-
Notifications
You must be signed in to change notification settings - Fork 3
feat: add guardrails to DA #282
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 8 commits
fb0e7f4
93d033a
3243d6b
06d09d7
a7b69a3
b58f3e5
c7936d9
a7f0d19
bbf7815
c228d9e
b8b088e
f04762e
0798c16
a14e027
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -11,7 +11,7 @@ variable "ibmcloud_api_key" { | |
| variable "provider_visibility" { | ||
| description = "Set the visibility value for the IBM terraform provider. Supported values are `public`, `private`, `public-and-private`. [Learn more](https://registry.terraform.io/providers/IBM-Cloud/ibm/latest/docs/guides/custom-service-endpoints)." | ||
| type = string | ||
| default = "private" | ||
| default = "public" | ||
|
||
|
|
||
| validation { | ||
| condition = contains(["public", "private", "public-and-private"], var.provider_visibility) | ||
|
|
@@ -80,6 +80,24 @@ variable "public_engine_enabled" { | |
| default = false | ||
| } | ||
|
|
||
| variable "default_secret_group_name" { | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This is confusing - Isn't there a default group out of the box with every newly provisioned instance? Why are we creating another one (and also calling it default) |
||
| type = string | ||
| description = "Name to give the secrets group automatically created when provisioning a new Secrets Manager instance." | ||
| default = "default-group" | ||
| } | ||
|
|
||
| variable "default_access_group_name" { | ||
| type = string | ||
| description = "Name to give the access group automatically created when provisioning a new Secrets Manager instance." | ||
| default = "secrets_manager_group" | ||
|
||
| } | ||
|
|
||
| variable "access_group_ids" { | ||
|
||
| type = list(string) | ||
| description = "List of IBM IDs to add to the default access group for the new Secrets Manager instance." | ||
| default = [] | ||
| } | ||
|
|
||
| ######################################################################################################################## | ||
| # Public cert engine config | ||
| ######################################################################################################################## | ||
|
|
||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -123,6 +123,7 @@ func TestRunDASolutionSchematics(t *testing.T) { | |
| {Name: "ca_name", Value: permanentResources["certificateAuthorityName"], DataType: "string"}, | ||
| {Name: "dns_provider_name", Value: permanentResources["dnsProviderName"], DataType: "string"}, | ||
| {Name: "acme_letsencrypt_private_key", Value: *acme_letsencrypt_private_key, DataType: "string"}, | ||
| {Name: "access_group_ids", Value: []string{"[email protected]"}, DataType: "list(string)"}, | ||
| } | ||
|
|
||
| err := options.RunSchematicTest() | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we need a boolean to allow users to opt out of the access group creation if they want