Skip to content

Commit 882a1ea

Browse files
committed
rebase on redis
1 parent bc8a701 commit 882a1ea

File tree

3 files changed

+26
-20
lines changed

3 files changed

+26
-20
lines changed

ibm_catalog.json

Lines changed: 17 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -65,9 +65,10 @@
6565
"iam_permissions": [
6666
{
6767
"role_crns": [
68-
"crn:v1:bluemix:public:iam::::role:Administrator"
68+
"crn:v1:bluemix:public:iam::::role:Viewer"
6969
],
70-
"service_name": "all-account-management-services"
70+
"service_name": "Resource group only",
71+
"notes": "Viewer access is required in the resource group you want to provision in."
7172
},
7273
{
7374
"role_crns": [
@@ -132,7 +133,7 @@
132133
},
133134
{
134135
"key": "existing_resource_group_name",
135-
"required": true,
136+
"display_name": "resource_group",
136137
"custom_config": {
137138
"type": "resource_group",
138139
"grouping": "deployment",
@@ -143,8 +144,7 @@
143144
}
144145
},
145146
{
146-
"key": "prefix",
147-
"required": true
147+
"key": "prefix"
148148
},
149149
{
150150
"key": "region",
@@ -471,6 +471,13 @@
471471
]
472472
},
473473
"iam_permissions": [
474+
{
475+
"role_crns": [
476+
"crn:v1:bluemix:public:iam::::role:Viewer"
477+
],
478+
"service_name": "Resource group only",
479+
"notes": "Viewer access is required in the resource group you want to provision in."
480+
},
474481
{
475482
"role_crns": [
476483
"crn:v1:bluemix:public:iam::::role:Editor"
@@ -489,7 +496,7 @@
489496
"crn:v1:bluemix:public:iam::::role:Editor"
490497
],
491498
"service_name": "hs-crypto",
492-
"notes": "[Optional] Editor access is required to create keys in HPCS. It is required only if KMS encryption is enabled."
499+
"notes": "[Optional] Editor access is required to create keys in HPCS. It is only required when using HPCS for encryption."
493500
}
494501
],
495502
"architecture": {
@@ -516,7 +523,7 @@
516523
},
517524
{
518525
"key": "existing_resource_group_name",
519-
"required": true,
526+
"display_name": "resource_group",
520527
"custom_config": {
521528
"type": "resource_group",
522529
"grouping": "deployment",
@@ -527,9 +534,7 @@
527534
}
528535
},
529536
{
530-
"key": "prefix",
531-
"required": true,
532-
"description": "Prefix to add to all resources created by this solution. To not use any prefix value, you can enter the string `__NULL__`."
537+
"key": "prefix"
533538
},
534539
{
535540
"key": "region",
@@ -707,7 +712,8 @@
707712
"key": "ibmcloud_kms_api_key"
708713
},
709714
{
710-
"key": "existing_kms_instance_crn"
715+
"key": "existing_kms_instance_crn",
716+
"required": true
711717
},
712718
{
713719
"key": "existing_kms_key_crn"

solutions/fully-configurable/variables.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -57,8 +57,8 @@ variable "existing_elasticsearch_instance_crn" {
5757
}
5858

5959
variable "elasticsearch_version" {
60-
type = string
6160
description = "The version of the Databases for Elasticsearch instance. If no value is specified, the current preferred version of Databases for Elasticsearch is used."
61+
type = string
6262
default = null
6363
}
6464

@@ -202,7 +202,7 @@ variable "kms_encryption_enabled" {
202202

203203
variable "existing_kms_instance_crn" {
204204
type = string
205-
description = "The CRN of a Key Protect or Hyper Protect Crypto Services instance. Required to create a new encryption key and key ring which will be used to encrypt both deployment data and backups. Applies only if `kms_encryption` is true. To use an existing key, pass values for `existing_kms_key_crn` and/or `existing_backup_kms_key_crn`. Bare in mind that backups encryption is only available in certain regions. See [Bring your own key for backups](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok) and [Using the HPCS Key for Backup encryption](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-hpcs#use-hpcs-backups)."
205+
description = "The CRN of a Key Protect or Hyper Protect Crypto Services instance. Required to create a new encryption key and key ring which will be used to encrypt both deployment data and backups. To use an existing key, pass values for `existing_kms_key_crn` and/or `existing_backup_kms_key_crn`. Bare in mind that backups encryption is only available in certain regions. See [Bring your own key for backups](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok) and [Using the HPCS Key for Backup encryption](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-hpcs#use-hpcs-backups)."
206206
default = null
207207

208208
validation {
@@ -213,7 +213,7 @@ variable "existing_kms_instance_crn" {
213213

214214
variable "existing_kms_key_crn" {
215215
type = string
216-
description = "The CRN of a Key Protect or Hyper Protect Crypto Services encryption key to encrypt your data. Applies only if `kms_encryption_enabled` is true. By default this key is used for both deployment data and backups, but this behaviour can be altered using the optional `existing_backup_kms_key_crn` input. If no value is passed a new key will be created in the instance specified in the `existing_kms_instance_crn` input. Bare in mind that backups encryption is only available in certain regions. See [Bring your own key for backups](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok) and [Using the HPCS Key for Backup encryption](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-hpcs#use-hpcs-backups)."
216+
description = "The CRN of a Key Protect or Hyper Protect Crypto Services encryption key to encrypt your data. By default this key is used for both deployment data and backups, but this behaviour can be altered using the optional `existing_backup_kms_key_crn` input. If no value is passed a new key will be created in the instance specified in the `existing_kms_instance_crn` input. Bare in mind that backups encryption is only available in certain regions. See [Bring your own key for backups](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok) and [Using the HPCS Key for Backup encryption](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-hpcs#use-hpcs-backups)."
217217
default = null
218218

