|
331 | 331 | "key": "admin_pass" |
332 | 332 | }, |
333 | 333 | { |
334 | | - "key": "existing_secrets_manager_instance_crn" |
| 334 | + "key": "existing_secrets_manager_instance_crn", |
| 335 | + "value_constraints": [ |
| 336 | + { |
| 337 | + "type": "regex", |
| 338 | + "description": "The value provided for 'existing_secrets_manager_instance_crn' is not valid.", |
| 339 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}secrets-manager:(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" |
| 340 | + } |
| 341 | + ] |
335 | 342 | }, |
336 | 343 | { |
337 | 344 | "key": "existing_secrets_manager_endpoint_type", |
|
375 | 382 | "key": "kms_encryption_enabled" |
376 | 383 | }, |
377 | 384 | { |
378 | | - "key": "existing_kms_instance_crn" |
| 385 | + "key": "existing_kms_instance_crn", |
| 386 | + "value_constraints": [ |
| 387 | + { |
| 388 | + "type": "regex", |
| 389 | + "description": "The value provided for 'existing_kms_instance_crn' is not valid.", |
| 390 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}(kms|hs-crypto):(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" |
| 391 | + } |
| 392 | + ] |
379 | 393 | }, |
380 | 394 | { |
381 | | - "key": "existing_kms_key_crn" |
| 395 | + "key": "existing_kms_key_crn", |
| 396 | + "value_constraints": [ |
| 397 | + { |
| 398 | + "type": "regex", |
| 399 | + "description": "The value provided for 'existing_kms_key_crn' is not valid.", |
| 400 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}(kms|hs-crypto):(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}:key:[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$" |
| 401 | + } |
| 402 | + ] |
382 | 403 | }, |
383 | 404 | { |
384 | 405 | "key": "kms_endpoint_type", |
|
401 | 422 | "key": "key_name" |
402 | 423 | }, |
403 | 424 | { |
404 | | - "key": "backup_crn" |
| 425 | + "key": "backup_crn", |
| 426 | + "value_constraints": [ |
| 427 | + { |
| 428 | + "type": "regex", |
| 429 | + "description": "The value provided for 'backup_crn' is not valid.", |
| 430 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}databases-for-elasticsearch:(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}:backup:[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}$" |
| 431 | + } |
| 432 | + ] |
405 | 433 | }, |
406 | 434 | { |
407 | | - "key": "existing_backup_kms_key_crn" |
| 435 | + "key": "existing_backup_kms_key_crn", |
| 436 | + "value_constraints": [ |
| 437 | + { |
| 438 | + "type": "regex", |
| 439 | + "description": "The value provided for 'existing_backup_kms_key_crn' is not valid.", |
| 440 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}(kms|hs-crypto):(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}:key:[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$" |
| 441 | + } |
| 442 | + ] |
408 | 443 | }, |
409 | 444 | { |
410 | 445 | "key": "use_default_backup_encryption_key" |
|
413 | 448 | "key": "skip_elasticsearch_kms_auth_policy" |
414 | 449 | }, |
415 | 450 | { |
416 | | - "key": "existing_elasticsearch_instance_crn" |
| 451 | + "key": "existing_elasticsearch_instance_crn", |
| 452 | + "value_constraints": [ |
| 453 | + { |
| 454 | + "type": "regex", |
| 455 | + "description": "The value provided for 'existing_elasticsearch_instance_crn' is not valid.", |
| 456 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}databases-for-elasticsearch:(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" |
| 457 | + } |
| 458 | + ] |
417 | 459 | }, |
418 | 460 | { |
419 | 461 | "key": "enable_elser_model" |
|
454 | 496 | "key": "kibana_registry_namespace_image" |
455 | 497 | }, |
456 | 498 | { |
457 | | - "key": "kibana_image_digest" |
| 499 | + "key": "kibana_image_digest", |
| 500 | + "value_constraints": [ |
| 501 | + { |
| 502 | + "type": "regex", |
| 503 | + "description": "The value provided for 'kibana_image_digest' is not valid.", |
| 504 | + "value": "^__NULL__$|^sha256:" |
| 505 | + } |
| 506 | + ] |
458 | 507 | }, |
459 | 508 | { |
460 | 509 | "key": "kibana_image_port" |
