Skip to content

Commit 50c4649

Browse files
authored
fix: Update DA variable descriptions (#141)
1 parent c4b6099 commit 50c4649

File tree

1 file changed

+33
-33
lines changed

1 file changed

+33
-33
lines changed

solutions/standard/variables.tf

Lines changed: 33 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -16,19 +16,19 @@ variable "use_existing_resource_group" {
1616

1717
variable "resource_group_name" {
1818
type = string
19-
description = "The name of a new or an existing resource group in which to provision Secrets Manager resources to. If prefix input variable is passed then it will get prefixed infront of the value in the format of '<prefix>-value'. Optional if existing_secrets_manager_crn is not set."
19+
description = "The name of a new or existing resource group to provision resources to. If a prefix input variable is specified, it's added to the value in the `<prefix>-value` format. Optional if `existing_secrets_manager_crn` is not specified."
2020
default = null
2121
}
2222

2323
variable "region" {
2424
type = string
25-
description = "The region in which to provision Secrets Manager resources."
25+
description = "The region to provision resources to."
2626
default = "us-south"
2727
}
2828

2929
variable "prefix" {
3030
type = string
31-
description = "(Optional) Prefix to append to all resources created by this solution."
31+
description = "The prefix to apply to all resources created by this solution."
3232
default = null
3333
}
3434

@@ -38,80 +38,80 @@ variable "prefix" {
3838

3939
variable "secrets_manager_instance_name" {
4040
type = string
41-
description = "The name to give the Secrets Manager instance that will be provisioned by this solution. If prefix input variable is passed then it will get prefixed infront of the value in the format of '<prefix>-value'"
41+
description = "The name to give the Secrets Manager instance provisioned by this solution. If a prefix input variable is specified, it is added to the value in the `<prefix>-value` format."
4242
default = "base-security-services-sm"
4343
}
4444

4545
variable "existing_secrets_manager_crn" {
4646
type = string
47-
description = "The CRN of an existing Secrets Manager instance. If not supplied, a new Secrets Manager instance will be created."
47+
description = "The CRN of an existing Secrets Manager instance. If not supplied, a new instance is created."
4848
default = null
4949
}
5050

5151
variable "existing_secrets_endpoint_type" {
5252
type = string
53-
description = "The endpoint type to use if passing a value for `existing_secrets_manager_crn`."
53+
description = "The endpoint type to use if existing_secrets_manager_crn is specified. Possible values: public, private."
5454
default = "private"
5555
validation {
5656
condition = contains(["public", "private"], var.existing_secrets_endpoint_type)
57-
error_message = "Allowed values for 'existing_secrets_endpoint_type' are \"public\" and \"private\"."
57+
error_message = "Only \"public\" and \"private\" are allowed values for 'existing_secrets_endpoint_type'."
5858
}
5959
}
6060

6161
variable "service_plan" {
6262
type = string
63-
description = "The service/pricing plan to use when provisioning a new Secrets Manager instance. Allowed values: 'standard' and 'trial'. Only used if `provision_sm_instance` is set to true."
63+
description = "The pricing plan to use when provisioning a Secrets Manager instance. Possible values: `standard`, `trial`. Applies only if `provision_sm_instance` is set to `true`."
6464
default = "standard"
6565
validation {
6666
condition = contains(["standard", "trial"], var.service_plan)
67-
error_message = "Allowed values for sm_service_plan are \"standard\" and \"trial\"."
67+
error_message = "Only \"standard\" and \"trial\" are allowed values for sm_service_plan."
6868
}
6969
}
7070

7171
variable "allowed_network" {
7272
type = string
73-
description = "The types of service endpoints to set on the Secrets Manager instance. Possible values are `private-only` or `public-and-private`."
73+
description = "The types of service endpoints to set on the Secrets Manager instance. Possible values: `private-only`, `public-and-private`."
7474
default = "private-only"
7575
validation {
7676
condition = contains(["private-only", "public-and-private"], var.allowed_network)
77-
error_message = "The specified allowed_network is not a valid selection!"
77+
error_message = "The specified allowed_network is not a valid selection."
7878
}
7979
}
8080

8181
variable "secret_manager_tags" {
8282
type = list(any)
83-
description = "The list of resource tags that you want to associate with your Secrets Manager instance."
83+
description = "The list of resource tags you want to associate with your Secrets Manager instance."
8484
default = []
8585
}
8686

