Skip to content

Commit 04a023a

Browse files
fix: resolve comments
1 parent 578f0fb commit 04a023a

File tree

13 files changed

+43
-43
lines changed

13 files changed

+43
-43
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ You need the following permissions to run this module.
5656

5757
| Name | Version |
5858
|------|---------|
59-
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.9.0 |
59+
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3.0 |
6060
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.70.0, <2.0.0 |
6161
| <a name="requirement_time"></a> [time](#requirement\_time) | >= 0.9.1 |
6262

examples/backup-restore/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
terraform {
2-
required_version = ">= 1.9.0"
2+
required_version = ">= 1.3.0"
33
required_providers {
44
# Pin to the lowest provider version of the range defined in the main module's version.tf to ensure lowest version still works
55
ibm = {

examples/basic/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
terraform {
2-
required_version = ">= 1.9.0"
2+
required_version = ">= 1.3.0"
33
required_providers {
44
# Pin to the lowest provider version of the range defined in the main module's version.tf to ensure lowest version still works
55
ibm = {

examples/complete/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
terraform {
2-
required_version = ">= 1.9.0"
2+
required_version = ">= 1.3.0"
33
required_providers {
44
# Pin to the lowest provider version of the range defined in the main module's version.tf to ensure lowest version still works
55
ibm = {

examples/fscloud/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
terraform {
2-
required_version = ">= 1.9.0"
2+
required_version = ">= 1.3.0"
33
required_providers {
44
# Use latest version of provider in non-basic examples to verify latest version works with module
55
ibm = {

ibm_catalog.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -325,13 +325,13 @@
325325
"key": "admin_pass_secrets_manager_secret_name"
326326
},
327327
{
328-
"key": "cbr_rules"
328+
"key": "use_existing_admin_pass_secrets_manager_secret_group"
329329
},
330330
{
331-
"key": "existing_db_instance_crn"
331+
"key": "cbr_rules"
332332
},
333333
{
334-
"key": "use_existing_admin_pass_secrets_manager_secret_group"
334+
"key": "existing_rabbitmq_instance_crn"
335335
}
336336
]
337337
}

solutions/standard/main.tf

Lines changed: 27 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -18,17 +18,17 @@ module "resource_group" {
1818

1919
locals {
2020
# tflint-ignore: terraform_unused_declarations
21-
validate_kms_1 = var.existing_db_instance_crn != null ? true : var.use_ibm_owned_encryption_key && (var.existing_kms_instance_crn != null || var.existing_kms_key_crn != null || var.existing_backup_kms_key_crn != null) ? tobool("When setting values for 'existing_kms_instance_crn', 'existing_kms_key_crn' or 'existing_backup_kms_key_crn', the 'use_ibm_owned_encryption_key' input must be set to false.") : true
21+
validate_kms_1 = var.existing_rabbitmq_instance_crn != null ? true : var.use_ibm_owned_encryption_key && (var.existing_kms_instance_crn != null || var.existing_kms_key_crn != null || var.existing_backup_kms_key_crn != null) ? tobool("When setting values for 'existing_kms_instance_crn', 'existing_kms_key_crn' or 'existing_backup_kms_key_crn', the 'use_ibm_owned_encryption_key' input must be set to false.") : true
2222
# tflint-ignore: terraform_unused_declarations
23-
validate_kms_2 = var.existing_db_instance_crn != null ? true : !var.use_ibm_owned_encryption_key && (var.existing_kms_instance_crn == null && var.existing_kms_key_crn == null) ? tobool("When 'use_ibm_owned_encryption_key' is false, a value is required for either 'existing_kms_instance_crn' (to create a new key), or 'existing_kms_key_crn' to use an existing key.") : true
23+
validate_kms_2 = var.existing_rabbitmq_instance_crn != null ? true : !var.use_ibm_owned_encryption_key && (var.existing_kms_instance_crn == null && var.existing_kms_key_crn == null) ? tobool("When 'use_ibm_owned_encryption_key' is false, a value is required for either 'existing_kms_instance_crn' (to create a new key), or 'existing_kms_key_crn' to use an existing key.") : true
2424
}
2525

2626
#######################################################################################################################
2727
# KMS encryption key
2828
#######################################################################################################################
2929

