You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: do not create Event Notification related resources in the Deployable Architecture solution when an existing Secrets Manager instance is passed (#201)
| <aname="input_allowed_network"></a> [allowed\_network](#input\_allowed\_network)| The types of service endpoints to set on the Secrets Manager instance. Possible values are `private-only` or `public-and-private`. |`string`|`"public-and-private"`| no |
97
97
| <aname="input_cbr_rules"></a> [cbr\_rules](#input\_cbr\_rules)| (Optional, list) List of CBR rules to create | <pre>list(object({<br> description = string<br> account_id = string<br> rule_contexts = list(object({<br> attributes = optional(list(object({<br> name = string<br> value = string<br> }))) }))<br> enforcement_mode = string<br> }))</pre> |`[]`| no |
98
-
| <aname="input_enable_event_notification"></a> [enable\_event\_notification](#input\_enable\_event\_notification)| Set this to true to enable lifecycle notifications for your Secrets Manager instance by connecting an Event Notifications service. When setting this to true, a value must be passed for `existing_en_instance_crn`variable. |`bool`|`false`| no |
98
+
| <aname="input_enable_event_notification"></a> [enable\_event\_notification](#input\_enable\_event\_notification)| Set this to true to enable lifecycle notifications for your Secrets Manager instance by connecting an Event Notifications service. When setting this to true, a value must be passed for `existing_en_instance_crn`and `existing_sm_instance_crn` must be null. |`bool`|`false`| no |
99
99
| <aname="input_endpoint_type"></a> [endpoint\_type](#input\_endpoint\_type)| The type of endpoint (public or private) to connect to the Secrets Manager API. The Terraform provider uses this endpoint type to interact with the Secrets Manager API and configure Event Notifications. |`string`|`"public"`| no |
100
100
| <aname="input_existing_en_instance_crn"></a> [existing\_en\_instance\_crn](#input\_existing\_en\_instance\_crn)| The CRN of the Event Notifications service to enable lifecycle notifications for your Secrets Manager instance. |`string`|`null`| no |
101
101
| <aname="input_existing_kms_instance_guid"></a> [existing\_kms\_instance\_guid](#input\_existing\_kms\_instance\_guid)| The GUID of the Hyper Protect Crypto Services or Key Protect instance in which the key specified in `kms_key_crn` is coming from. Required only if `kms_encryption_enabled` is set to true, and `skip_kms_iam_authorization_policy` is set to false. |`string`|`null`| no |
Copy file name to clipboardExpand all lines: main.tf
+5-3Lines changed: 5 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ locals {
14
14
# tflint-ignore: terraform_unused_declarations
15
15
validate_event_notification=var.enable_event_notification&& var.existing_en_instance_crn==null?tobool("When setting var.enable_event_notification to true, a value must be passed for var.existing_en_instance_crn") :true
16
16
# tflint-ignore: terraform_unused_declarations
17
-
validate_endpoint=var.enable_event_notification&& var.endpoint_type=="public"&& var.allowed_network=="private-only"&& var.existing_sm_instance_crn==null?tobool("It is not allowed to have conflicting var.endpoint_type and var.allowed_network values.") :true
17
+
validate_endpoint=var.endpoint_type=="public"&& var.allowed_network=="private-only"&& var.existing_sm_instance_crn==null?tobool("It is not allowed to have conflicting var.endpoint_type and var.allowed_network values.") :true
18
18
# tflint-ignore: terraform_unused_declarations
19
19
validate_region=var.existing_sm_instance_crn==null&& var.region==null?tobool("When existing_sm_instance_crn is null, a value must be passed for var.region") :true
20
20
}
@@ -126,7 +126,8 @@ module "cbr_rule" {
126
126
127
127
# Create IAM Authorization Policies to allow SM to access event notification
description="Set this to true to enable lifecycle notifications for your Secrets Manager instance by connecting an Event Notifications service. When setting this to true, a value must be passed for `existing_en_instance_crn` variable."
252
+
description="Set this to true to enable lifecycle notifications for your Secrets Manager instance by connecting an Event Notifications service. When setting this to true, a value must be passed for `existing_en_instance_crn` and `existing_sm_instance_crn` must be null."
description="Set this to true to enable lifecycle notifications for your Secrets Manager instance by connecting an Event Notifications service. When setting this to true, a value must be passed for `existing_en_instance_crn` variable."
109
+
description="Set this to true to enable lifecycle notifications for your Secrets Manager instance by connecting an Event Notifications service. When setting this to true, a value must be passed for `existing_en_instance_crn` and `existing_sm_instance_crn` must be null."
0 commit comments