diff --git a/README.md b/README.md index 738fa9e..b60fab4 100644 --- a/README.md +++ b/README.md @@ -43,7 +43,7 @@ module "custom_credential_engine" { secrets_manager_guid = "" secrets_manager_region = "" custom_credential_engine_name = "My Custom Credentials Engine" - endpoint_type = "public" + endpoint_type = "private" code_engine_project_id = "" code_engine_job_name = "" code_engine_region = "" @@ -105,7 +105,7 @@ You need the following permissions to run this module. | [code\_engine\_project\_id](#input\_code\_engine\_project\_id) | The Project ID of the code engine project used by the custom credentials configuration. | `string` | n/a | yes | | [code\_engine\_region](#input\_code\_engine\_region) | The region of the code engine project. | `string` | n/a | yes | | [custom\_credential\_engine\_name](#input\_custom\_credential\_engine\_name) | The name of the custom credentials engine to be created. | `string` | n/a | yes | -| [endpoint\_type](#input\_endpoint\_type) | The endpoint type to communicate with the provided secrets manager instance. Possible values are `public` or `private`. | `string` | `"public"` | no | +| [endpoint\_type](#input\_endpoint\_type) | The endpoint type to communicate with the provided secrets manager instance. Possible values are `public` or `private`. | `string` | `"private"` | no | | [iam\_credential\_secret\_auto\_rotation\_interval](#input\_iam\_credential\_secret\_auto\_rotation\_interval) | The rotation interval for the rotation policy. | `string` | `60` | no | | [iam\_credential\_secret\_auto\_rotation\_unit](#input\_iam\_credential\_secret\_auto\_rotation\_unit) | The unit of time for rotation policy. Acceptable values are `day` or `month`. | `string` | `"day"` | no | | [iam\_credential\_secret\_group\_id](#input\_iam\_credential\_secret\_group\_id) | Secret Group ID of secret where IAM Secret will be added to, leave default (null) to add in the default secret group. | `string` | `null` | no | diff --git a/ibm_catalog.json b/ibm_catalog.json index e9b2318..3ae70de 100644 --- a/ibm_catalog.json +++ b/ibm_catalog.json @@ -178,6 +178,7 @@ }, { "key": "endpoint_type", + "hidden": true, "options": [ { "displayname": "private", diff --git a/solutions/fully-configurable/variables.tf b/solutions/fully-configurable/variables.tf index 7f34a32..bdf2119 100644 --- a/solutions/fully-configurable/variables.tf +++ b/solutions/fully-configurable/variables.tf @@ -65,7 +65,7 @@ variable "skip_secrets_manager_code_engine_auth_policy" { variable "endpoint_type" { type = string description = "The endpoint type to communicate with the provided secrets manager instance. Possible values are `public` or `private`" - default = "public" + default = "private" validation { condition = contains(["public", "private"], var.endpoint_type) diff --git a/tests/pr_test.go b/tests/pr_test.go index bbe5905..a9850e2 100644 --- a/tests/pr_test.go +++ b/tests/pr_test.go @@ -27,7 +27,6 @@ var permanentResources map[string]interface{} // TestMain will be run before any parallel tests, used to read data from yaml for use with tests func TestMain(m *testing.M) { - var err error permanentResources, err = common.LoadMapFromYaml(yamlLocation) if err != nil { diff --git a/variables.tf b/variables.tf index 031c0d5..3b18aa0 100644 --- a/variables.tf +++ b/variables.tf @@ -26,7 +26,7 @@ variable "skip_secrets_manager_code_engine_auth_policy" { variable "endpoint_type" { type = string description = "The endpoint type to communicate with the provided secrets manager instance. Possible values are `public` or `private`." - default = "public" + default = "private" validation { condition = contains(["public", "private"], var.endpoint_type) error_message = "The specified endpoint_type is not a valid selection!"