You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<!-- Add a description of module(s) in this repo -->
15
-
TODO: Replace me with description of the module(s) in this repo
11
+
This module is used to provision and configure an IBM Cloud [Secrets Manager](https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-getting-started) instance.
16
12
17
13
18
14
<!-- Below content is automatically populated via pre-commit hook -->
@@ -21,64 +17,43 @@ TODO: Replace me with description of the module(s) in this repo
| <aname="input_cbr_rules"></a> [cbr\_rules](#input\_cbr\_rules)| (Optional, list) List of CBR rules to create | <pre>list(object({<br> description = string<br> account_id = string<br> rule_contexts = list(object({<br> attributes = optional(list(object({<br> name = string<br> value = string<br> }))) }))<br> enforcement_mode = string<br> }))</pre> |`[]`| no |
88
+
| <aname="input_existing_kms_instance_guid"></a> [existing\_kms\_instance\_guid](#input\_existing\_kms\_instance\_guid)| The GUID of the Hyper Protect Crypto Services or Key Protect instance in which the key specified in `kms_key_crn` is coming from. Required only if `kms_encryption_enabled` is set to true, and `skip_iam_authorization_policy` is set to false. |`string`|`null`| no |
89
+
| <aname="input_kms_encryption_enabled"></a> [kms\_encryption\_enabled](#input\_kms\_encryption\_enabled)| Set this to true to control the encryption keys used to encrypt the data that you store in Secrets Manager. If set to false, the data that you store is encrypted at rest by using envelope encryption. For more details, see https://cloud.ibm.com/docs/secrets-manager?topic=secrets-manager-mng-data&interface=ui#about-encryption.|`bool`|`false`| no |
90
+
| <aname="input_kms_key_crn"></a> [kms\_key\_crn](#input\_kms\_key\_crn)| The root key CRN of a Key Management Service like Key Protect or Hyper Protect Crypto Services (HPCS) that you want to use for encryption. Only used if `kms_encryption_enabled` is set to true. |`string`|`null`| no |
91
+
| <aname="input_region"></a> [region](#input\_region)| The region to provision the Secrets Manager instance to. |`string`| n/a | yes |
92
+
| <aname="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id)| The ID of the resource group to provision the Secrets Manager instance to. |`string`| n/a | yes |
93
+
| <aname="input_secrets_manager_name"></a> [secrets\_manager\_name](#input\_secrets\_manager\_name)| The name to give the Secrets Manager instance. |`string`| n/a | yes |
94
+
| <aname="input_service_endpoints"></a> [service\_endpoints](#input\_service\_endpoints)| The types of service endpoints to set on the Secrets Manager instance. Possible values are `public`, `private` or `public-and-private`. |`string`|`"public-and-private"`| no |
95
+
| <aname="input_skip_iam_authorization_policy"></a> [skip\_iam\_authorization\_policy](#input\_skip\_iam\_authorization\_policy)| Set to true to skip the creation of an IAM authorization policy that permits all Secrets Manager instances in the resource group to read the encryption key from the KMS instance. If set to false, pass in a value for the KMS instance in the `existing_kms_instance_guid` variable. In addition, no policy is created if `kms_encryption_enabled` is set to false. |`bool`|`false`| no |
96
+
| <aname="input_sm_service_plan"></a> [sm\_service\_plan](#input\_sm\_service\_plan)| The Secrets Manager plan to provision. |`string`|`"standard"`| no |
97
+
| <aname="input_sm_tags"></a> [sm\_tags](#input\_sm\_tags)| The list of resource tags that you want to associate with your Secrets Manager instance. |`list(string)`|`[]`| no |
103
98
104
99
### Outputs
105
100
106
-
No outputs.
101
+
| Name | Description |
102
+
|------|-------------|
103
+
| <aname="output_secrets_manager_guid"></a> [secrets\_manager\_guid](#output\_secrets\_manager\_guid)| GUID of Secrets-Manager instance |
107
104
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
108
105
109
106
<!-- Leave this section as is so that your module has a link to local development environment set up steps for contributors to follow -->
description="The IBM Cloud API key this account authenticates to"
8
4
sensitive=true
9
5
}
10
6
11
-
variable"region" {
7
+
variable"prefix" {
12
8
type=string
13
-
description="Region to provision all resources created by this example"
14
-
default="us-south"
9
+
description="Prefix for sm instance"
10
+
default="secrets-manager-test"
15
11
}
16
12
17
-
variable"prefix" {
13
+
variable"region" {
18
14
type=string
19
-
description="Prefix to append to all resources created by this example"
20
-
default="basic"
15
+
description="Region where resources will be created"
16
+
default="us-east"
21
17
}
22
18
23
19
variable"resource_group" {
24
20
type=string
25
-
description="The name of an existing resource group to provision resources in to. If not set a new resource group will be created using the prefix variable"
21
+
description="An existing resource group name to use for this example, if unset a new resource group will be created"
0 commit comments