Skip to content

Commit 47c88b2

Browse files
terraform-ibm-modules-opsSteve Peggs
andauthored
chore(deps): update terraform terraform-ibm-modules/key-protect-all-inclusive/ibm to v4.6.0 (#41)
* chore(deps): update terraform terraform-ibm-modules/key-protect-all-inclusive/ibm to v4.6.0 * fix: inputs and outputs on kms * SKIP UPGRADE TEST --------- Co-authored-by: Steve Peggs <[email protected]>
1 parent 2a2944c commit 47c88b2

File tree

2 files changed

+13
-6
lines changed

2 files changed

+13
-6
lines changed

examples/complete/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This examples handles the provisioning of a new Secrets Manager instance.
1515
| Name | Source | Version |
1616
|------|--------|---------|
1717
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.0.4 |
18-
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/key-protect-all-inclusive/ibm | 4.4.2 |
18+
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/key-protect-all-inclusive/ibm | 4.6.0 |
1919
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.4 |
2020
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
2121

examples/complete/main.tf

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,13 +8,20 @@ module "resource_group" {
88

99
module "key_protect" {
1010
source = "terraform-ibm-modules/key-protect-all-inclusive/ibm"
11-
version = "4.4.2"
11+
version = "4.6.0"
1212
key_protect_instance_name = "${var.prefix}-key-protect"
1313
resource_group_id = module.resource_group.resource_group_id
1414
region = var.region
15-
key_map = {
16-
"${var.prefix}-sm" = ["${var.prefix}-sm-key"]
17-
}
15+
keys = [
16+
{
17+
key_ring_name = "${var.prefix}-sm"
18+
keys = [
19+
{
20+
key_name = "${var.prefix}-sm-key"
21+
}
22+
]
23+
}
24+
]
1825
}
1926

2027
module "event_notification" {
@@ -37,7 +44,7 @@ module "secrets_manager" {
3744
sm_tags = var.resource_tags
3845
service_endpoints = "public-and-private"
3946
kms_encryption_enabled = true
40-
existing_kms_instance_guid = module.key_protect.key_protect_guid
47+
existing_kms_instance_guid = module.key_protect.kms_guid
4148
kms_key_crn = module.key_protect.keys["${var.prefix}-sm.${var.prefix}-sm-key"].crn
4249
enable_event_notification = true
4350
existing_en_instance_crn = module.event_notification.crn

0 commit comments

Comments
 (0)