File tree Expand file tree Collapse file tree 2 files changed +13
-6
lines changed
Expand file tree Collapse file tree 2 files changed +13
-6
lines changed Original file line number Diff line number Diff line change @@ -15,7 +15,7 @@ This examples handles the provisioning of a new Secrets Manager instance.
1515| Name | Source | Version |
1616| ------| --------| ---------|
1717| <a name =" module_event_notification " ></a > [ event\_ notification] ( #module\_ event\_ notification ) | terraform-ibm-modules/event-notifications/ibm | 1.0.4 |
18- | <a name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect ) | terraform-ibm-modules/key-protect-all-inclusive/ibm | 4.4.2 |
18+ | <a name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect ) | terraform-ibm-modules/key-protect-all-inclusive/ibm | 4.6.0 |
1919| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.1.4 |
2020| <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | ../.. | n/a |
2121
Original file line number Diff line number Diff line change @@ -8,13 +8,20 @@ module "resource_group" {
88
99module "key_protect" {
1010 source = " terraform-ibm-modules/key-protect-all-inclusive/ibm"
11- version = " 4.4.2 "
11+ version = " 4.6.0 "
1212 key_protect_instance_name = " ${ var . prefix } -key-protect"
1313 resource_group_id = module. resource_group . resource_group_id
1414 region = var. region
15- key_map = {
16- " ${var.prefix}-sm" = [" ${ var . prefix } -sm-key" ]
17- }
15+ keys = [
16+ {
17+ key_ring_name = " ${ var . prefix } -sm"
18+ keys = [
19+ {
20+ key_name = " ${ var . prefix } -sm-key"
21+ }
22+ ]
23+ }
24+ ]
1825}
1926
2027module "event_notification" {
@@ -37,7 +44,7 @@ module "secrets_manager" {
3744 sm_tags = var. resource_tags
3845 service_endpoints = " public-and-private"
3946 kms_encryption_enabled = true
40- existing_kms_instance_guid = module. key_protect . key_protect_guid
47+ existing_kms_instance_guid = module. key_protect . kms_guid
4148 kms_key_crn = module. key_protect . keys [" ${ var . prefix } -sm.${ var . prefix } -sm-key" ]. crn
4249 enable_event_notification = true
4350 existing_en_instance_crn = module. event_notification . crn
You can’t perform that action at this time.
0 commit comments