3030
locals {
31-
create_new_kms_key = var.existing_db_instance_crn == null && !var.use_ibm_owned_encryption_key && var.existing_kms_key_crn == null ? true : false # no need to create any KMS resources if passing an existing key, or using IBM owned keys
31+
create_new_kms_key = var.existing_rabbitmq_instance_crn == null && !var.use_ibm_owned_encryption_key && var.existing_kms_key_crn == null ? true : false # no need to create any KMS resources if passing an existing key, or using IBM owned keys
3232
rabbitmq_key_name = var.prefix != null ? "${var.prefix}-${var.key_name}" : var.key_name
3333
rabbitmq_key_ring_name = var.prefix != null ? "${var.prefix}-${var.key_ring_name}" : var.key_ring_name
3434
}
@@ -99,24 +99,24 @@ data "ibm_iam_account_settings" "iam_account_settings" {
9999

100100
locals {
101101
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
102-
create_cross_account_kms_auth_policy = var.existing_db_instance_crn == null && !var.skip_rabbitmq_kms_auth_policy && var.ibmcloud_kms_api_key != null && !var.use_ibm_owned_encryption_key
103-
create_cross_account_backup_kms_auth_policy = var.existing_db_instance_crn == null && !var.skip_rabbitmq_kms_auth_policy && var.ibmcloud_kms_api_key != null && !var.use_ibm_owned_encryption_key && var.existing_backup_kms_key_crn != null
102+
create_cross_account_kms_auth_policy = var.existing_rabbitmq_instance_crn == null && !var.skip_rabbitmq_kms_auth_policy && var.ibmcloud_kms_api_key != null && !var.use_ibm_owned_encryption_key
103+
create_cross_account_backup_kms_auth_policy = var.existing_rabbitmq_instance_crn == null && !var.skip_rabbitmq_kms_auth_policy && var.ibmcloud_kms_api_key != null && !var.use_ibm_owned_encryption_key && var.existing_backup_kms_key_crn != null
104104

105105
# If KMS encryption enabled (and existing ES instance is not being passed), parse details from the existing key if being passed, otherwise get it from the key that the DA creates
106-
kms_account_id = var.existing_db_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? module.kms_key_crn_parser[0].account_id : module.kms_instance_crn_parser[0].account_id
107-
kms_service = var.existing_db_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? module.kms_key_crn_parser[0].service_name : module.kms_instance_crn_parser[0].service_name
108-
kms_instance_guid = var.existing_db_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? module.kms_key_crn_parser[0].service_instance : module.kms_instance_crn_parser[0].service_instance
109-
kms_key_crn = var.existing_db_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? var.existing_kms_key_crn : module.kms[0].keys[format("%s.%s", local.rabbitmq_key_ring_name, local.rabbitmq_key_name)].crn
110-
kms_key_id = var.existing_db_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? module.kms_key_crn_parser[0].resource : module.kms[0].keys[format("%s.%s", local.rabbitmq_key_ring_name, local.rabbitmq_key_name)].key_id
111-
kms_region = var.existing_db_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? module.kms_key_crn_parser[0].region : module.kms_instance_crn_parser[0].region
106+
kms_account_id = var.existing_rabbitmq_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? module.kms_key_crn_parser[0].account_id : module.kms_instance_crn_parser[0].account_id
107+
kms_service = var.existing_rabbitmq_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? module.kms_key_crn_parser[0].service_name : module.kms_instance_crn_parser[0].service_name
108+
kms_instance_guid = var.existing_rabbitmq_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? module.kms_key_crn_parser[0].service_instance : module.kms_instance_crn_parser[0].service_instance
109+
kms_key_crn = var.existing_rabbitmq_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? var.existing_kms_key_crn : module.kms[0].keys[format("%s.%s", local.rabbitmq_key_ring_name, local.rabbitmq_key_name)].crn
110+
kms_key_id = var.existing_rabbitmq_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? module.kms_key_crn_parser[0].resource : module.kms[0].keys[format("%s.%s", local.rabbitmq_key_ring_name, local.rabbitmq_key_name)].key_id
111+
kms_region = var.existing_rabbitmq_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_kms_key_crn != null ? module.kms_key_crn_parser[0].region : module.kms_instance_crn_parser[0].region
112112