219219
validation {
@@ -224,7 +224,7 @@ variable "existing_kms_key_crn" {
224224

225225
variable "kms_endpoint_type" {
226226
type = string
227-
description = "The type of endpoint to use for communicating with the Key Protect or Hyper Protect Crypto Services instance. Possible values: `public`, `private`."
227+
description = "The type of endpoint to use for communicating with the Key Protect or Hyper Protect Crypto Services instance. Possible values: `public`, `private`. Applies only if `existing_kms_key_crn` is not specified."
228228
default = "private"
229229
validation {
230230
condition = can(regex("public|private", var.kms_endpoint_type))
@@ -287,7 +287,7 @@ variable "provider_visibility" {
287287
description = "Set the visibility value for the IBM terraform provider. Supported values are `public`, `private`, `public-and-private`. [Learn more](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/guides/custom-service-endpoints)."
288288
type = string
289289
default = "private"
290-
nullable = false
290+
291291
validation {
292292
condition = contains(["public", "private", "public-and-private"], var.provider_visibility)
293293
error_message = "Invalid visibility option. Allowed values are 'public', 'private', or 'public-and-private'."

solutions/security-enforced/variables.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -165,25 +165,25 @@ variable "elasticsearch_access_tags" {
165165

166166
variable "existing_kms_instance_crn" {
167167
type = string
168-
description = "The CRN of a Key Protect or Hyper Protect Crypto Services instance. Required to create a new encryption key and key ring which will be used to encrypt both deployment data and backups. Applies only if `use_ibm_owned_encryption_key` is false. To use an existing key, pass values for `existing_kms_key_crn` and/or `existing_backup_kms_key_crn`. Bare in mind that backups encryption is only available in certain regions. See [Bring your own key for backups](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok) and [Using the HPCS Key for Backup encryption](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-hpcs#use-hpcs-backups)."
168+
description = "The CRN of a Key Protect or Hyper Protect Crypto Services instance. Required to create a new encryption key and key ring which will be used to encrypt both deployment data and backups. To use an existing key, pass values for `existing_kms_key_crn` and/or `existing_backup_kms_key_crn`. Bare in mind that backups encryption is only available in certain regions. See [Bring your own key for backups](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok) and [Using the HPCS Key for Backup encryption](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-hpcs#use-hpcs-backups)."
169169
default = null
170170
}
171171

172172
variable "existing_kms_key_crn" {
173173
type = string
174-
description = "The CRN of a Key Protect or Hyper Protect Crypto Services encryption key to encrypt your data. Applies only if `use_ibm_owned_encryption_key` is false. By default this key is used for both deployment data and backups, but this behaviour can be altered using the optional `existing_backup_kms_key_crn` input. If no value is passed a new key will be created in the instance specified in the `existing_kms_instance_crn` input. Bare in mind that backups encryption is only available in certain regions. See [Bring your own key for backups](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok) and [Using the HPCS Key for Backup encryption](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-hpcs#use-hpcs-backups)."
174+
description = "The CRN of a Key Protect or Hyper Protect Crypto Services encryption key to encrypt your data. By default this key is used for both deployment data and backups, but this behaviour can be altered using the optional `existing_backup_kms_key_crn` input. If no value is passed a new key will be created in the instance specified in the `existing_kms_instance_crn` input. Bare in mind that backups encryption is only available in certain regions. See [Bring your own key for backups](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok) and [Using the HPCS Key for Backup encryption](https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-hpcs#use-hpcs-backups)."
175175
default = null
176176
}
177177

178178
variable "skip_elasticsearch_kms_auth_policy" {
179179
type = bool
180-
description = "Set to true to skip the creation of IAM authorization policies that permits all Databases for Elasticsearch instances in the given resource group 'Reader' access to the Key Protect or Hyper Protect Crypto Services key. This policy is required in order to enable KMS encryption, so only skip creation if there is one already present in your account. No policy is created if `use_ibm_owned_encryption_key` is true."
180+
description = "Whether to create an IAM authorization policy that permits all Databases for Elasticsearch instances in the resource group to read the encryption key from the Hyper Protect Crypto Services instance specified in the `existing_kms_instance_crn` variable."
181181
default = false
182182
}
183183

184184
variable "ibmcloud_kms_api_key" {
185185
type = string
186-
description = "The IBM Cloud API key that can create a root key and key ring in the key management service (KMS) instance. If not specified, the 'ibmcloud_api_key' variable is used. Specify this key if the instance in `existing_kms_instance_crn` is in an account that's different from the Elastic Search instance. Leave this input empty if the same account owns both instances."
186+
description = "The IBM Cloud API key that can create a root key and key ring in the key management service (KMS) instance. If not specified, the 'ibmcloud_api_key' variable is used. Specify this key if the instance in `existing_kms_instance_crn` is in an account that's different from the ElasticSearch instance. Leave this input empty if the same account owns both instances."
187187
sensitive = true
188188
default = null
189189
}

0 commit comments

Comments
 (0)