55 # tflint-ignore: terraform_unused_declarations
66 validate_resource_group = (var. existing_secrets_manager_crn == null && var. resource_group_name == null ) ? tobool (" Resource group name can not be null if existing secrets manager CRN is not set." ) : true
77 # tflint-ignore: terraform_unused_declarations
8- validate_event_notifications = (var. existing_event_notification_instance_crn == null && var. enable_event_notification ) ? tobool (" To enable event notifications, an existing event notifications CRN must be set." ) : true
8+ validate_event_notifications = (var. existing_event_notifications_instance_crn == null && var. enable_event_notifications ) ? tobool (" To enable event notifications, an existing event notifications CRN must be set." ) : true
99 prefix = var. prefix != null ? (var. prefix != " " ? var. prefix : null ) : null
1010}
1111
@@ -107,15 +107,15 @@ module "secrets_manager" {
107107 region = var. region
108108 secrets_manager_name = try (" ${ local . prefix } -${ var . secrets_manager_instance_name } " , var. secrets_manager_instance_name )
109109 service_plan = var. service_plan
110- sm_tags = var. secret_manager_tags
110+ sm_tags = var. secrets_manager_tags
111111 # kms dependency
112112 existing_kms_instance_guid = local. existing_kms_guid
113113 kms_key_crn = local. kms_key_crn
114114 skip_kms_iam_authorization_policy = var. skip_kms_iam_authorization_policy || local. create_cross_account_auth_policy
115115 # event notifications dependency
116- enable_event_notification = var. enable_event_notification
117- existing_en_instance_crn = var. existing_event_notification_instance_crn
118- skip_en_iam_authorization_policy = var. skip_event_notification_iam_authorization_policy
116+ enable_event_notification = var. enable_event_notifications
117+ existing_en_instance_crn = var. existing_event_notifications_instance_crn
118+ skip_en_iam_authorization_policy = var. skip_event_notifications_iam_authorization_policy
119119 cbr_rules = var. cbr_rules
120120}
121121
@@ -130,16 +130,10 @@ module "iam_secrets_engine" {
130130 endpoint_type = " private"
131131}
132132
133- locals {
134- # tflint-ignore: terraform_unused_declarations
135- validate_public_secret_engine = var. public_engine_enabled && var. public_engine_name == null ? tobool (" When setting var.public_engine_enabled to true, a value must be passed for var.public_engine_name" ) : true
136- # tflint-ignore: terraform_unused_declarations
137- validate_private_secret_engine = var. private_engine_enabled && var. private_engine_name == null ? tobool (" When setting var.private_engine_enabled to true, a value must be passed for var.private_engine_name" ) : true
138- }
139133
140134# Configure an IBM Secrets Manager public certificate engine for an existing IBM Secrets Manager instance.
141135module "secrets_manager_public_cert_engine" {
142- count = var. public_engine_enabled ? 1 : 0
136+ count = var. public_cert_engine_enabled ? 1 : 0
143137 source = " terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
144138 version = " 1.0.2"
145139 providers = {
@@ -148,27 +142,27 @@ module "secrets_manager_public_cert_engine" {
148142 }
149143 secrets_manager_guid = local. secrets_manager_guid
150144 region = local. secrets_manager_region
151- internet_services_crn = var. cis_id
145+ internet_services_crn = var. public_cert_engine_internet_services_crn
152146 ibmcloud_cis_api_key = var. ibmcloud_api_key
153- dns_config_name = var. dns_provider_name
154- ca_config_name = var. ca_name
147+ dns_config_name = var. public_cert_engine_dns_provider_config_name
148+ ca_config_name = var. public_cert_engine_lets_encrypt_config_ca_name
155149 acme_letsencrypt_private_key = var. acme_letsencrypt_private_key
156150 service_endpoints = " private"
157151}
158152
159153
160154# Configure an IBM Secrets Manager private certificate engine for an existing IBM Secrets Manager instance.
