Skip to content

Commit bd173d4

Browse files
resolve comments
1 parent 68610bc commit bd173d4

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

ibm_catalog.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@
2121
"solution"
2222
],
2323
"short_description": "Creates and configures a Secrets Manager Public Certificates Engine",
24-
"long_description": "This deployable architecture is used to configure an Internet Service DNS configuration, establish authorization between Secrets Manager and the Internet Service, and set up Let's Encrypt as the certificate authority. \n\nℹ️ This Terraform-based automation is part of a broader suite of IBM-maintained Infrastructure as Code (IaC) assets, each following the naming pattern \"Cloud automation for *servicename*\" and focusing on single IBM Cloud service. These single-service deployable architectures can be used on their own to streamline and automate service deployments through an [IaC approach](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-understanding-projects), or assembled together into a broader [automated IaC stack](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-config-stack) to automate the deployment of an end-to-end solution architecture.",
24+
"long_description": "This deployable architecture sets up a Public Certificates Engine in IBM Cloud Secrets Manager. A Public Certificates Engine allows you to automatically provision and manage publicly trusted TLS certificates from Let’s Encrypt. This deployable architecture configures integration between IBM Cloud Secrets Manager, Cloud Internet Services (CIS) for DNS validation, and Let’s Encrypt as the Certificate Authority. It provisions the required authorization policies, DNS configuration, and CA configuration so that applications can obtain and renew public certificates automatically. \n\nℹ️ This Terraform-based automation is part of a broader suite of IBM-maintained Infrastructure as Code (IaC) assets, each following the naming pattern \"Cloud automation for *servicename*\" and focusing on single IBM Cloud service. These single-service deployable architectures can be used on their own to streamline and automate service deployments through an [IaC approach](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-understanding-projects), or assembled together into a broader [automated IaC stack](https://cloud.ibm.com/docs/secure-enterprise?topic=secure-enterprise-config-stack) to automate the deployment of an end-to-end solution architecture.",
2525
"offering_docs_url": "https://github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-public-cert-engine/blob/main/README.md",
2626
"offering_icon_url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-secrets-manager-public-cert-engine/main/images/secrets_manager_public_cert_engine.svg",
2727
"provider_name": "IBM",
@@ -61,7 +61,7 @@
6161
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-secrets-manager-public-cert-engine/main/reference-architecture/deployable-architecture-sm-public-cert-engine.svg",
6262
"type": "image/svg+xml"
6363
},
64-
"description": "This architecture supports creating a Secrets Manager Public Certificates engine within a Secrets Manager instance, enabling automated provisioning, renewal, and management of publicly trusted TLS/SSL certificates. It integrates with certificate authoritiy Let's Encrypt and optionally with Cloud Internet Services (CIS) to streamline domain validation and certificate lifecycle management."
64+
"description": "This architecture supports creating a Secrets Manager Public Certificates Engine within a Secrets Manager instance. The Secrets Manager Public Certificates Engine enables you to issue and manage publicly trusted TLS/SSL certificates by integrating with external Certificate Authorities such as Let's Encrypt. It supports configuring DNS providers like IBM Cloud Internet Services (CIS) for domain validation, managing CA configurations, and automating the issuance and renewal of public certificates for internet-facing applications and services."
6565
}
6666
]
6767
},
@@ -96,7 +96,7 @@
9696
},
9797
{
9898
"role_crns": [
99-
"crn:v1:bluemix:public:iam::::role:Administrator",
99+
"crn:v1:bluemix:public:iam::::role:Editor",
100100
"crn:v1:bluemix:public:iam::::serviceRole:Manager"
101101
],
102102
"service_name": "secrets-manager",

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ module "secrets_manager_public_cert_engine" {
4040
internet_services_crn = var.internet_services_crn
4141
cis_account_id = var.internet_services_account_id
4242
internet_service_domain_id = var.internet_service_domain_id
43-
dns_config_name = var.dns_config_name
43+
dns_config_name = "${local.prefix}${var.dns_config_name}"
4444
ca_config_name = "${local.prefix}${var.ca_config_name}"
4545
lets_encrypt_environment = var.lets_encrypt_environment
4646
acme_letsencrypt_private_key = var.acme_letsencrypt_private_key

solutions/fully-configurable/variables.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -75,8 +75,8 @@ variable "internet_service_domain_id" {
7575

7676
variable "dns_config_name" {
7777
type = string
78-
description = "Name of the DNS config for the public_cert secrets engine. If passing a value for `dns_config_name` a value for `internet_services_crn` is required. [Learn more](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secrets-manager-cli#secrets-manager-configurations-cli)."
79-
default = null
78+
description = "Name of the DNS config for the Public Certificates Secrets Engine. If passing a value for `dns_config_name` a value for `internet_services_crn` is required. If a prefix input variable is specified, it is added to the value in the `<prefix>-value` format. [Learn more](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secrets-manager-cli#secrets-manager-configurations-cli)."
79+
default = "pub-ce-dns"
8080

8181
validation {
8282
condition = var.dns_config_name != null ? var.internet_services_crn != null : true
@@ -92,7 +92,7 @@ variable "ca_config_name" {
9292

9393
variable "lets_encrypt_environment" {
9494
type = string
95-
description = "Let's Encrypt environment (staging, production). [Learn more](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secrets-manager-cli#secrets-manager-configurations-cli)."
95+
description = "The configuration of the Let's Encrypt Certificate Authority environment. [Learn more](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-secrets-manager-cli#secrets-manager-configurations-cli)."
9696
default = "production"
9797

9898
validation {

0 commit comments

Comments
 (0)