Skip to content

Commit cd33d56

Browse files
feat: renamed the service_endpoints input to endpoint_type (#298)
1 parent 8ddf33f commit cd33d56

File tree

7 files changed

+12
-12
lines changed

7 files changed

+12
-12
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -189,6 +189,7 @@ No modules.
189189
| <a name="input_ca_config_name"></a> [ca\_config\_name](#input\_ca\_config\_name) | Name of the CA config for the public\_cert secrets engine | `string` | `null` | no |
190190
| <a name="input_cis_account_id"></a> [cis\_account\_id](#input\_cis\_account\_id) | Account ID of the CIS instance (only needed if different from Secrets Manager account) | `string` | `null` | no |
191191
| <a name="input_dns_config_name"></a> [dns\_config\_name](#input\_dns\_config\_name) | Name of the DNS config for the public\_cert secrets engine | `string` | `null` | no |
192+
| <a name="input_endpoint_type"></a> [endpoint\_type](#input\_endpoint\_type) | The endpoint type to communicate with the provided secrets manager instance. Possible values are `public` or `private` | `string` | `"public"` | no |
192193
| <a name="input_ibmcloud_cis_api_key"></a> [ibmcloud\_cis\_api\_key](#input\_ibmcloud\_cis\_api\_key) | Optional, when not using IAM authorization, use an API key for CIS DNS configuration | `string` | `null` | no |
193194
| <a name="input_internet_service_domain_id"></a> [internet\_service\_domain\_id](#input\_internet\_service\_domain\_id) | (optional) Specific domain in the CIS to authorize Secrets Manager access to. | `string` | `null` | no |
194195
| <a name="input_internet_services_crn"></a> [internet\_services\_crn](#input\_internet\_services\_crn) | CRN of the CIS instance to authorize Secrets Manager against | `string` | `null` | no |
@@ -198,7 +199,6 @@ No modules.
198199
| <a name="input_private_key_secrets_manager_secret_id"></a> [private\_key\_secrets\_manager\_secret\_id](#input\_private\_key\_secrets\_manager\_secret\_id) | The secret ID of your ACME private key. Required if acme\_letsencrypt\_private\_key is not set. If both are set, this value will be used as the private key. | `string` | `null` | no |
199200
| <a name="input_region"></a> [region](#input\_region) | Region where resources will be created or fetched from | `string` | `"us-south"` | no |
200201
| <a name="input_secrets_manager_guid"></a> [secrets\_manager\_guid](#input\_secrets\_manager\_guid) | GUID of secrets manager instance to create the secret engine in | `string` | n/a | yes |
201-
| <a name="input_service_endpoints"></a> [service\_endpoints](#input\_service\_endpoints) | The service endpoint type to communicate with the provided secrets manager instance. Possible values are `public` or `private` | `string` | `"public"` | no |
202202
| <a name="input_skip_iam_authorization_policy"></a> [skip\_iam\_authorization\_policy](#input\_skip\_iam\_authorization\_policy) | Set to true to skip the creation of an IAM authorization policy that permits Secrets Manager to create a DNS config in the CIS specified in `internet_services_crn`. WARNING: An authorization policy must exist before a DNS config can be created, OR an API key must be provided in `ibmcloud_cis_api_key` | `bool` | `false` | no |
203203

204204
### Outputs

examples/api_key_auth/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ module "public_secret_engine" {
6565
private_key_secrets_manager_instance_guid = var.private_key_secrets_manager_instance_guid
6666
private_key_secrets_manager_secret_id = var.private_key_secrets_manager_secret_id
6767
private_key_secrets_manager_region = var.private_key_secrets_manager_region
68-
service_endpoints = "private"
68+
endpoint_type = "private"
6969
}
7070

7171
# TODO: Uncomment the following block once the certificate module is published

ibm_catalog.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@
266266
"description": "The pricing plan to use when provisioning a Secrets Manager instance. Possible values: `standard`, `trial`. You can create only one Trial instance of Secrets Manager per account. Before you can create a new Trial instance, you must delete the existing Trial instance and its reclamation. [Learn more](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-create-instance&interface=ui#upgrade-instance-standard)."
267267
},
268268
{
269-
"key": "service_endpoints",
269+
"key": "endpoint_type",
270270
"hidden": true
271271
},
272272
{

main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@ resource "ibm_sm_public_certificate_configuration_dns_cis" "public_dns_config" {
5656
count = var.dns_config_name != null ? 1 : 0
5757
instance_id = var.secrets_manager_guid
5858
region = var.region
59-
endpoint_type = var.service_endpoints
59+
endpoint_type = var.endpoint_type
6060
name = var.dns_config_name
6161
cloud_internet_services_apikey = var.ibmcloud_cis_api_key
6262
cloud_internet_services_crn = var.internet_services_crn
@@ -80,7 +80,7 @@ resource "ibm_sm_public_certificate_configuration_ca_lets_encrypt" "public_ca_co
8080
count = var.ca_config_name != null ? 1 : 0
8181
instance_id = var.secrets_manager_guid
8282
region = var.region
83-
endpoint_type = var.service_endpoints
83+
endpoint_type = var.endpoint_type
8484
name = var.ca_config_name
8585
lets_encrypt_environment = var.lets_encrypt_environment
8686
lets_encrypt_private_key = local.acme_letsencrypt_private_key

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ module "secrets_manager_public_cert_engine" {
4444
ca_config_name = var.ca_config_name == null ? null : "${local.prefix}${var.ca_config_name}"
4545
lets_encrypt_environment = var.lets_encrypt_environment
4646
acme_letsencrypt_private_key = var.acme_letsencrypt_private_key
47-
service_endpoints = var.service_endpoints
47+
endpoint_type = var.endpoint_type
4848
skip_iam_authorization_policy = var.skip_iam_authorization_policy
4949
private_key_secrets_manager_instance_guid = local.existing_secrets_manager_guid
5050
private_key_secrets_manager_secret_id = local.secret_id

solutions/fully-configurable/variables.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -53,9 +53,9 @@ variable "prefix" {
5353
}
5454
}
5555

56-
variable "service_endpoints" {
56+
variable "endpoint_type" {
5757
type = string
58-
description = "The service endpoint type to communicate with the provided secrets manager instance."
58+
description = "The endpoint type to communicate with the provided secrets manager instance."
5959
default = "private"
6060
}
6161

variables.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -73,13 +73,13 @@ variable "acme_letsencrypt_private_key" {
7373
}
7474
}
7575

76-
variable "service_endpoints" {
76+
variable "endpoint_type" {
7777
type = string
78-
description = "The service endpoint type to communicate with the provided secrets manager instance. Possible values are `public` or `private`"
78+
description = "The endpoint type to communicate with the provided secrets manager instance. Possible values are `public` or `private`"
7979
default = "public"
8080
validation {
81-
condition = contains(["public", "private"], var.service_endpoints)
82-
error_message = "The specified service_endpoints is not a valid selection!"
81+
condition = contains(["public", "private"], var.endpoint_type)
82+
error_message = "The specified endpoint_type is not a valid selection!"
8383
}
8484
}
8585

0 commit comments

Comments
 (0)