You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: feat: The service_endpoints variable has been renamed to allowed_network and now only accepts the following values: private-only or public-and-private (#69)
| <aname="input_allowed_network"></a> [allowed\_network](#input\_allowed\_network)| The types of service endpoints to set on the Secrets Manager instance. Possible values are `private-only` or `public-and-private`. |`string`|`"public-and-private"`| no |
94
94
| <aname="input_cbr_rules"></a> [cbr\_rules](#input\_cbr\_rules)| (Optional, list) List of CBR rules to create | <pre>list(object({<br> description = string<br> account_id = string<br> rule_contexts = list(object({<br> attributes = optional(list(object({<br> name = string<br> value = string<br> }))) }))<br> enforcement_mode = string<br> }))</pre> |`[]`| no |
95
95
| <aname="input_enable_event_notification"></a> [enable\_event\_notification](#input\_enable\_event\_notification)| Set this to true to enable lifecycle notifications for your Secrets Manager instance by connecting an Event Notifications service. When setting this to true, a value must be passed for `existing_en_instance_crn` variable. |`bool`|`false`| no |
96
96
| <aname="input_endpoint_type"></a> [endpoint\_type](#input\_endpoint\_type)| The type of endpoint (public or private) to connect to the Secrets Manager API. The Terraform provider uses this endpoint type to interact with the Secrets Manager API and configure Event Notifications. |`string`|`"public"`| no |
@@ -101,7 +101,6 @@ You need the following permissions to run this module.
101
101
| <aname="input_region"></a> [region](#input\_region)| The region to provision the Secrets Manager instance to. |`string`| n/a | yes |
102
102
| <aname="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id)| The ID of the resource group to provision the Secrets Manager instance to. |`string`| n/a | yes |
103
103
| <aname="input_secrets_manager_name"></a> [secrets\_manager\_name](#input\_secrets\_manager\_name)| The name to give the Secrets Manager instance. |`string`| n/a | yes |
104
-
| <aname="input_service_endpoints"></a> [service\_endpoints](#input\_service\_endpoints)| The types of service endpoints to set on the Secrets Manager instance. Possible values are `public`, `private` or `public-and-private`. |`string`|`"public-and-private"`| no |
105
104
| <aname="input_skip_en_iam_authorization_policy"></a> [skip\_en\_iam\_authorization\_policy](#input\_skip\_en\_iam\_authorization\_policy)| Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances (scoped to the resource group) an 'Event Source Manager' role to the given Event Notifications instance passed in the `existing_en_instance_crn` input variable. In addition, no policy is created if `enable_event_notification` is set to false. |`bool`|`false`| no |
106
105
| <aname="input_skip_kms_iam_authorization_policy"></a> [skip\_kms\_iam\_authorization\_policy](#input\_skip\_kms\_iam\_authorization\_policy)| Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances in the resource group to read the encryption key from the KMS instance. If set to false, pass in a value for the KMS instance in the `existing_kms_instance_guid` variable. In addition, no policy is created if `kms_encryption_enabled` is set to false. |`bool`|`false`| no |
107
106
| <aname="input_sm_service_plan"></a> [sm\_service\_plan](#input\_sm\_service\_plan)| The Secrets Manager plan to provision. |`string`|`"standard"`| no |
# Validation (approach based on https://github.com/hashicorp/terraform/issues/25609#issuecomment-1057614400)
10
8
# tflint-ignore: terraform_unused_declarations
11
9
validate_kms_values=(!var.kms_encryption_enabled&& var.kms_key_crn!=null) ?tobool("When passing values for var.kms_key_crn, you must set var.kms_encryption_enabled to true. Otherwise unset them to use default encryption") : (!var.kms_encryption_enabled&& var.existing_kms_instance_guid!=null) ?tobool("When passing values for var.existing_kms_instance_guid, you must set var.kms_encryption_enabled to true. Otherwise unset them to use default encryption") :true
@@ -16,21 +14,20 @@ locals {
16
14
# tflint-ignore: terraform_unused_declarations
17
15
validate_event_notification=var.enable_event_notification&& var.existing_en_instance_crn==null?tobool("When setting var.enable_event_notification to true, a value must be passed for var.existing_en_instance_crn") :true
18
16
# tflint-ignore: terraform_unused_declarations
19
-
validate_endpoint=var.enable_event_notification&&(var.endpoint_type=="public"&& var.service_endpoints=="private") || (var.endpoint_type=="private"&& var.service_endpoints=="public") ?tobool("It is not allowed to have conflicting var.endpoint_type and var.service_endpoints values.") :true
17
+
validate_endpoint=var.enable_event_notification&& var.endpoint_type=="public"&& var.allowed_network=="private-only"?tobool("It is not allowed to have conflicting var.endpoint_type and var.allowed_network values.") :true
Copy file name to clipboardExpand all lines: solutions/standard/variables.tf
+4-5Lines changed: 4 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -45,14 +45,13 @@ variable "service_plan" {
45
45
}
46
46
}
47
47
48
-
variable"service_endpoints" {
49
-
# public-and-private until IBM Console connects to SM via private endpoints
48
+
variable"allowed_network" {
50
49
type=string
51
-
description="The service endpoints to enable for all services deployed by this solution. Allowed values are `private` or `public-and-private`. If selecting `public-and-private`, communication to the instances will all be done over the public endpoints. Ensure to enable virtual routing and forwarding (VRF) in your account if using `private`, and that the terraform runtime has access to the the IBM Cloud private network."
50
+
description="The types of service endpoints to set on the Secrets Manager instance. Possible values are `private-only` or `public-and-private`."
0 commit comments