Skip to content

Commit 7bfb6fc

Browse files
authored
feat: remove Account Config DA from customize DA flow, add default value for prefix using random string generator and update logic that handles default resource group lookup (#375)
1 parent 6fa4b77 commit 7bfb6fc

File tree

3 files changed

+40
-50
lines changed

3 files changed

+40
-50
lines changed

ibm_catalog.json

Lines changed: 35 additions & 49 deletions
Original file line numberDiff line numberDiff line change
@@ -78,7 +78,32 @@
7878
},
7979
{
8080
"key": "prefix",
81-
"required": true
81+
"default_value": "dev",
82+
"random_string": {
83+
"length": 4
84+
},
85+
"value_constraints": [
86+
{
87+
"type": "regex",
88+
"description": "Prefix must begin with a lowercase letter and may contain only lowercase letters, digits, and hyphens '-'. It must not end with a hyphen('-'), and cannot contain consecutive hyphens ('--'). It should not exceed 16 characters.",
89+
"value": "^$|^__NULL__$|^[a-z](?!.*--)(?:[a-z0-9-]{0,14}[a-z0-9])?$"
90+
}
91+
]
92+
},
93+
{
94+
"key": "existing_resource_group_name",
95+
"display_name": "resource_group",
96+
"custom_config": {
97+
"type": "resource_group",
98+
"grouping": "deployment",
99+
"original_grouping": "deployment",
100+
"config_constraints": {
101+
"identifier": "rg_name"
102+
}
103+
},
104+
"default_value": "Default",
105+
"description": "The name of an existing resource group to provision the resources. [Learn more](https://cloud.ibm.com/docs/account?topic=account-rgs&interface=ui#create_rgs) about how to create a resource group.",
106+
"virtual": true
82107
},
83108
{
84109
"key": "secrets_manager_region",
@@ -334,14 +359,6 @@
334359
"service_name": "secrets-manager",
335360
"notes": "[optional] Required for creating an Secrets Manager instance."
336361
},
337-
{
338-
"role_crns": [
339-
"crn:v1:bluemix:public:iam::::role:Operator",
340-
"crn:v1:bluemix:public:iam::::role:Administrator"
341-
],
342-
"service_name": "iam-identity",
343-
"notes": "[Optional] Required for Cloud automation for account configuration is enabled."
344-
},
345362
{
346363
"role_crns": [
347364
"crn:v1:bluemix:public:iam::::role:Viewer"
@@ -363,15 +380,15 @@
363380
"crn:v1:bluemix:public:iam::::role:Editor"
364381
],
365382
"service_name": "sysdig-monitor",
366-
"notes": "[Optional] Required if you are consuming the Observability deployable architecture which sets up Cloud Monitoring."
383+
"notes": "[Optional] Required if configuring a Cloud Monitoring instance."
367384
},
368385
{
369386
"role_crns": [
370387
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
371388
"crn:v1:bluemix:public:iam::::role:Editor"
372389
],
373390
"service_name": "logs",
374-
"notes": "[Optional] Required if you are consuming the Observability deployable architecture which sets up Cloud Logs."
391+
"notes": "[Optional] Required if configuring a Cloud Logs instance."
375392
},
376393
{
377394
"role_crns": [
@@ -392,9 +409,9 @@
392409
],
393410
"dependencies": [
394411
{
395-
"name": "deploy-arch-ibm-secrets-manager",
396-
"id": "6d6ebc76-7bbd-42f5-8bc7-78f4fabd5944-global",
397-
"version": "v2.10.0",
412+
"name": "deploy-arch-secrets-manager-private-cert-engine",
413+
"id": "571d2eb7-e416-40a4-aa95-be05e6155af8-global",
414+
"version": "v1.10.1",
398415
"flavors": [
399416
"fully-configurable"
400417
],
@@ -411,38 +428,8 @@
411428
"reference_version": true
412429
},
413430
{
414-
"dependency_input": "region",
415-
"version_input": "secrets_manager_region",
416-
"reference_version": true
417-
},
418-
{
419-
"dependency_input": "service_plan",
420-
"version_input": "secrets_manager_service_plan",
421-
"reference_version": true
422-
},
423-
{
424-
"dependency_output": "secrets_manager_crn",
425-
"version_input": "existing_secrets_manager_crn"
426-
}
427-
]
428-
},
429-
{
430-
"name": "deploy-arch-secrets-manager-private-cert-engine",
431-
"id": "571d2eb7-e416-40a4-aa95-be05e6155af8-global",
432-
"version": "v1.8.0",
433-
"flavors": [
434-
"fully-configurable"
435-
],
436-
"catalog_id": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3",
437-
"optional": true,
438-
"on_by_default": true,
439-
"ignore_auto_referencing": [
440-
"*"
441-
],
442-
"input_mapping": [
443-
{
444-
"dependency_input": "prefix",
445-
"version_input": "prefix",
431+
"dependency_input": "existing_resource_group_name",
432+
"version_input": "existing_resource_group_name",
446433
"reference_version": true
447434
},
448435
{
@@ -451,9 +438,8 @@
451438
"reference_version": true
452439
},
453440
{
454-
"dependency_input": "existing_secrets_manager_crn",
455-
"version_input": "existing_secrets_manager_crn",
456-
"reference_version": true
441+
"dependency_output": "secrets_manager_crn",
442+
"version_input": "existing_secrets_manager_crn"
457443
},
458444
{
459445
"dependency_input": "secrets_manager_service_plan",

solutions/fully-configurable/outputs.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,3 +12,8 @@ output "secret_crn" {
1212
description = "Private certificates secrets manager secret CRN"
1313
value = module.secrets_manager_private_cert.secret_crn
1414
}
15+
16+
output "secrets_manager_crn" {
17+
description = "The CRN of the Secrets Manager instance"
18+
value = var.existing_secrets_manager_crn
19+
}

tests/pr_test.go

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -146,7 +146,6 @@ func TestAddonsDefaultConfiguration(t *testing.T) {
146146
"deploy-arch-secrets-manager-private-cert",
147147
"fully-configurable",
148148
map[string]interface{}{
149-
"prefix": options.Prefix,
150149
"secrets_manager_region": "eu-de",
151150
"secrets_manager_service_plan": "trial",
152151
},

0 commit comments

Comments
 (0)