You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -106,7 +106,7 @@ You need the following permissions to run this module.
106
106
| <aname="input_kms_key_crn"></a> [kms\_key\_crn](#input\_kms\_key\_crn)| The root key CRN of a key management service like Key Protect or Hyper Protect Crypto Services that you want to use for encryption. Only used if `kms_encryption_enabled` is set to `true`. |`string`|`null`| no |
107
107
| <aname="input_region"></a> [region](#input\_region)| The region where the instance is created. Not required if passing a value for `existing_sm_instance_crn`. |`string`|`null`| no |
108
108
| <aname="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id)| The ID of the resource group that contains the Secrets Manager instance. |`string`| n/a | yes |
| <aname="input_secrets_manager_name"></a> [secrets\_manager\_name](#input\_secrets\_manager\_name)| The name of the Secrets Manager instance to create |`string`| n/a | yes |
111
111
| <aname="input_skip_en_iam_authorization_policy"></a> [skip\_en\_iam\_authorization\_policy](#input\_skip\_en\_iam\_authorization\_policy)| Set to true to skip creating an IAM authorization policy that permits all Secrets Manager instances (scoped to the resource group) an 'Event Source Manager' role to the given Event Notifications instance passed in the `existing_en_instance_crn` input variable. No policy is created if `enable_event_notification` is set to `false`. |`bool`|`false`| no |
112
112
| <aname="input_skip_iam_authorization_policy"></a> [skip\_iam\_authorization\_policy](#input\_skip\_iam\_authorization\_policy)| Whether to skip creating the IAM authorization policies that are required to enable the IAM credentials engine. If set to `false`, policies are created that grant the Secrets Manager instance 'Operator' access to the IAM identity service, and 'Groups Service Member Manager' access to the IAM groups service. |`bool`|`false`| no |
# Currently the main module cannot be called again as some of the count for resources depends on a computable input existing_en_instance_crn which will give error if the value is not available during planning
217
+
# As a workaround the secret manager secret is directly being created via module call
Copy file name to clipboardExpand all lines: examples/complete/variables.tf
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -18,7 +18,7 @@ variable "sm_service_plan" {
18
18
variable"region" {
19
19
type=string
20
20
description="Region where resources will be created"
21
-
default="eu-de"
21
+
default="eu-de"# Region is defaulted to eu-de in order to restrict the code engine project and build creation with a hardcoded output image `private.de`
0 commit comments