Skip to content

Commit a99b689

Browse files
committed
feat: adjusted doc format
1 parent 28f52c7 commit a99b689

File tree

2 files changed

+35
-14
lines changed

2 files changed

+35
-14
lines changed

README.md

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -489,6 +489,18 @@ module "es_kubernetes_secret" {
489489
}
490490
```
491491
492+
## Required IAM access policies
493+
You need the following permissions to run this module.
494+
495+
- Account Management
496+
- IAM Services
497+
- **Secrets Manager** service
498+
- `Administrator` platform access
499+
- `Manager` service access
500+
- **Kubernetes** service
501+
- `Administrator` platform access
502+
- `Manager` service access
503+
492504
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
493505
### Requirements
494506

ibm_catalog.json

Lines changed: 23 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -31,12 +31,8 @@
3131
"description": "This architecture allows to deploy the External Secrets Operator on an existing IBM Cloud OpenShift Cluster."
3232
},
3333
{
34-
"title": "Configures the External Secrets Operator (ESO) Cluster Secrets Stores and Secrets Stores with the related ServiceIDs and Secrets Groups",
35-
"description": "Deploy and configure ESO Cluster Secret Store resources for cluster scoped secrets store and ESO Secret Store resources for namespace scoped secrets store.<br/>For more details about Cluster Secret Store please refer to this [documentation](https://external-secrets.io/latest/api/clustersecretstore/).<br/>For more details about Secret Store please refer to this [documentation](https://external-secrets.io/latest/api/secretstore/)."
36-
},
37-
{
38-
"title": "Supports two different authentication methods in both the supported Secrets Store types, API key and Trusted Profile authentication",
39-
"description": "This architecture allows to leverage on two different authentication methods, IAM API key and Truster Profile, in both the supported Secret Stores.<br/>For more details about configuri the Stores through this architecture input please refer to this [page](https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-external-secrets-operator/refs/heads/da_task_11723/solutions/fully-configurable/DA-eso-configuration.md)"
34+
"title": "Configures the External Secrets Operator (ESO) Cluster Secrets Stores and Secrets Stores with the related ServiceIDs, Secrets Groups and authentication methods",
35+
"description": "Deploy and configure ESO Cluster Secret Store resources for cluster scoped secrets store and ESO Secret Store resources for namespace scoped secrets store.<br/><br/>For more details about Cluster Secret Store please refer to this [documentation](https://external-secrets.io/latest/api/clustersecretstore/).<br/>For more details about Secret Store please refer to this [documentation](https://external-secrets.io/latest/api/secretstore/).<br/><br/>Both the Secret Store types support two different authentication methods, IAM API key and Truster Profile.<br/>For more details about configuri the Stores through this architecture input please refer to this [page](https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-external-secrets-operator/refs/heads/da_task_11723/solutions/fully-configurable/DA-eso-configuration.md)"
4036
},
4137
{
4238
"title": "Deploys and configures Stakater Reloader into the cluster",
@@ -51,14 +47,27 @@
5147
"install_type": "fullstack",
5248
"working_directory": "solutions/fully-configurable",
5349
"iam_permissions": [
54-
{
55-
"role_crns": [
56-
"crn:v1:bluemix:public:iam::::role:Administrator"
57-
],
58-
"service_name": "iam-identity",
59-
"notes": "[Optional] Required if Cloud automation for account configuration is enabled."
60-
}
61-
],
50+
{
51+
"role_crns": [
52+
"crn:v1:bluemix:public:iam::::role:Administrator"
53+
],
54+
"service_name": "iam-identity"
55+
},
56+
{
57+
"service_name": "secrets-manager",
58+
"role_crns": [
59+
"crn:v1:bluemix:public:iam::::serviceRole:Administrator",
60+
"crn:v1:bluemix:public:iam::::serviceRole:Manager"
61+
]
62+
},
63+
{
64+
"service_name": "containers-kubernetes",
65+
"role_crns": [
66+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
67+
"crn:v1:bluemix:public:iam::::role:Editor"
68+
]
69+
}
70+
],
6271
"configuration": [
6372
{
6473
"key": "ibmcloud_api_key"

0 commit comments

Comments
 (0)