You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: updated the schema of the secrets input variable:<br>- The secrets.service_credentials_source_service_role attribute has been updated to secrets.service_credentials_source_service_role_crn meaning it now requires the full CRN of the role. This change means the module is now able to create service specific roles.<br>- updated the IBM terraform provider version to 1.74.0 in the DA. (#273)
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -104,7 +104,7 @@ You need the following permissions to run this module.
104
104
| <aname="input_kms_key_crn"></a> [kms\_key\_crn](#input\_kms\_key\_crn)| The root key CRN of a Key Management Service like Key Protect or Hyper Protect Crypto Services (HPCS) that you want to use for encryption. Only used if `kms_encryption_enabled` is set to true. |`string`|`null`| no |
105
105
| <aname="input_region"></a> [region](#input\_region)| The region where the resource will be provisioned.Its not required if passing a value for `existing_sm_instance_crn`. |`string`|`null`| no |
106
106
| <aname="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id)| The ID of the resource group |`string`| n/a | yes |
| <aname="input_secrets_manager_name"></a> [secrets\_manager\_name](#input\_secrets\_manager\_name)| The name of the Secrets Manager instance to create |`string`| n/a | yes |
109
109
| <aname="input_skip_en_iam_authorization_policy"></a> [skip\_en\_iam\_authorization\_policy](#input\_skip\_en\_iam\_authorization\_policy)| Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances (scoped to the resource group) an 'Event Source Manager' role to the given Event Notifications instance passed in the `existing_en_instance_crn` input variable. In addition, no policy is created if `enable_event_notification` is set to false. |`bool`|`false`| no |
110
110
| <aname="input_skip_kms_iam_authorization_policy"></a> [skip\_kms\_iam\_authorization\_policy](#input\_skip\_kms\_iam\_authorization\_policy)| Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances in the resource group to read the encryption key from the KMS instance. If set to false, pass in a value for the KMS instance in the `existing_kms_instance_guid` variable. In addition, no policy is created if `kms_encryption_enabled` is set to false. |`bool`|`false`| no |
Copy file name to clipboardExpand all lines: modules/fscloud/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ No resources.
54
54
| <aname="input_kms_key_crn"></a> [kms\_key\_crn](#input\_kms\_key\_crn)| The root key CRN of Hyper Protect Crypto Services (HPCS) that you want to use for encryption. |`string`| n/a | yes |
55
55
| <aname="input_region"></a> [region](#input\_region)| The region to provision the Secrets Manager instance to. |`string`| n/a | yes |
56
56
| <aname="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id)| The ID of the resource group to provision the Secrets Manager instance to. |`string`| n/a | yes |
| <aname="input_secrets_manager_name"></a> [secrets\_manager\_name](#input\_secrets\_manager\_name)| The name to give the Secrets Manager instance. |`string`| n/a | yes |
59
59
| <aname="input_service_plan"></a> [service\_plan](#input\_service\_plan)| The Secrets Manager plan to provision. |`string`|`"standard"`| no |
60
60
| <aname="input_skip_en_iam_authorization_policy"></a> [skip\_en\_iam\_authorization\_policy](#input\_skip\_en\_iam\_authorization\_policy)| Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances (scoped to the resource group) an 'Event Source Manager' role to the given Event Notifications instance passed in the `existing_en_instance_crn` input variable. In addition, no policy is created if `enable_event_notification` is set to false. |`bool`|`false`| no |
| <aname="input_endpoint_type"></a> [endpoint\_type](#input\_endpoint\_type)| The service endpoint type to communicate with the provided secrets manager instance. Possible values are `public` or `private`|`string`|`"public"`| no |
67
67
| <aname="input_existing_sm_instance_guid"></a> [existing\_sm\_instance\_guid](#input\_existing\_sm\_instance\_guid)| Instance ID of Secrets Manager instance in which the Secret will be added. |`string`| n/a | yes |
68
68
| <aname="input_existing_sm_instance_region"></a> [existing\_sm\_instance\_region](#input\_existing\_sm\_instance\_region)| Region which the Secret Manager is deployed. |`string`| n/a | yes |
0 commit comments