|
758 | 807 | "key": "admin_pass" |
759 | 808 | }, |
760 | 809 | { |
761 | | - "key": "existing_secrets_manager_instance_crn" |
| 810 | + "key": "existing_secrets_manager_instance_crn", |
| 811 | + "value_constraints": [ |
| 812 | + { |
| 813 | + "type": "regex", |
| 814 | + "description": "The value provided for 'existing_secrets_manager_instance_crn' is not valid.", |
| 815 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}secrets-manager:(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" |
| 816 | + } |
| 817 | + ] |
762 | 818 | }, |
763 | 819 | { |
764 | 820 | "key": "skip_elasticsearch_to_secrets_manager_auth_policy" |
|
786 | 842 | }, |
787 | 843 | { |
788 | 844 | "key": "existing_kms_instance_crn", |
789 | | - "required": true |
| 845 | + "required": true, |
| 846 | + "value_constraints": [ |
| 847 | + { |
| 848 | + "type": "regex", |
| 849 | + "description": "The value provided for 'existing_kms_instance_crn' is not valid.", |
| 850 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}(kms|hs-crypto):(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" |
| 851 | + } |
| 852 | + ] |
790 | 853 | }, |
791 | 854 | { |
792 | | - "key": "existing_kms_key_crn" |
| 855 | + "key": "existing_kms_key_crn", |
| 856 | + "value_constraints": [ |
| 857 | + { |
| 858 | + "type": "regex", |
| 859 | + "description": "The value provided for 'existing_kms_key_crn' is not valid.", |
| 860 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}(kms|hs-crypto):(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}:key:[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$" |
| 861 | + } |
| 862 | + ] |
793 | 863 | }, |
794 | 864 | { |
795 | 865 | "key": "key_ring_name" |
|
798 | 868 | "key": "key_name" |
799 | 869 | }, |
800 | 870 | { |
801 | | - "key": "backup_crn" |
| 871 | + "key": "backup_crn", |
| 872 | + "value_constraints": [ |
| 873 | + { |
| 874 | + "type": "regex", |
| 875 | + "description": "The value provided for 'backup_crn' is not valid.", |
| 876 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}databases-for-elasticsearch:(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}:backup:[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}$" |
| 877 | + } |
| 878 | + ] |
802 | 879 | }, |
803 | 880 | { |
804 | | - "key": "existing_backup_kms_key_crn" |
| 881 | + "key": "existing_backup_kms_key_crn", |
| 882 | + "value_constraints": [ |
| 883 | + { |
| 884 | + "type": "regex", |
| 885 | + "description": "The value provided for 'existing_backup_kms_key_crn' is not valid.", |
| 886 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}(kms|hs-crypto):(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}:key:[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$" |
| 887 | + } |
| 888 | + ] |
805 | 889 | }, |
806 | 890 | { |
807 | 891 | "key": "skip_elasticsearch_kms_auth_policy" |
808 | 892 | }, |
809 | 893 | { |
810 | | - "key": "existing_elasticsearch_instance_crn" |
| 894 | + "key": "existing_elasticsearch_instance_crn", |
| 895 | + "value_constraints": [ |
| 896 | + { |
| 897 | + "type": "regex", |
| 898 | + "description": "The value provided for 'existing_elasticsearch_instance_crn' is not valid.", |
| 899 | + "value": "^__NULL__$|^crn:v\\d:(.*:){2}databases-for-elasticsearch:(.*:)([aos]\\/[\\w_\\-]+):[0-9a-fA-F]{8}(?:-[0-9a-fA-F]{4}){3}-[0-9a-fA-F]{12}::$" |
| 900 | + } |
| 901 | + ] |
811 | 902 | }, |
812 | 903 | { |
813 | 904 | "key": "enable_elser_model" |
|
845 | 936 | "key": "kibana_registry_namespace_image" |
846 | 937 | }, |
847 | 938 | { |
848 | | - "key": "kibana_image_digest" |
| 939 | + "key": "kibana_image_digest", |
| 940 | + "value_constraints": [ |
| 941 | + { |
| 942 | + "type": "regex", |
| 943 | + "description": "The value provided for 'kibana_image_digest' must start with 'sha256:'.", |
| 944 | + "value": "^__NULL__$|^sha256:" |
| 945 | + } |
| 946 | + ] |
849 | 947 | }, |
850 | 948 | { |
851 | 949 | "key": "kibana_image_port" |
|
0 commit comments