You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<!-- Add a description of module(s) in this repo -->
16
-
TODO: Replace me with description of the module(s) in this repo
17
-
15
+
This module is responsible for generating authorization policies and CBR rules that enable access permissions and restrictions between a source service and a target service
18
16
19
17
<!-- Below content is automatically populated via pre-commit hook -->
20
18
<!-- BEGIN OVERVIEW HOOK -->
@@ -49,38 +47,42 @@ unless real values don't help users know what to change.
49
47
-->
50
48
51
49
```hcl
52
-
50
+
module "service_auth_cbr_rules" {
51
+
# Replace "main" with a GIT release version to lock into a specific release
52
+
source = "terraform-ibm-modules/s2s-auth/ibm"
53
+
version = "X.X.X" # Replace "X.X.X" with a release version to lock into a specific release
If this module requires permissions, uncomment the following block and update
59
-
the sample permissions, following the format.
60
-
Replace the sample Account and IBM Cloud service names and roles with the
61
-
information in the console at
62
-
Manage > Access (IAM) > Access groups > Access policies.
63
-
-->
64
-
65
-
<!--
66
83
You need the following permissions to run this module.
67
84
68
-
- Account Management
69
-
- **Sample Account Service** service
70
-
- `Editor` platform access
71
-
- `Manager` service access
72
-
- IAM Services
73
-
- **Sample Cloud Service** service
74
-
- `Administrator` platform access
75
-
-->
76
-
77
-
<!-- NO PERMISSIONS FOR MODULE
78
-
If no permissions are required for the module, uncomment the following
79
-
statement instead the previous block.
80
-
-->
81
-
82
-
<!-- No permissions are needed to run this module.-->
83
-
85
+
* You must have access to the target service to create an authorization between services. You can grant only the level of access that you have as a user of the target service. For example, if you have viewer access on the target service, you can assign only the viewer role for the authorization.
84
86
85
87
<!-- Below content is automatically populated via pre-commit hook -->
86
88
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
@@ -89,22 +91,36 @@ statement instead the previous block.
| <aname="input_cbr_target_service_details"></a> [cbr\_target\_service\_details](#input\_cbr\_target\_service\_details)| Details of the target service for which the rule has to be created | <pre>list(object({<br> target_service_name = string<br> target_rg = optional(string)<br> enforcement_mode = string<br> tags = optional(list(string))<br> }))</pre> |`[]`| no |
113
+
| <aname="input_prefix"></a> [prefix](#input\_prefix)| Prefix to append when creating CBR zones and CBR rules |`string`|`null`| no |
114
+
| <aname="input_service_map"></a> [service\_map](#input\_service\_map)| Map of source service and the corresponding target service details | <pre>list(object({<br> source_service_name = string<br> target_service_name = string<br> roles = list(string)<br> description = optional(string, null)<br> source_resource_instance_id = optional(string, null)<br> target_resource_instance_id = optional(string, null)<br> source_resource_group_id = optional(string, null)<br> target_resource_group_id = optional(string, null)<br> }))</pre> |`[]`| no |
115
+
| <aname="input_zone_service_ref_list"></a> [zone\_service\_ref\_list](#input\_zone\_service\_ref\_list)| Service reference for the zone creation |`list(string)`|`[]`| no |
116
+
| <aname="input_zone_vpc_crn_list"></a> [zone\_vpc\_crn\_list](#input\_zone\_vpc\_crn\_list)| VPC CRN for the zones |`list(string)`|`[]`| no |
104
117
105
118
### Outputs
106
119
107
-
No outputs.
120
+
| Name | Description |
121
+
|------|-------------|
122
+
| <aname="output_auth_policies"></a> [auth\_policies](#output\_auth\_policies)| Authorizations created |
123
+
| <aname="output_cbr_rules"></a> [cbr\_rules](#output\_cbr\_rules)| CBR Rules created |
108
124
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
109
125
110
126
<!-- Leave this section as is so that your module has a link to local development environment set up steps for contributors to follow -->
Copy file name to clipboardExpand all lines: examples/basic/variables.tf
+1-7Lines changed: 1 addition & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -17,17 +17,11 @@ variable "region" {
17
17
variable"prefix" {
18
18
type=string
19
19
description="Prefix to append to all resources created by this example"
20
-
default="basic"
20
+
default="basic-s2s"
21
21
}
22
22
23
23
variable"resource_group" {
24
24
type=string
25
25
description="The name of an existing resource group to provision resources in to. If not set a new resource group will be created using the prefix variable"
26
26
default=null
27
27
}
28
-
29
-
variable"resource_tags" {
30
-
type=list(string)
31
-
description="Optional list of tags to be added to created resources"
0 commit comments