8787
variable "public_engine_enabled" {
8888
type = bool
89-
description = "Set this to true to to configure an IBM Secrets Manager public certificate engine for an existing IBM Secrets Manager instance. If set to false, no public certificate engine will be configured for your secrets manager instance. For more details, see https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-prepare-order-certificates."
89+
description = "Set this to true to configure a Secrets Manager public certificate engine for an existing Secrets Manager instance. If set to false, no public certificate engine will be configured for your instance."
9090
default = false
9191
}
9292

9393
# Public cert engine config
9494
variable "public_engine_name" {
9595
type = string
96-
description = "The name of the IAM Engine used to configure an IBM Secrets Manager public certificate engine for an existing IBM Secrets Manager instance."
96+
description = "The name of the IAM engine used to configure a Secrets Manager public certificate engine for an existing instance."
9797
default = "public-engine-sm"
9898
}
9999

100100
variable "cis_id" {
101101
type = string
102-
description = "Cloud Internet Service ID"
102+
description = "Cloud Internet Service ID."
103103
default = null
104104
}
105105

106106
variable "dns_provider_name" {
107107
type = string
108-
description = "Name of the DNS provider for the public_cert secrets engine"
108+
description = "The name of the DNS provider for the public certificate secrets engine configuration."
109109
default = "certificate-dns"
110110
}
111111

112112
variable "ca_name" {
113113
type = string
114-
description = "Secret Managers certificate authority name"
114+
description = "The name of the certificate authority for Secrets Manager."
115115
default = "cert-auth"
116116
}
117117

@@ -125,37 +125,37 @@ variable "acme_letsencrypt_private_key" {
125125
# Private cert engine config
126126
variable "private_engine_enabled" {
127127
type = bool
128-
description = "Set this to true to to configure an IBM Secrets Manager private certificate engine for an existing IBM Secrets Manager instance. If set to false, no private certificate engine will be configured for your secrets manager instance. For more details, see https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-prepare-create-certificates#:~:text=In%20Secrets%20Manager%2C%20the%20private,and%20manage%20in%20the%20service."
128+
description = "Set this to true to configure a Secrets Manager private certificate engine for an existing instance. If set to false, no private certificate engine will be configured for your instance."
129129
default = false
130130
}
131131

132132
variable "private_engine_name" {
133133
type = string
134-
description = "The name of the IAM Engine used to configure an IBM Secrets Manager private certificate engine for an existing IBM Secrets Manager instance."
134+
description = "The name of the IAM Engine used to configure a Secrets Manager private certificate engine for an existing instance."
135135
default = "private-engine-sm"
136136
}
137137

138138
variable "root_ca_name" {
139139
type = string
140-
description = "Name of the Root CA to create for a private_cert secret engine"
140+
description = "The name of the root certificate authority associated with the private_cert secret engine."
141141
default = "root-ca"
142142
}
143143

144144
variable "root_ca_common_name" {
145145
type = string
146-
description = "Fully qualified domain name or host domain name for the certificate to be created"
146+
description = "The fully qualified domain name or host domain name for the certificate that will be created."
147147
default = "terraform-modules.ibm.com"
148148
}
149149

150150
variable "root_ca_max_ttl" {
151151
type = string
152-
description = "Maximum TTL value for the root CA"
152+
description = "The maximum time-to-live value for the root certificate authority."
153153
default = "87600h"
154154
}
155155

156156
variable "intermediate_ca_name" {
157157
type = string
158-
description = "A human-readable unique name to assign to the intermediate CA configuration."
158+
description = "A human-readable unique name to assign to the intermediate certificate authority configuration."
159159
default = "intermediate-ca"
160160
}
161161

@@ -167,13 +167,13 @@ variable "certificate_template_name" {
167167

168168
variable "iam_engine_enabled" {
169169
type = bool
170-
description = "Set this to true to to configure an IBM Secrets Manager IAM credentials engine. If set to false, no iam engine will be configured for your secrets manager instance. For more details, see https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-configure-iam-engine."
170+
description = "Set this to true to to configure a Secrets Manager IAM credentials engine. If set to false, no IAM engine will be configured for your instance."
171171
default = false
172172
}
173173

174174
variable "iam_engine_name" {
175175
type = string
176-
description = "The name of the IAM Engine used to configure an IBM Secrets Manager IAM credentials engine. If prefix input variable is passed then it will get prefixed infront of the value in the format of '<prefix>-value'"
176+
description = "The name of the IAM engine used to configure a Secrets Manager IAM credentials engine. If the prefix input variable is passed it is attached before the value in the format of '<prefix>-value'."
177177
default = "base-sm-iam-engine"
178178
}
179179