113113
# If creating KMS cross account policy for backups, parse backup key details from passed in key CRN
114114
backup_kms_account_id = local.create_cross_account_backup_kms_auth_policy ? module.kms_backup_key_crn_parser[0].account_id : local.kms_account_id
115115
backup_kms_service = local.create_cross_account_backup_kms_auth_policy ? module.kms_backup_key_crn_parser[0].service_name : local.kms_service
116116
backup_kms_instance_guid = local.create_cross_account_backup_kms_auth_policy ? module.kms_backup_key_crn_parser[0].service_instance : local.kms_instance_guid
117117
backup_kms_key_id = local.create_cross_account_backup_kms_auth_policy ? module.kms_backup_key_crn_parser[0].resource : local.kms_key_id
118118

119-
backup_kms_key_crn = var.existing_db_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_backup_kms_key_crn
119+
backup_kms_key_crn = var.existing_rabbitmq_instance_crn != null || var.use_ibm_owned_encryption_key ? null : var.existing_backup_kms_key_crn
120120
# Always use same key for backups unless user explicially passed a value for 'existing_backup_kms_key_crn'
121121
use_same_kms_key_for_backups = var.existing_backup_kms_key_crn == null ? true : false
122122
}
@@ -246,31 +246,31 @@ locals {
246246

247247
# Look up existing instance details if user passes one
248248
module "rabbitmq_instance_crn_parser" {
249-
count = var.existing_db_instance_crn != null ? 1 : 0
249+
count = var.existing_rabbitmq_instance_crn != null ? 1 : 0
250250
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
251251
version = "1.1.0"
252-
crn = var.existing_db_instance_crn
252+
crn = var.existing_rabbitmq_instance_crn
253253
}
254254

255255
# Existing instance local vars
256256
locals {
257-
existing_rabbitmq_guid = var.existing_db_instance_crn != null ? module.rabbitmq_instance_crn_parser[0].service_instance : null
258-
existing_rabbitmq_region = var.existing_db_instance_crn != null ? module.rabbitmq_instance_crn_parser[0].region : null
257+
existing_rabbitmq_guid = var.existing_rabbitmq_instance_crn != null ? module.rabbitmq_instance_crn_parser[0].service_instance : null
258+
existing_rabbitmq_region = var.existing_rabbitmq_instance_crn != null ? module.rabbitmq_instance_crn_parser[0].region : null
259259

260260
# Validate the region input matches region detected in existing instance CRN (approach based on https://github.com/hashicorp/terraform/issues/25609#issuecomment-1057614400)
261261
# tflint-ignore: terraform_unused_declarations
262-
validate_existing_instance_region = var.existing_db_instance_crn != null && var.region != local.existing_rabbitmq_region ? tobool("The region detected in the 'existing_db_instance_crn' value must match the value of the 'region' input variable when passing an existing instance.") : true
262+
validate_existing_instance_region = var.existing_rabbitmq_instance_crn != null && var.region != local.existing_rabbitmq_region ? tobool("The region detected in the 'existing_rabbitmq_instance_crn' value must match the value of the 'region' input variable when passing an existing instance.") : true
263263
}
264264

265265
# Do a data lookup on the resource GUID to get more info that is needed for the 'ibm_database' data lookup below
266266
data "ibm_resource_instance" "existing_instance_resource" {
267-
count = var.existing_db_instance_crn != null ? 1 : 0
267+
count = var.existing_rabbitmq_instance_crn != null ? 1 : 0
268268
identifier = local.existing_rabbitmq_guid
269269
}
270270

271271
# Lookup details of existing instance
272272
data "ibm_database" "existing_db_instance" {
273-
count = var.existing_db_instance_crn != null ? 1 : 0
273+
count = var.existing_rabbitmq_instance_crn != null ? 1 : 0
274274
name = data.ibm_resource_instance.existing_instance_resource[0].name
275275
resource_group_id = data.ibm_resource_instance.existing_instance_resource[0].resource_group_id
276276
location = var.region
@@ -279,7 +279,7 @@ data "ibm_database" "existing_db_instance" {
279279

