Skip to content

Commit 6b4d74f

Browse files
authored
fix: do not create kms key if existing SM instance is passed (#110)
1 parent 1bfd5e1 commit 6b4d74f

File tree

3 files changed

+6
-6
lines changed

3 files changed

+6
-6
lines changed

solutions/standard/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ module "kms" {
2727
providers = {
2828
ibm = ibm.kms
2929
}
30-
count = var.existing_secrets_manager_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
30+
count = var.existing_secrets_manager_crn != null || var.existing_secrets_manager_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
3131
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
3232
version = "4.8.5"
3333
create_key_protect_instance = false
@@ -90,7 +90,7 @@ module "iam_secrets_engine" {
9090
count = var.iam_engine_enabled ? 1 : 0
9191
source = "terraform-ibm-modules/secrets-manager-iam-engine/ibm"
9292
version = "1.1.0"
93-
region = var.region
93+
region = local.secrets_manager_region
9494
iam_engine_name = var.prefix != null ? "${var.prefix}-${var.iam_engine_name}" : var.iam_engine_name
9595
secrets_manager_guid = local.secrets_manager_guid
9696
endpoint_type = var.allowed_network == "private-only" ? "private" : "public"

solutions/standard/outputs.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ output "secrets_manager_guid" {
1515

1616
output "secrets_manager_id" {
1717
description = "ID of Secrets Manager instance"
18-
value = var.existing_secrets_manager_crn == null ? module.secrets_manager[0].secrets_manager_id : null
18+
value = var.existing_secrets_manager_crn == null ? module.secrets_manager[0].secrets_manager_id : local.secrets_manager_guid
1919
}
2020

2121
output "secrets_manager_name" {

tests/pr_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -152,7 +152,7 @@ func TestRunExistingResourcesInstances(t *testing.T) {
152152
// ------------------------------------------------------------------------------------
153153
// Provision Event Notification, KMS key and resource group first
154154
// ------------------------------------------------------------------------------------
155-
155+
region := validRegions[rand.Intn(len(validRegions))]
156156
prefix := fmt.Sprintf("scc-exist-%s", strings.ToLower(random.UniqueId()))
157157
realTerraformDir := "./existing-resources"
158158
tempTerraformDir, _ := files.CopyTerraformFolderToTemp(realTerraformDir, fmt.Sprintf(prefix+"-%s", strings.ToLower(random.UniqueId())))
@@ -168,7 +168,7 @@ func TestRunExistingResourcesInstances(t *testing.T) {
168168
TerraformDir: tempTerraformDir,
169169
Vars: map[string]interface{}{
170170
"prefix": prefix,
171-
"region": validRegions[rand.Intn(len(validRegions))],
171+
"region": region,
172172
"resource_tags": tags,
173173
},
174174
// Set Upgrade to true to ensure latest version of providers and modules are used by terratest.
@@ -188,7 +188,7 @@ func TestRunExistingResourcesInstances(t *testing.T) {
188188
ImplicitRequired: false,
189189
TerraformVars: map[string]interface{}{
190190
"ibmcloud_api_key": os.Getenv("TF_VAR_ibmcloud_api_key"),
191-
"region": validRegions[rand.Intn(len(validRegions))],
191+
"region": region,
192192
"resource_group_name": terraform.Output(t, existingTerraformOptions, "resource_group_name"),
193193
"use_existing_resource_group": true,
194194
"existing_event_notification_instance_crn": terraform.Output(t, existingTerraformOptions, "event_notification_instance_crn"),

0 commit comments

Comments
 (0)