Skip to content

Commit 9e7c9f4

Browse files
authored
feat: The following DA variables have been renamed:<br>- skip_mysql_sm_auth_policy -> skip_mysql_secrets_manager_auth_policy<br>- admin_pass_secret_manager_secret_group -> admin_pass_secrets_manager_secret_group<br>- admin_pass_secret_manager_secret_name -> admin_pass_secrets_manager_secret_name<br>- use_existing_admin_pass_secret_manager_secret_group -> use_existing_admin_pass_secrets_manager_secret_group (#273)
1 parent 89e9961 commit 9e7c9f4

File tree

3 files changed

+17
-17
lines changed

3 files changed

+17
-17
lines changed

ibm_catalog.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -290,7 +290,7 @@
290290
"key": "service_credential_secrets"
291291
},
292292
{
293-
"key": "skip_mysql_sm_auth_policy"
293+
"key": "skip_mysql_secrets_manager_auth_policy"
294294
},
295295
{
296296
"key": "skip_mysql_kms_auth_policy"
@@ -299,13 +299,13 @@
299299
"key": "backup_crn"
300300
},
301301
{
302-
"key": "admin_pass_secret_manager_secret_group"
302+
"key": "admin_pass_secrets_manager_secret_group"
303303
},
304304
{
305-
"key": "admin_pass_secret_manager_secret_name"
305+
"key": "admin_pass_secrets_manager_secret_name"
306306
},
307307
{
308-
"key": "use_existing_admin_pass_secret_manager_secret_group"
308+
"key": "use_existing_admin_pass_secrets_manager_secret_group"
309309
},
310310
{
311311
"key": "existing_mysql_instance_crn"

solutions/standard/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -314,7 +314,7 @@ locals {
314314

315315
locals {
316316
## Variable validation (approach based on https://github.com/hashicorp/terraform/issues/25609#issuecomment-1057614400)
317-
create_sm_auth_policy = var.skip_mysql_sm_auth_policy || var.existing_secrets_manager_instance_crn == null ? 0 : 1
317+
create_sm_auth_policy = var.skip_mysql_secrets_manager_auth_policy || var.existing_secrets_manager_instance_crn == null ? 0 : 1
318318
}
319319

320320
# Parse the Secrets Manager CRN
@@ -369,10 +369,10 @@ locals {
369369

370370
# Build the structure of the arbitrary credential type secret for admin password
371371
admin_pass_secret = [{
372-
secret_group_name = (var.prefix != null && var.prefix != "") && var.admin_pass_secret_manager_secret_group != null ? "${var.prefix}-${var.admin_pass_secret_manager_secret_group}" : var.admin_pass_secret_manager_secret_group
373-
existing_secret_group = var.use_existing_admin_pass_secret_manager_secret_group
372+
secret_group_name = (var.prefix != null && var.prefix != "") && var.admin_pass_secrets_manager_secret_group != null ? "${var.prefix}-${var.admin_pass_secrets_manager_secret_group}" : var.admin_pass_secrets_manager_secret_group
373+
existing_secret_group = var.use_existing_admin_pass_secrets_manager_secret_group
374374
secrets = [{
375-
secret_name = (var.prefix != null && var.prefix != "") && var.admin_pass_secret_manager_secret_name != null ? "${var.prefix}-${var.admin_pass_secret_manager_secret_name}" : var.admin_pass_secret_manager_secret_name
375+
secret_name = (var.prefix != null && var.prefix != "") && var.admin_pass_secrets_manager_secret_name != null ? "${var.prefix}-${var.admin_pass_secrets_manager_secret_name}" : var.admin_pass_secrets_manager_secret_name
376376
secret_type = "arbitrary"
377377
secret_payload_password = local.admin_pass
378378
}

solutions/standard/variables.tf

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -376,43 +376,43 @@ variable "service_credential_secrets" {
376376
}
377377
}
378378

379-
variable "skip_mysql_sm_auth_policy" {
379+
variable "skip_mysql_secrets_manager_auth_policy" {
380380
type = bool
381381
default = false
382382
description = "Whether an IAM authorization policy is created for Secrets Manager instance to create a service credential secrets for Databases for MySQL. If set to false, the Secrets Manager instance passed by the user is granted the Key Manager access to the MySQL instance created by the Deployable Architecture. Set to `true` to use an existing policy. The value of this is ignored if any value for 'existing_secrets_manager_instance_crn' is not passed."
383383
}
384384

385-
variable "admin_pass_secret_manager_secret_group" {
385+
variable "admin_pass_secrets_manager_secret_group" {
386386
type = string
387-
description = "The name of a new or existing secrets manager secret group for admin password. To use existing secret group, `use_existing_admin_pass_secret_manager_secret_group` must be set to `true`. If a prefix input variable is specified, the prefix is added to the name in the `<prefix>-<name>` format."
387+
description = "The name of a new or existing secrets manager secret group for admin password. To use existing secret group, `use_existing_admin_pass_secrets_manager_secret_group` must be set to `true`. If a prefix input variable is specified, the prefix is added to the name in the `<prefix>-<name>` format."
388388
default = "mysql-secrets"
389389

390390
validation {
391391
condition = (
392392
var.existing_secrets_manager_instance_crn == null ||
393-
var.admin_pass_secret_manager_secret_group != null
393+
var.admin_pass_secrets_manager_secret_group != null
394394
)
395-
error_message = "`admin_pass_secret_manager_secret_group` is required when `existing_secrets_manager_instance_crn` is set."
395+
error_message = "`admin_pass_secrets_manager_secret_group` is required when `existing_secrets_manager_instance_crn` is set."
396396
}
397397
}
398398

399-
variable "use_existing_admin_pass_secret_manager_secret_group" {
399+
variable "use_existing_admin_pass_secrets_manager_secret_group" {
400400
type = bool
401401
description = "Whether to use an existing secrets manager secret group for admin password."
402402
default = false
403403

404404
}
405405

406-
variable "admin_pass_secret_manager_secret_name" {
406+
variable "admin_pass_secrets_manager_secret_name" {
407407
type = string
408408
description = "The name of a new redis administrator secret. If a prefix input variable is specified, the prefix is added to the name in the `<prefix>-<name>` format."
409409
default = "mysql-admin-password"
410410

411411
validation {
412412
condition = (
413413
var.existing_secrets_manager_instance_crn == null ||
414-
var.admin_pass_secret_manager_secret_name != null
414+
var.admin_pass_secrets_manager_secret_name != null
415415
)
416-
error_message = "`admin_pass_secret_manager_secret_name` is required when `existing_secrets_manager_instance_crn` is set."
416+
error_message = "`admin_pass_secrets_manager_secret_name` is required when `existing_secrets_manager_instance_crn` is set."
417417
}
418418
}

0 commit comments

Comments
 (0)