280280
# Lookup existing instance connection details
281281
data "ibm_database_connection" "existing_connection" {
282-
count = var.existing_db_instance_crn != null ? 1 : 0
282+
count = var.existing_rabbitmq_instance_crn != null ? 1 : 0
283283
endpoint_type = "private"
284284
deployment_id = data.ibm_database.existing_db_instance[0].id
285285
user_id = data.ibm_database.existing_db_instance[0].adminuser
@@ -288,7 +288,7 @@ data "ibm_database_connection" "existing_connection" {
288288

289289
# Create new instance
290290
module "rabbitmq" {
291-
count = var.existing_db_instance_crn != null ? 0 : 1
291+
count = var.existing_rabbitmq_instance_crn != null ? 0 : 1
292292
source = "../../modules/fscloud"
293293
depends_on = [time_sleep.wait_for_authorization_policy, time_sleep.wait_for_backup_kms_authorization_policy]
294294
resource_group_id = module.resource_group.resource_group_id
@@ -317,12 +317,12 @@ module "rabbitmq" {
317317
}
318318

319319
locals {
320-
rabbitmq_guid = var.existing_db_instance_crn != null ? data.ibm_database.existing_db_instance[0].guid : module.rabbitmq[0].guid
321-
rabbitmq_id = var.existing_db_instance_crn != null ? data.ibm_database.existing_db_instance[0].id : module.rabbitmq[0].id
322-
rabbitmq_version = var.existing_db_instance_crn != null ? data.ibm_database.existing_db_instance[0].version : module.rabbitmq[0].version
323-
rabbitmq_crn = var.existing_db_instance_crn != null ? var.existing_db_instance_crn : module.rabbitmq[0].crn
324-
rabbitmq_hostname = var.existing_db_instance_crn != null ? data.ibm_database_connection.existing_connection[0].https[0].hosts[0].hostname : module.rabbitmq[0].hostname
325-
rabbitmq_port = var.existing_db_instance_crn != null ? data.ibm_database_connection.existing_connection[0].https[0].hosts[0].port : module.rabbitmq[0].port
320+
rabbitmq_guid = var.existing_rabbitmq_instance_crn != null ? data.ibm_database.existing_db_instance[0].guid : module.rabbitmq[0].guid
321+
rabbitmq_id = var.existing_rabbitmq_instance_crn != null ? data.ibm_database.existing_db_instance[0].id : module.rabbitmq[0].id
322+
rabbitmq_version = var.existing_rabbitmq_instance_crn != null ? data.ibm_database.existing_db_instance[0].version : module.rabbitmq[0].version
323+
rabbitmq_crn = var.existing_rabbitmq_instance_crn != null ? var.existing_rabbitmq_instance_crn : module.rabbitmq[0].crn
324+
rabbitmq_hostname = var.existing_rabbitmq_instance_crn != null ? data.ibm_database_connection.existing_connection[0].https[0].hosts[0].hostname : module.rabbitmq[0].hostname
325+
rabbitmq_port = var.existing_rabbitmq_instance_crn != null ? data.ibm_database_connection.existing_connection[0].https[0].hosts[0].port : module.rabbitmq[0].port
326326
}
327327

328328
#######################################################################################################################

solutions/standard/outputs.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,13 +24,13 @@ output "crn" {
2424

2525
output "service_credentials_json" {
2626
description = "Service credentials json map"
27-
value = var.existing_db_instance_crn != null ? null : module.rabbitmq[0].service_credentials_json
27+
value = var.existing_rabbitmq_instance_crn != null ? null : module.rabbitmq[0].service_credentials_json
2828
sensitive = true
2929
}
3030

3131
output "service_credentials_object" {
3232
description = "Service credentials object"
33-
value = var.existing_db_instance_crn != null ? null : module.rabbitmq[0].service_credentials_object
33+
value = var.existing_rabbitmq_instance_crn != null ? null : module.rabbitmq[0].service_credentials_object
3434
sensitive = true
3535
}
3636

solutions/standard/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ variable "rabbitmq_version" {
4242
default = null
4343
}
4444

45-
variable "existing_db_instance_crn" {
45+
variable "existing_rabbitmq_instance_crn" {
4646
type = string
4747
default = null
4848
description = "The CRN of an existing Messages for RabbitMQ instance. If no value is specified, a new instance is created."

0 commit comments

Comments
 (0)