@@ -96,6 +96,7 @@ func TestRunFullyConfigurableSolutionSchematics(t *testing.T) {
9696	options .TerraformVars  =  []testschematic.TestSchematicTerraformVar {
9797		{Name : "ibmcloud_api_key" , Value : options .RequiredEnvironmentVars ["TF_VAR_ibmcloud_api_key" ], DataType : "string" , Secure : true },
9898		{Name : "elasticsearch_access_tags" , Value : permanentResources ["accessTags" ], DataType : "list(string)" },
99+ 		{Name : "use_ibm_owned_encryption_key" , Value : false , DataType : "bool" },
99100		{Name : "existing_kms_instance_crn" , Value : permanentResources ["hpcs_south_crn" ], DataType : "string" },
100101		{Name : "kms_endpoint_type" , Value : "private" , DataType : "string" },
101102		{Name : "existing_resource_group_name" , Value : resourceGroup , DataType : "string" },
@@ -131,6 +132,7 @@ func TestRunFullyConfigurableUpgradeSolution(t *testing.T) {
131132	options .TerraformVars  =  map [string ]interface {}{
132133		"prefix" :                       options .Prefix ,
133134		"elasticsearch_access_tags" :    permanentResources ["accessTags" ],
135+ 		"use_ibm_owned_encryption_key" : false ,
134136		"existing_kms_instance_crn" :    permanentResources ["hpcs_south_crn" ],
135137		"kms_endpoint_type" :            "public" ,
136138		"existing_resource_group_name" : resourceGroup ,
@@ -185,6 +187,7 @@ func TestRunSecurityEnforcedSolutionSchematics(t *testing.T) {
185187
186188	options .TerraformVars  =  []testschematic.TestSchematicTerraformVar {
187189		{Name : "ibmcloud_api_key" , Value : options .RequiredEnvironmentVars ["TF_VAR_ibmcloud_api_key" ], DataType : "string" , Secure : true },
190+ 		{Name : "use_ibm_owned_encryption_key" , Value : false , DataType : "bool" },
188191		{Name : "elasticsearch_access_tags" , Value : permanentResources ["accessTags" ], DataType : "list(string)" },
189192		{Name : "existing_kms_instance_crn" , Value : permanentResources ["hpcs_south_crn" ], DataType : "string" },
190193		{Name : "existing_resource_group_name" , Value : resourceGroup , DataType : "string" },
@@ -310,7 +313,7 @@ func TestPlanValidation(t *testing.T) {
310313	options  :=  testhelper .TestOptionsDefault (& testhelper.TestOptions {
311314		Testing :       t ,
312315		TerraformDir :  fullyConfigurableSolutionTerraformDir ,
313- 		Prefix :        "validate -plan" ,
316+ 		Prefix :        "val -plan" ,
314317		ResourceGroup : resourceGroup ,
315318		Region :        "us-south" , // skip VPC region picker 
316319	})
@@ -319,36 +322,38 @@ func TestPlanValidation(t *testing.T) {
319322	options .TerraformOptions .Logger  =  logger .Discard 
320323	options .TerraformOptions .Vars  =  map [string ]interface {}{
321324		"prefix" :                       options .Prefix ,
325+ 		"existing_resource_group_name" : resourceGroup ,
322326		"region" :                       "us-south" ,
323327		"elasticsearch_version" :        "8.10" ,
324328		"provider_visibility" :          "public" ,
325- 		"existing_resource_group_name" : options .Prefix ,
326329	}
327330
328331	// Test the DA when using Elser model 
329- 	var  standardSolutionWithElserModelVars  =  map [string ]interface {}{
330- 		"existing_kms_instance_crn" : permanentResources ["hpcs_south_crn" ],
331- 		"enable_elser_model" :        true ,
332- 		"plan" :                      "platinum" ,
332+ 	var  fullyConfigurableSolutionWithElserModelVars  =  map [string ]interface {}{
333+ 		"use_ibm_owned_encryption_key" : false ,
334+ 		"existing_kms_instance_crn" :    permanentResources ["hpcs_south_crn" ],
335+ 		"enable_elser_model" :           true ,
336+ 		"plan" :                         "platinum" ,
333337	}
334338
335339	// Test the DA when using Kibana dashboard and existing KMS instance 
336- 	var  standardSolutionWithKibanaDashboardVars  =  map [string ]interface {}{
337- 		"enable_kibana_dashboard" :   true ,
338- 		"existing_kms_instance_crn" : permanentResources ["hpcs_south_crn" ],
339- 		"plan" :                      "enterprise" ,
340+ 	var  fullyConfigurableSolutionWithKibanaDashboardVars  =  map [string ]interface {}{
341+ 		"enable_kibana_dashboard" :      true ,
342+ 		"use_ibm_owned_encryption_key" : false ,
343+ 		"existing_kms_instance_crn" :    permanentResources ["hpcs_south_crn" ],
344+ 		"plan" :                         "enterprise" ,
340345	}
341346
342347	// Test the DA when using IBM owned encryption key 
343- 	var  standardSolutionWithUseIbmOwnedEncKey  =  map [string ]interface {}{
348+ 	var  fullyConfigurableSolutionWithUseIbmOwnedEncKey  =  map [string ]interface {}{
344349		"use_ibm_owned_encryption_key" : true ,
345350	}
346351
347352	// Create a map of the variables 
348353	tfVarsMap  :=  map [string ]map [string ]interface {}{
349- 		"standardSolutionWithElserModelVars " :      standardSolutionWithElserModelVars ,
350- 		"standardSolutionWithKibanaDashboardVars " : standardSolutionWithKibanaDashboardVars ,
351- 		"standardSolutionWithUseIbmOwnedEncKey " :   standardSolutionWithUseIbmOwnedEncKey ,
354+ 		"fullyConfigurableSolutionWithElserModelVars " :      fullyConfigurableSolutionWithElserModelVars ,
355+ 		"fullyConfigurableSolutionWithKibanaDashboardVars " : fullyConfigurableSolutionWithKibanaDashboardVars ,
356+ 		"fullyConfigurableSolutionWithUseIbmOwnedEncKey " :   fullyConfigurableSolutionWithUseIbmOwnedEncKey ,
352357	}
353358
354359	_ , initErr  :=  terraform .InitE (t , options .TerraformOptions )
0 commit comments