161155module "private_secret_engine" {
162- count = var. private_engine_enabled ? 1 : 0
156+ count = var. private_cert_engine_enabled ? 1 : 0
163157 source = " terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
164158 version = " 1.3.5"
165159 secrets_manager_guid = local. secrets_manager_guid
166160 region = var. region
167- root_ca_name = var. root_ca_name
168- root_ca_common_name = var. root_ca_common_name
169- root_ca_max_ttl = var. root_ca_max_ttl
170- intermediate_ca_name = var. intermediate_ca_name
171- certificate_template_name = var. certificate_template_name
161+ root_ca_name = var. private_cert_engine_config_root_ca_name
162+ root_ca_common_name = var. private_cert_engine_config_root_ca_common_name
163+ root_ca_max_ttl = var. private_cert_engine_config_root_ca_max_ttl
164+ intermediate_ca_name = var. private_cert_engine_config_intermediate_ca_name
165+ certificate_template_name = var. private_cert_engine_config_template_name
172166 endpoint_type = " private"
173167}
174168
@@ -182,28 +176,28 @@ data "ibm_resource_instance" "existing_sm" {
182176# ######################################################################################################################
183177
184178locals {
185- parsed_existing_en_instance_crn = var. existing_event_notification_instance_crn != null ? split (" :" , var. existing_event_notification_instance_crn ) : []
179+ parsed_existing_en_instance_crn = var. existing_event_notifications_instance_crn != null ? split (" :" , var. existing_event_notifications_instance_crn ) : []
186180 existing_en_guid = length (local. parsed_existing_en_instance_crn ) > 0 ? local. parsed_existing_en_instance_crn [7 ] : null
187181}
188182
189183data "ibm_en_destinations" "en_destinations" {
190184 # if existing SM instance CRN is passed (!= null), then never do data lookup for EN destinations
191- count = var. existing_secrets_manager_crn == null && var. enable_event_notification ? 1 : 0
185+ count = var. existing_secrets_manager_crn == null && var. enable_event_notifications ? 1 : 0
192186 instance_guid = local. existing_en_guid
193187}
194188
195189# workaround for https://github.com/IBM-Cloud/terraform-provider-ibm/issues/5533
196190resource "time_sleep" "wait_for_secrets_manager" {
197191 # if existing SM instance CRN is passed (!= null), then never work with EN
198- count = var. existing_secrets_manager_crn == null && var. enable_event_notification ? 1 : 0
192+ count = var. existing_secrets_manager_crn == null && var. enable_event_notifications ? 1 : 0
199193 depends_on = [module . secrets_manager ]
200194
201195 create_duration = " 30s"
202196}
203197
204198resource "ibm_en_topic" "en_topic" {
205199 # if existing SM instance CRN is passed (!= null), then never create EN topic
206- count = var. existing_secrets_manager_crn == null && var. enable_event_notification ? 1 : 0
200+ count = var. existing_secrets_manager_crn == null && var. enable_event_notifications ? 1 : 0
207201 depends_on = [time_sleep . wait_for_secrets_manager ]
208202 instance_guid = local. existing_en_guid
209203 name = " Secrets Manager Topic"
@@ -219,17 +213,17 @@ resource "ibm_en_topic" "en_topic" {
219213
220214resource "ibm_en_subscription_email" "email_subscription" {
221215 # if existing SM instance CRN is passed (!= null), then never create EN email subscription
222- count = var. existing_secrets_manager_crn == null && var. enable_event_notification && length (var. sm_en_email_list ) > 0 ? 1 : 0
216+ count = var. existing_secrets_manager_crn == null && var. enable_event_notifications && length (var. event_notifications_email_list ) > 0 ? 1 : 0
223217 instance_guid = local. existing_en_guid
224218 name = " Email for Secrets Manager Subscription"
225219 description = " Subscription for Secret Manager Events"
226220 destination_id = [for s in toset (data. ibm_en_destinations . en_destinations [count . index ]. destinations ) : s . id if s . type == " smtp_ibm" ][0 ]
227221 topic_id = ibm_en_topic. en_topic [count . index ]. topic_id
228222 attributes {
229223 add_notification_payload = true
230- reply_to_mail = var. sm_en_reply_to_email
224+ reply_to_mail = var. event_notifications_reply_to_email
231225 reply_to_name = " Secret Manager Event Notifications Bot"
232- from_name = var. sm_en_from_email
233- invited = var. sm_en_email_list
226+ from_name = var. event_notifications_from_email
227+ invited = var. event_notifications_email_list
234228 }
235229}
0 commit comments