You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: removed support for IAM account settings. Input variables access_groups and iam_account_settings have been removed from root level module. They can also no longer be set in the override json. Use the [terraform-ibm-iam-account-settings](https://github.com/terraform-ibm-modules/terraform-ibm-iam-account-settings) module for setting up IAM account settings. (#671)
| <a name="input_access_groups"></a> [access\_groups](#input\_access\_groups) | A list of access groups to create | <pre>list(<br> object({<br> name = string # Name of the group<br> description = string # Description of group<br> policies = list(<br> object({<br> name = string # Name of the policy<br> roles = list(string) # list of roles for the policy<br> resources = object({<br> resource_group = optional(string) # Name of the resource group the policy will apply to<br> resource_type = optional(string) # Name of the resource type for the policy ex. "resource-group"<br> resource = optional(string) # The resource of the policy definition<br> service = optional(string) # Name of the service type for the policy ex. "cloud-object-storage"<br> resource_instance_id = optional(string) # ID of a service instance to give permissions<br> })<br> })<br> )<br> dynamic_policies = optional(<br> list(<br> object({<br> name = string # Dynamic group name<br> identity_provider = string # URI for identity provider<br> expiration = number # How many hours authenticated users can work before refresh<br> conditions = object({<br> claim = string # key value to evaluate the condition against.<br> operator = string # The operation to perform on the claim. Supported values are EQUALS, EQUALS_IGNORE_CASE, IN, NOT_EQUALS_IGNORE_CASE, NOT_EQUALS, and CONTAINS.<br> value = string # Value to be compared agains<br> })<br> })<br> )<br> )<br> account_management_policies = optional(list(string))<br> invite_users = optional(list(string)) # Users to invite to the access group<br> })<br> )</pre> | `[]` | no |
909
902
| <aname="input_add_kms_block_storage_s2s"></a> [add\_kms\_block\_storage\_s2s](#input\_add\_kms\_block\_storage\_s2s)| Whether to create a service-to-service authorization between block storage and the key management service. |`bool`|`true`| no |
910
903
| <aname="input_appid"></a> [appid](#input\_appid)| The App ID instance to be used for the teleport vsi deployments | <pre>object({<br> name = optional(string)<br> resource_group = optional(string)<br> use_data = optional(bool)<br> keys = optional(list(string))<br> use_appid = bool<br> })</pre> | <pre>{<br> "use_appid": false<br>}</pre> | no |
| <a name="input_key_management"></a> [key\_management](#input\_key\_management) | Key Protect instance variables | <pre>object({<br> name = optional(string)<br> resource_group = optional(string)<br> use_data = optional(bool)<br> use_hs_crypto = optional(bool)<br> access_tags = optional(list(string), [])<br> keys = optional(<br> list(<br> object({<br> name = string<br> root_key = optional(bool)<br> payload = optional(string)<br> key_ring = optional(string) # Any key_ring added will be created<br> force_delete = optional(bool)<br> existing_key_crn = optional(string) # CRN of an existing key in the same or different account.<br> endpoint = optional(string) # can be public or private<br> iv_value = optional(string) # (Optional, Forces new resource, String) Used with import tokens. The initialization vector (IV) that is generated when you encrypt a nonce. The IV value is required to decrypt the encrypted nonce value that you provide when you make a key import request to the service. To generate an IV, encrypt the nonce by running ibmcloud kp import-token encrypt-nonce. Only for imported root key.<br> encrypted_nonce = optional(string) # The encrypted nonce value that verifies your request to import a key to Key Protect. This value must be encrypted by using the key that you want to import to the service. To retrieve a nonce, use the ibmcloud kp import-token get command. Then, encrypt the value by running ibmcloud kp import-token encrypt-nonce. Only for imported root key.<br> policies = optional(<br> object({<br> rotation = optional(<br> object({<br> interval_month = number<br> })<br> )<br> dual_auth_delete = optional(<br> object({<br> enabled = bool<br> })<br> )<br> })<br> )<br> })<br> )<br> )<br> })</pre> | n/a | yes |
919
911
| <aname="input_network_cidr"></a> [network\_cidr](#input\_network\_cidr)| Network CIDR for the VPC. This is used to manage network ACL rules for cluster provisioning. |`string`|`"10.0.0.0/8"`| no |
920
912
| <aname="input_prefix"></a> [prefix](#input\_prefix)| A unique identifier for resources. Must begin with a letter and end with a letter or number. This prefix will be prepended to any resources provisioned by this template. Prefixes must be 16 or fewer characters. |`string`| n/a | yes |
0 commit comments