You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"description": "Name of the Event Notification instance to create if not using an existing instance."
420
+
"key": "event_notifications_name"
430
421
},
431
422
{
432
423
"key": "service_plan",
@@ -455,45 +446,31 @@
455
446
]
456
447
},
457
448
{
458
-
"key": "event_notifications_tags"
449
+
"key": "event_notifications_resource_tags"
459
450
},
460
451
{
461
-
"key": "access_tags",
462
-
"description": "A list of access tags to apply to the resources created by this solution. For more information, see https://cloud.ibm.com/docs/account?topic=account-access-tags-tutorial."
"displayname": "Key Management Service encryption enabled",
470
-
"key": "kms_encryption_enabled",
471
-
"description": "Set to true to enable encryption on Event Notifications instance and Cloud Object Storage bucket."
458
+
"key": "kms_encryption_enabled"
472
459
},
473
460
{
474
-
"displayname": "Existing Key Management Service instance CRN",
475
-
"key": "existing_kms_instance_crn",
476
-
"description": "CRN of existing Key Management Service instance. Required if setting 'key_management_service_encryption_enabled' to 'true'."
461
+
"key": "existing_kms_instance_crn"
477
462
},
478
463
{
479
-
"displayname": "Key Management Service endpoint url",
480
-
"key": "kms_endpoint_url",
481
-
"description": "Endpoint URL of existing Key Management Service instance. Required if setting 'key_management_service_encryption_enabled' to 'true'."
464
+
"key": "kms_endpoint_url"
482
465
},
483
466
{
484
-
"displayname": "Existing Key Management Service root key CRN",
485
-
"key": "existing_kms_root_key_crn",
486
-
"description": "CRN of existing root key to be used in existing Key Management Service instance. To use 'key_management_service_encryption_enabled' must be enabled."
467
+
"key": "existing_kms_root_key_crn"
487
468
},
488
469
{
489
-
"displayname": "Exsiting Key Management Service key name",
490
-
"key": "existing_kms_key_name",
491
-
"description": "Name of existing root key to be used in existing Key Management Service instance. To use 'existing_key_management_service_root_key_crn' must be set."
470
+
"key": "existing_kms_key_name"
492
471
},
493
472
{
494
-
"displayname": "Key Management Service endpoint type",
495
473
"key": "kms_endpoint_type",
496
-
"description": "The type of the endpoint that is used for communicating with the KMS instance. Possible values: `public` or `private` (default). Only used if not supplying an existing root key.",
497
474
"options": [
498
475
{
499
476
"displayname": "public",
@@ -529,70 +506,49 @@
529
506
"key": "event_notifications_key_ring_name"
530
507
},
531
508
{
532
-
"displayname": "Cloud Object Storage key ring name",
533
509
"key": "cos_key_ring_name"
534
510
},
535
511
{
536
-
"displayname": "Cloud Object Storage key name",
537
512
"key": "cos_key_name"
538
513
},
539
514
{
540
-
"displayname": "Skip Event Notifications Key Management Service auth policy",
541
515
"key": "skip_event_notifications_kms_auth_policy"
542
516
},
543
517
{
544
-
"displayname": "IBM Cloud Key Management Service apikey",
"description" : "The endpoint URL for your bucket region. [Learn more](https://cloud.ibm.com/docs/cloud-object-storage?topic=cloud-object-storage-endpoints). Only required if using an existing bucket with the `existing_cloud_object_storage_bucket_name` variable."
"description" : "The storage class of the newly provisioned Cloud Object Storage bucket. Specify one of the following values for the storage class: `standard` (default), `vault`, `cold`, `smart`, or `onerate_active`."
validate_kms_values=var.kms_encryption_enabled==true&& var.existing_kms_instance_crn==null?tobool("When setting var.key_protect_encryption_enabled to true, you must set var.existing_key_protect_instance_crn.") :true
41
-
# Validate existing KMS key details
42
-
# tflint-ignore: terraform_unused_declarations
43
-
validate_kms_key_values=var.existing_kms_root_key_crn!=null&& (var.existing_kms_key_name==null|| var.kms_endpoint_url==null) ?tobool("When setting var.existing_key_protect_root_key_crn, you must set var.existing_event_notification_key_protect_key_name and var.key_protect_endpoint_url.") :true
44
37
# If an existing KMS root key, or an existing EN instance is passed, or KMS is not enabled do not create a new KMS root key
# Create cross account EN / KMS auth policy if not using existing EN instance, if 'skip_en_kms_auth_policy' is false, and a value is passed for 'ibmcloud_key_management_service_api_key'
# Create cross account COS / KMS auth policy if not using existing EN instance, if not using existing bucket, if 'skip_cos_kms_auth_policy' is false, and if a value is passed for 'ibmcloud_key_management_service_api_key'
# Create cross account COS / KMS auth policy if not using existing EN instance, if 'skip_cos_kms_auth_policy' is false, and if a value is passed for 'ibmcloud_key_management_service_api_key'
validate_existing_cos=var.cos_integration_enabled==true&& (var.existing_cos_instance_crn==null|| var.existing_cos_endpoint==null) ?tobool("If var.cloud_object_storage_integration_enabled is true, variables 'existing_cloud_object_storage_instance_crn' and 'existing_cloud_object_storage_endpoint' must be set.") :true
225
-
# tflint-ignore: terraform_unused_declarations
226
-
validate_cos_regions=var.cos_bucket_region!=null&& var.cross_region_location!=null?tobool("Cannot provide values for 'cloud_object_storage_bucket_region' and 'cross_region_location'. Pick one or the other, or alternatively pass no values for either and allow it to default to the 'region' input.") :true
227
-
228
-
# Validate cos inputs when using existing bucket
229
-
# tflint-ignore: terraform_unused_declarations
230
-
validate_cos_bucket=var.existing_cos_bucket_name!=null&& (var.existing_cos_instance_crn==null|| var.existing_cos_endpoint==null) ?tobool("When passing a value for 'existing_cloud_object_storage_bucket_name', you must also pass values for 'existing_cloud_object_storage_instance_crn' and 'existing_cloud_object_storage_endpoint'.") :true
231
-
232
215
# If a bucket name is passed, or an existing EN CRN is passed; do not create COS resources
validate_existing_cos_values=!var.cos_integration_enabled|| (var.existing_cos_instance_crn!=null!= var.existing_event_notifications_instance_crn!=null) ?true:tobool("When var.cloud_object_storage_integration_enabled is set to true you must set one of var.existing_cloud_object_storage_instance_crn or var.existing_event_notification_instance_crn.")
241
222
# If not using existing EN instance, parse the COS account ID from the CRN
0 commit comments