Skip to content

Commit 9ba1783

Browse files
fix: onboard module to IBM Cloud module registry (#491)
1 parent 58562ae commit 9ba1783

21 files changed

+130
-34
lines changed

.secrets.baseline

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "go.sum|^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2023-06-07T10:48:18Z",
6+
"generated_at": "2023-11-22T17:09:56Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -86,6 +86,16 @@
8686
"type": "Secret Keyword",
8787
"verified_result": null
8888
}
89+
],
90+
"ibm_catalog.json": [
91+
{
92+
"hashed_secret": "2a66dd6b2184e0722c4f448eaac79a1897987a30",
93+
"is_secret": false,
94+
"is_verified": false,
95+
"line_number": 22,
96+
"type": "Secret Keyword",
97+
"verified_result": null
98+
}
8999
]
90100
},
91101
"version": "0.13.1+ibm.61.dss",

README.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -19,19 +19,19 @@ provider "ibm" {
1919
2020
# KMS root key
2121
module "kms_root_key" {
22-
source = "terraform-ibm-modules/kms-key/ibm"
23-
version = "latest" # Replace "latest" with a release version to lock into a specific release
24-
kms_instance_id = ibm_resource_instance.kms_instance.guid
25-
key_name = "my-root-key"
22+
source = "terraform-ibm-modules/kms-key/ibm"
23+
version = "X.X.X" # Replace "X.X.X" with a release version to lock into a specific release
24+
kms_instance_id = "XXxxXXxx-xxxx-XXXX-xxxx-XXxxXXxx"
25+
key_name = "my-root-key"
2626
}
2727
2828
# KMS standard key
2929
module "kms_standard_key" {
30-
source = "terraform-ibm-modules/kms-key/ibm"
31-
version = "latest" # Replace "latest" with a release version to lock into a specific release
32-
kms_instance_id = ibm_resource_instance.kms_instance.guid
33-
key_name = "my-standard-key"
34-
standard_key = true
30+
source = "terraform-ibm-modules/kms-key/ibm"
31+
version = "X.X.X" # Replace "X.X.X" with a release version to lock into a specific release
32+
kms_instance_id = "XXxxXXxx-xxxx-XXXX-xxxx-XXxxXXxx"
33+
key_name = "my-standard-key"
34+
standard_key = true
3535
}
3636
```
3737

@@ -49,8 +49,8 @@ You need the following permissions to run this module.
4949
<!-- BEGIN EXAMPLES HOOK -->
5050
## Examples
5151

52-
- [ End to end example with default values](examples/default)
53-
- [ Example that uses existing KMS instance](examples/existing-kms)
52+
- [ Basic example](examples/basic)
53+
- [ Complete example](examples/complete)
5454
<!-- END EXAMPLES HOOK -->
5555
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
5656
### Requirements

cra-config.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
# More info about this file at https://github.com/terraform-ibm-modules/common-pipeline-assets/blob/main/.github/workflows/terraform-test-pipeline.md#cra-config-yaml
22
version: "v1"
33
CRA_TARGETS:
4-
- CRA_TARGET: "examples/default" # Target directory for CRA scan. If not provided, the CRA Scan will not be run.
4+
- CRA_TARGET: "examples/complete" # Target directory for CRA scan. If not provided, the CRA Scan will not be run.
55
CRA_IGNORE_RULES_FILE: "cra-tf-validate-ignore-rules.json" # CRA Ignore file to use. If not provided, it checks the repo root directory for `cra-tf-validate-ignore-rules.json`
66
PROFILE_ID: "0e6e7b5a-817d-4344-ab6f-e5d7a9c49520" # SCC profile ID (currently set to the FSCloud 1.4.0 profile).
77
# SCC_INSTANCE_ID: "" # The SCC instance ID to use to download profile for CRA scan. If not provided, a default global value will be used.

examples/basic/README.md

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
# Basic example
2+
3+
A simple example that shows how to create a standard and a root key in an existing IBM Key Management Service (KMS) instance.
4+
5+
The following resources are provisioned by this example:
6+
- Create a root key in the existing KMS instance.
7+
- Create a standard key in the existing KMS instance.
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
{
2+
"ibmcloud_api_key": $VALIDATION_APIKEY,
3+
"existing_kms_instance_guid": $HPCS_US_SOUTH_GUID,
4+
"prefix": $PREFIX
5+
}

0 commit comments

Comments
 (0)