Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ This module generate and store a service ID API key in IBM Cloud Secrets Manager
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= v1.0.0 |
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.51.0, < 2.0.0 |
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.83.0, < 2.0.0 |
| <a name="requirement_time"></a> [time](#requirement\_time) | >= 0.9.1, < 1.0.0 |

### Modules
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -14,8 +14,8 @@ resource "ibm_iam_service_id" "image_secret_pull_service_id" {
resource "ibm_iam_service_policy" "cr_policy" {


iam_service_id = ibm_iam_service_id.image_secret_pull_service_id.id
roles = ["Reader"]
iam_id = ibm_iam_service_id.image_secret_pull_service_id.iam_id
roles = ["Reader"]

resources {
service = "container-registry"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ terraform {
# Use "greater than or equal to" range in modules
ibm = {
source = "IBM-Cloud/ibm"
version = ">= 1.51.0, < 2.0.0"
version = ">= 1.83.0, < 2.0.0"
}
time = {
source = "hashicorp/time"
Expand Down
4 changes: 2 additions & 2 deletions examples/all-combined/secretsmanager.tf
Original file line number Diff line number Diff line change
Expand Up @@ -72,8 +72,8 @@ resource "ibm_iam_service_id" "secret_puller" {

# Create policy to allow new service id to pull secrets from secrets manager
resource "ibm_iam_service_policy" "secret_puller_policy" {
iam_service_id = ibm_iam_service_id.secret_puller.id
roles = ["Viewer", "SecretsReader"]
iam_id = ibm_iam_service_id.secret_puller.iam_id
roles = ["Viewer", "SecretsReader"]

resources {
service = "secrets-manager"
Expand Down
2 changes: 1 addition & 1 deletion examples/all-combined/version.tf
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ terraform {
}
ibm = {
source = "IBM-Cloud/ibm"
version = ">= 1.62.0"
version = ">= 1.83.0"
}
null = {
source = "hashicorp/null"
Expand Down
4 changes: 2 additions & 2 deletions examples/basic/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -290,8 +290,8 @@ resource "ibm_iam_service_id" "secret_puller" {

# Create policy to allow new service id to pull secrets from secrets manager
resource "ibm_iam_service_policy" "secret_puller_policy" {
iam_service_id = ibm_iam_service_id.secret_puller.id
roles = ["Viewer", "SecretsReader"]
iam_id = ibm_iam_service_id.secret_puller.iam_id
roles = ["Viewer", "SecretsReader"]

resources {
service = "secrets-manager"
Expand Down
2 changes: 1 addition & 1 deletion examples/basic/version.tf
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@ terraform {
}
ibm = {
source = "IBM-Cloud/ibm"
version = "= 1.79.2"
version = "= 1.83.0"
}
null = {
source = "hashicorp/null"
Expand Down
14 changes: 7 additions & 7 deletions solutions/fully-configurable/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -278,9 +278,9 @@ locals {

# Create policy to allow new service id to pull secrets from secrets manager
resource "ibm_iam_service_policy" "cluster_secrets_store_secrets_puller_policy" {
for_each = local.cluster_secrets_stores_policies_to_create_map
iam_service_id = each.value.accountServiceID
roles = ["Viewer", "SecretsReader"]
for_each = local.cluster_secrets_stores_policies_to_create_map
iam_id = each.value.accountServiceID
roles = ["Viewer", "SecretsReader"]
resources {
service = "secrets-manager"
resource_instance_id = local.sm_guid
Expand Down Expand Up @@ -511,7 +511,7 @@ locals {
for secrets_store_key, secrets_store in var.eso_secretsstores_configuration.secrets_stores :
secrets_store_key => {
# if the existing_serviceid_id is null it collects the service id created otherwise will use the existing one
"accountServiceID" : (secrets_store.existing_serviceid_id == null || secrets_store.existing_serviceid_id == "") ? ibm_iam_service_id.secrets_stores_secret_puller[secrets_store_key].id : secrets_store.existing_serviceid_id
"accountServiceID" : (secrets_store.existing_serviceid_id == null || secrets_store.existing_serviceid_id == "") ? ibm_iam_service_id.secrets_stores_secret_puller[secrets_store_key].iam_id : secrets_store.existing_serviceid_id
"service_secrets_groups_IDs" : local.secrets_stores_service_secrets_groups_fulllist[secrets_store_key]
}
})
Expand All @@ -537,9 +537,9 @@ locals {

# Create policy to allow new service id to pull secrets from secrets manager
resource "ibm_iam_service_policy" "secrets_store_secrets_puller_policy" {
for_each = local.secrets_stores_policies_to_create_map
iam_service_id = each.value.accountServiceID
roles = ["Viewer", "SecretsReader"]
for_each = local.secrets_stores_policies_to_create_map
iam_id = each.value.accountServiceID
roles = ["Viewer", "SecretsReader"]
resources {
service = "secrets-manager"
resource_instance_id = local.sm_guid
Expand Down