@@ -183,13 +183,13 @@ variable "iam_engine_name" {
183183

184184
variable "skip_kms_iam_authorization_policy" {
185185
type = bool
186-
description = "Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances in the resource group to read the encryption key from the KMS instance. If set to false, pass in a value for the KMS instance in the existing_kms_instance_crn variable."
186+
description = "Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances in the resource group to read the encryption key. If set to false, pass in a value for the Key Protect or Hyper Protect Crypto Service instance in the existing_kms_instance_crn variable."
187187
default = false
188188
}
189189

190190
variable "existing_secrets_manager_kms_key_crn" {
191191
type = string
192-
description = "The CRN of an existing KMS key to use for Secrets Manager. If not supplied, a new key ring and key will be created."
192+
description = "The CRN of a Key Protect or Hyper Protect Crypto Services key to use for Secrets Manager. If not specified, a key ring and key are created."
193193
default = null
194194
}
195195

@@ -200,12 +200,12 @@ variable "existing_secrets_manager_kms_key_crn" {
200200
variable "existing_kms_instance_crn" {
201201
type = string
202202
default = null
203-
description = "The CRN of the existed Hyper Protect Crypto Services or Key Protect instance. Only required if not supplying an existing KMS key to use for Secrets Manager."
203+
description = "The CRN of the Hyper Protect Crypto Services or Key Protect instance. Applies only if `existing_secrets_manager_kms_key_crn` is not specified."
204204
}
205205

206206
variable "kms_endpoint_type" {
207207
type = string
208-
description = "The type of endpoint to be used for communicating with the KMS instance. Allowed values are: 'public' or 'private' (default). Only required if not supplying an existing KMS root key CRN."
208+
description = "The type of endpoint to use for communicating with the Key Protect or Hyper Protect Crypto Services instance. Possible values: `public`, `private`. Applies only if `existing_secrets_manager_kms_key_crn` is not specified."
209209
default = "private"
210210
validation {
211211
condition = can(regex("public|private", var.kms_endpoint_type))
@@ -216,13 +216,13 @@ variable "kms_endpoint_type" {
216216
variable "kms_key_ring_name" {
217217
type = string
218218
default = "sm-cos-key-ring"
219-
description = "The name to give to the new KMS key ring that will be used to store the KMS key to enable advanced, customer-managed encryption for your Secrets Manager secrets. Only required if not supplying an existing KMS root key CRN. If prefix input variable is passed then it will get prefixed infront of the value in the format of '<prefix>-value'"
219+
description = "The name for the new key ring to store the key. Applies only if `existing_secrets_manager_kms_key_crn` is not specified. If a prefix input variable is passed, it is added to the value in the `<prefix>-value` format. ."
220220
}
221221

222222
variable "kms_key_name" {
223223
type = string
224224
default = "sm-cos-key"
225-
description = "The name to give to the new KMS root key that will be used to enable advanced, customer-managed encryption for your Secrets Manager secrets. Only required if not supplying an existing KMS root key CRN. If prefix input variable is passed then it will get prefixed infront of the value in the format of '<prefix>-value'"
225+
description = "The name for the new root key. Applies only if `existing_secrets_manager_kms_key_crn` is not specified. If a prefix input variable is passed, it is added to the value in the `<prefix>-value` format."
226226
}
227227

228228
########################################################################################################################
@@ -231,12 +231,12 @@ variable "kms_key_name" {
231231

232232
variable "existing_event_notification_instance_crn" {
233233
type = string
234-
description = "The CRN of the Event Notifications service to enable lifecycle notifications for your Secrets Manager instance."
234+
description = "The CRN of the Event Notifications service used to enable lifecycle notifications for your Secrets Manager instance."
235235
default = null
236236
}
237237

238238
variable "skip_event_notification_iam_authorization_policy" {
239239
type = bool
240-
description = "Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances (scoped to the resource group) an 'Event Source Manager' role to the given Event Notifications instance passed in the `existing_event_notification_instance_crn` input variable."
240+
description = "If set to true, this skips the creation of a service to service authorization from Secrets Manager to Event Notifications. If false, the service to service authorization is created."
241241
default = false
242242
}

0 commit comments

Comments
 (0)