group_var_name="use_existing_resource_group"
4343
create_continuous_delivery_service_instance_var_name="create_continuous_delivery_service_instance"
4444
secrets_manager_guid_var_name="secrets_manager_guid"
45-
secrets_manager_crn_var_name="secrets_manager_crn"
45+
secrets_manager_region_var_name="secrets_manager_region"
4646
signing_key_var_name="signing_key"
4747

4848
resource_group_name_value=$(terraform output -state=terraform.tfstate -raw resource_group_name)
@@ -57,7 +57,6 @@ TF_VARS_FILE="terraform.tfvars"
5757
use_existing_resource_group_value=true
5858
create_continuous_delivery_service_instance_value=false
5959
secrets_manager_guid_value=$(terraform output -state=terraform.tfstate -raw secrets_manager_guid)
60-
secrets_manager_crn_value=$(terraform output -state=terraform.tfstate -raw secrets_manager_crn)
6160
signing_key_value=$(terraform output -state=terraform.tfstate -raw signing_key)
6261

6362
echo "Appending required input variable values to ${JSON_FILE}.."
@@ -93,9 +92,9 @@ TF_VARS_FILE="terraform.tfvars"
9392
--arg use_existing_resource_group_value "${use_existing_resource_group_value}" \
9493
--arg create_continuous_delivery_service_instance_var_name "${create_continuous_delivery_service_instance_var_name}" \
9594
--arg create_continuous_delivery_service_instance_value "${create_continuous_delivery_service_instance_value}" \
96-
--arg secrets_manager_crn_var_name "${secrets_manager_crn_var_name}" \
97-
--arg secrets_manager_crn_value "${secrets_manager_crn_value}" \
9895
--arg secrets_manager_guid_var_name "${secrets_manager_guid_var_name}" \
96+
--arg secrets_manager_region_var_name "${secrets_manager_region_var_name}" \
97+
--arg secrets_manager_region_value "${REGION}" \
9998
--arg secrets_manager_guid_value "${secrets_manager_guid_value}" \
10099
--arg signing_key_var_name "${signing_key_var_name}" \
101100
--arg signing_key_value "${signing_key_value}" \
@@ -114,8 +113,8 @@ TF_VARS_FILE="terraform.tfvars"
114113
($use_existing_resource_group_var_name): $use_existing_resource_group_value,
115114
($create_continuous_delivery_service_instance_var_name): $create_continuous_delivery_service_instance_value,
116115
($watson_machine_learning_instance_resource_name_var_name): $watson_machine_learning_instance_resource_name_value,
117-
($secrets_manager_crn_var_name): $secrets_manager_crn_value,
118116
($secrets_manager_guid_var_name): $secrets_manager_guid_value,
117+
($secrets_manager_region_var_name): $secrets_manager_region_value,
119118
($signing_key_var_name): $signing_key_value}' "${JSON_FILE}" > tmpfile && mv tmpfile "${JSON_FILE}" || exit 1
120119

121120
echo "Pre-validation complete successfully"

0 commit comments

Comments
 (0)