@@ -96,6 +96,7 @@ func TestRunFullyConfigurableSolutionSchematics(t *testing.T) {
9696 options .TerraformVars = []testschematic.TestSchematicTerraformVar {
9797 {Name : "ibmcloud_api_key" , Value : options .RequiredEnvironmentVars ["TF_VAR_ibmcloud_api_key" ], DataType : "string" , Secure : true },
9898 {Name : "elasticsearch_access_tags" , Value : permanentResources ["accessTags" ], DataType : "list(string)" },
99+ {Name : "use_ibm_owned_encryption_key" , Value : false , DataType : "bool" },
99100 {Name : "existing_kms_instance_crn" , Value : permanentResources ["hpcs_south_crn" ], DataType : "string" },
100101 {Name : "kms_endpoint_type" , Value : "private" , DataType : "string" },
101102 {Name : "existing_resource_group_name" , Value : resourceGroup , DataType : "string" },
@@ -131,6 +132,7 @@ func TestRunFullyConfigurableUpgradeSolution(t *testing.T) {
131132 options .TerraformVars = map [string ]interface {}{
132133 "prefix" : options .Prefix ,
133134 "elasticsearch_access_tags" : permanentResources ["accessTags" ],
135+ "use_ibm_owned_encryption_key" : false ,
134136 "existing_kms_instance_crn" : permanentResources ["hpcs_south_crn" ],
135137 "kms_endpoint_type" : "public" ,
136138 "existing_resource_group_name" : resourceGroup ,
@@ -185,6 +187,7 @@ func TestRunSecurityEnforcedSolutionSchematics(t *testing.T) {
185187
186188 options .TerraformVars = []testschematic.TestSchematicTerraformVar {
187189 {Name : "ibmcloud_api_key" , Value : options .RequiredEnvironmentVars ["TF_VAR_ibmcloud_api_key" ], DataType : "string" , Secure : true },
190+ {Name : "use_ibm_owned_encryption_key" , Value : false , DataType : "bool" },
188191 {Name : "elasticsearch_access_tags" , Value : permanentResources ["accessTags" ], DataType : "list(string)" },
189192 {Name : "existing_kms_instance_crn" , Value : permanentResources ["hpcs_south_crn" ], DataType : "string" },
190193 {Name : "existing_resource_group_name" , Value : resourceGroup , DataType : "string" },
@@ -310,7 +313,7 @@ func TestPlanValidation(t *testing.T) {
310313 options := testhelper .TestOptionsDefault (& testhelper.TestOptions {
311314 Testing : t ,
312315 TerraformDir : fullyConfigurableSolutionTerraformDir ,
313- Prefix : "validate -plan" ,
316+ Prefix : "val -plan" ,
314317 ResourceGroup : resourceGroup ,
315318 Region : "us-south" , // skip VPC region picker
316319 })
@@ -319,36 +322,38 @@ func TestPlanValidation(t *testing.T) {
319322 options .TerraformOptions .Logger = logger .Discard
320323 options .TerraformOptions .Vars = map [string ]interface {}{
321324 "prefix" : options .Prefix ,
325+ "existing_resource_group_name" : resourceGroup ,
322326 "region" : "us-south" ,
323327 "elasticsearch_version" : "8.10" ,
324328 "provider_visibility" : "public" ,
325- "existing_resource_group_name" : options .Prefix ,
326329 }
327330
328331 // Test the DA when using Elser model
329- var standardSolutionWithElserModelVars = map [string ]interface {}{
330- "existing_kms_instance_crn" : permanentResources ["hpcs_south_crn" ],
331- "enable_elser_model" : true ,
332- "plan" : "platinum" ,
332+ var fullyConfigurableSolutionWithElserModelVars = map [string ]interface {}{
333+ "use_ibm_owned_encryption_key" : false ,
334+ "existing_kms_instance_crn" : permanentResources ["hpcs_south_crn" ],
335+ "enable_elser_model" : true ,
336+ "plan" : "platinum" ,
333337 }
334338
335339 // Test the DA when using Kibana dashboard and existing KMS instance
336- var standardSolutionWithKibanaDashboardVars = map [string ]interface {}{
337- "enable_kibana_dashboard" : true ,
338- "existing_kms_instance_crn" : permanentResources ["hpcs_south_crn" ],
339- "plan" : "enterprise" ,
340+ var fullyConfigurableSolutionWithKibanaDashboardVars = map [string ]interface {}{
341+ "enable_kibana_dashboard" : true ,
342+ "use_ibm_owned_encryption_key" : false ,
343+ "existing_kms_instance_crn" : permanentResources ["hpcs_south_crn" ],
344+ "plan" : "enterprise" ,
340345 }
341346
342347 // Test the DA when using IBM owned encryption key
343- var standardSolutionWithUseIbmOwnedEncKey = map [string ]interface {}{
348+ var fullyConfigurableSolutionWithUseIbmOwnedEncKey = map [string ]interface {}{
344349 "use_ibm_owned_encryption_key" : true ,
345350 }
346351
347352 // Create a map of the variables
348353 tfVarsMap := map [string ]map [string ]interface {}{
349- "standardSolutionWithElserModelVars " : standardSolutionWithElserModelVars ,
350- "standardSolutionWithKibanaDashboardVars " : standardSolutionWithKibanaDashboardVars ,
351- "standardSolutionWithUseIbmOwnedEncKey " : standardSolutionWithUseIbmOwnedEncKey ,
354+ "fullyConfigurableSolutionWithElserModelVars " : fullyConfigurableSolutionWithElserModelVars ,
355+ "fullyConfigurableSolutionWithKibanaDashboardVars " : fullyConfigurableSolutionWithKibanaDashboardVars ,
356+ "fullyConfigurableSolutionWithUseIbmOwnedEncKey " : fullyConfigurableSolutionWithUseIbmOwnedEncKey ,
352357 }
353358
354359 _ , initErr := terraform .InitE (t , options .TerraformOptions )
0 commit comments