Skip to content

Commit cdf6a97

Browse files
Jordan-Williams2Jordan-Williams2
authored andcommitted
refactor: kms config + da SKIP UPGRADE TESTS
1 parent 3ea377f commit cdf6a97

File tree

4 files changed

+29
-9
lines changed

4 files changed

+29
-9
lines changed

modules/fscloud/README.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -59,11 +59,14 @@ No resources.
5959
| Name | Description |
6060
|------|-------------|
6161
| <a name="output_adminuser"></a> [adminuser](#output\_adminuser) | Database admin user name |
62+
| <a name="output_cbr_rule_ids"></a> [cbr\_rule\_ids](#output\_cbr\_rule\_ids) | CBR rule ids created to restrict MySQL |
6263
| <a name="output_certificate_base64"></a> [certificate\_base64](#output\_certificate\_base64) | Database connection certificate |
6364
| <a name="output_crn"></a> [crn](#output\_crn) | MySQL instance crn |
6465
| <a name="output_guid"></a> [guid](#output\_guid) | MySQL instance guid |
6566
| <a name="output_hostname"></a> [hostname](#output\_hostname) | Database connection hostname |
6667
| <a name="output_id"></a> [id](#output\_id) | MySQL instance id |
6768
| <a name="output_port"></a> [port](#output\_port) | Database connection port |
69+
| <a name="output_service_credentials_json"></a> [service\_credentials\_json](#output\_service\_credentials\_json) | Service credentials json map |
70+
| <a name="output_service_credentials_object"></a> [service\_credentials\_object](#output\_service\_credentials\_object) | Service credentials object |
6871
| <a name="output_version"></a> [version](#output\_version) | MySQL instance version |
6972
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->

modules/fscloud/outputs.tf

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -42,3 +42,20 @@ output "certificate_base64" {
4242
value = module.mysql_db.certificate_base64
4343
sensitive = true
4444
}
45+
46+
output "cbr_rule_ids" {
47+
description = "CBR rule ids created to restrict MySQL"
48+
value = module.mysql_db.cbr_rule_ids
49+
}
50+
51+
output "service_credentials_json" {
52+
description = "Service credentials json map"
53+
value = module.mysql_db.service_credentials_json
54+
sensitive = true
55+
}
56+
57+
output "service_credentials_object" {
58+
description = "Service credentials object"
59+
value = module.mysql_db.service_credentials_object
60+
sensitive = true
61+
}

solutions/standard/DA-types.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ The following example includes all the configuration options for four service cr
7070
{
7171
"secret_group_name": "sg-1"
7272
"existing_secret_group": true
73-
"service_credentials": [
73+
"service_credentials": [ # pragma: allowlist secret
7474
{
7575
"secret_name": "cred-1"
7676
"service_credentials_source_service_role": "Writer"
@@ -89,7 +89,7 @@ The following example includes all the configuration options for four service cr
8989
},
9090
{
9191
"secret_group_name": "sg-2"
92-
"service_credentials": [
92+
"service_credentials": [ # pragma: allowlist secret
9393
{
9494
"secret_name": "cred-3"
9595
"service_credentials_source_service_role": "Editor"
@@ -127,12 +127,12 @@ If you can't use the IAM-enabled `service_credential_names` input variable for a
127127
[
128128
{
129129
"name": "es_admin",
130-
"password": "securepassword123",
130+
"password": "securepassword123", # pragma: allowlist secret
131131
"type": "database",
132132
},
133133
{
134134
"name": "es_reader",
135-
"password": "readpassword123",
135+
"password": "readpassword123", # pragma: allowlist secret
136136
"type": "ops_manager"
137137
}
138138
]

solutions/standard/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -258,14 +258,14 @@ module "mysql" {
258258
use_same_kms_key_for_backups = local.use_same_kms_key_for_backups
259259
use_default_backup_encryption_key = var.use_default_backup_encryption_key
260260
access_tags = var.access_tags
261-
resource_tags = var.tags
261+
resource_tags = var.tags
262262
admin_pass = local.admin_pass
263263
users = var.users
264264
members = var.members
265265
member_host_flavor = var.member_host_flavor
266-
member_memory_mb = var.member_memory_mb
267-
member_disk_mb = var.member_disk_mb
268-
member_cpu_count = var.member_cpu_count
266+
member_memory_mb = var.member_memory_mb
267+
member_disk_mb = var.member_disk_mb
268+
member_cpu_count = var.member_cpu_count
269269
auto_scaling = var.auto_scaling
270270
service_credential_names = var.service_credential_names
271271
backup_crn = var.backup_crn
@@ -333,4 +333,4 @@ module "secrets_manager_service_credentials" {
333333
existing_sm_instance_region = local.existing_secrets_manager_instance_region
334334
endpoint_type = var.existing_secrets_manager_endpoint_type
335335
secrets = local.service_credential_secrets
336-
}
336+
}

0 commit comments

Comments
 (0)