Skip to content

Commit 421d484

Browse files
feat: The force_delete_key_ring option has been removed from the keys input variable as this feature is deprecated (#557)
1 parent 41b4285 commit 421d484

File tree

10 files changed

+15
-26
lines changed

10 files changed

+15
-26
lines changed

README.md

Lines changed: 3 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,6 @@ module "kms_all_inclusive" {
7979
{
8080
key_ring_name = "example-key-ring-1"
8181
existing_key_ring = true
82-
force_delete_key_ring = false
8382
keys = [
8483
{
8584
key_name = "example-key-1"
@@ -101,7 +100,6 @@ module "kms_all_inclusive" {
101100
{
102101
key_ring_name = "example-key-ring-2"
103102
existing_key_ring = false
104-
force_delete_key_ring = true
105103
keys = [
106104
{
107105
key_name = "example-key-3"
@@ -143,7 +141,7 @@ For more info, see [Understanding user roles and resources](https://cloud.ibm.co
143141
| Name | Version |
144142
|------|---------|
145143
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.0.0 |
146-
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.65.0, <2.0.0 |
144+
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.69.0, <2.0.0 |
147145

148146
### Modules
149147

@@ -152,7 +150,7 @@ For more info, see [Understanding user roles and resources](https://cloud.ibm.co
152150
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.27.0 |
153151
| <a name="module_existing_key_ring_keys"></a> [existing\_key\_ring\_keys](#module\_existing\_key\_ring\_keys) | terraform-ibm-modules/kms-key/ibm | v1.2.4 |
154152
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/key-protect/ibm | 2.8.5 |
155-
| <a name="module_kms_key_rings"></a> [kms\_key\_rings](#module\_kms\_key\_rings) | terraform-ibm-modules/kms-key-ring/ibm | v2.4.1 |
153+
| <a name="module_kms_key_rings"></a> [kms\_key\_rings](#module\_kms\_key\_rings) | terraform-ibm-modules/kms-key-ring/ibm | v2.5.0 |
156154
| <a name="module_kms_keys"></a> [kms\_keys](#module\_kms\_keys) | terraform-ibm-modules/kms-key/ibm | v1.2.4 |
157155

158156
### Resources
@@ -178,7 +176,7 @@ For more info, see [Understanding user roles and resources](https://cloud.ibm.co
178176
| <a name="input_key_protect_instance_name"></a> [key\_protect\_instance\_name](#input\_key\_protect\_instance\_name) | The name to give the Key Protect instance that will be provisioned by this module. Only used if 'create\_key\_protect\_instance' is true. | `string` | `"key-protect"` | no |
179177
| <a name="input_key_protect_plan"></a> [key\_protect\_plan](#input\_key\_protect\_plan) | Plan for the Key Protect instance. Currently only 'tiered-pricing' is supported. Only used if 'create\_key\_protect\_instance' is true. | `string` | `"tiered-pricing"` | no |
180178
| <a name="input_key_ring_endpoint_type"></a> [key\_ring\_endpoint\_type](#input\_key\_ring\_endpoint\_type) | The type of endpoint to be used for creating key rings. Accepts 'public' or 'private' | `string` | `"public"` | no |
181-
| <a name="input_keys"></a> [keys](#input\_keys) | A list of objects which contain the key ring name, a flag indicating if this key ring already exists, and a flag to enable force deletion of the key ring. In addition, this object contains a list of keys with all of the information on the keys to be created in that key ring. | <pre>list(object({<br/> key_ring_name = string<br/> existing_key_ring = optional(bool, false)<br/> force_delete_key_ring = optional(bool, false)<br/> keys = list(object({<br/> key_name = string<br/> standard_key = optional(bool, false)<br/> rotation_interval_month = optional(number, 1)<br/> dual_auth_delete_enabled = optional(bool, false)<br/> force_delete = optional(bool, false)<br/> }))<br/> }))</pre> | `[]` | no |
179+
| <a name="input_keys"></a> [keys](#input\_keys) | A list of objects which contain the key ring name, a flag indicating if this key ring already exists, and a flag to enable force deletion of the key ring. In addition, this object contains a list of keys with all of the information on the keys to be created in that key ring. | <pre>list(object({<br/> key_ring_name = string<br/> existing_key_ring = optional(bool, false)<br/> keys = list(object({<br/> key_name = string<br/> standard_key = optional(bool, false)<br/> rotation_interval_month = optional(number, 1)<br/> dual_auth_delete_enabled = optional(bool, false)<br/> force_delete = optional(bool, false)<br/> }))<br/> }))</pre> | `[]` | no |
182180
| <a name="input_region"></a> [region](#input\_region) | The IBM Cloud region where all resources will be provisioned. | `string` | n/a | yes |
183181
| <a name="input_resource_group_id"></a> [resource\_group\_id](#input\_resource\_group\_id) | The ID of the Resource Group to provision the Key Protect instance in. Not required if 'create\_key\_protect\_instance' is false. | `string` | `null` | no |
184182
| <a name="input_resource_tags"></a> [resource\_tags](#input\_resource\_tags) | Optional list of tags to be added to the Key Protect instance. Only used if 'create\_key\_protect\_instance' is true. | `list(string)` | `[]` | no |

examples/basic/main.tf

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,8 +24,7 @@ module "key_protect_all_inclusive" {
2424
keys = [
2525
# Create one new Key Ring with multiple new Keys in it
2626
{
27-
key_ring_name = "${var.prefix}-slz-ring"
28-
force_delete_key_ring = true # Setting it to true for testing purpose
27+
key_ring_name = "${var.prefix}-slz-ring"
2928
keys = [
3029
{
3130
key_name = "${var.prefix}-slz-key"

examples/basic/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ terraform {
66
required_providers {
77
ibm = {
88
source = "IBM-Cloud/ibm"
9-
version = "1.65.0"
9+
version = "1.69.0"
1010
}
1111
}
1212
}

examples/existing-resources/main.tf

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,9 +9,8 @@ module "key_protect_all_inclusive" {
99
existing_kms_instance_crn = var.existing_kms_instance_crn
1010
keys = [
1111
{
12-
key_ring_name = "default"
13-
existing_key_ring = true
14-
force_delete_key_ring = true # Setting it to true for testing purpose
12+
key_ring_name = "default"
13+
existing_key_ring = true
1514
keys = [
1615
{
1716
key_name = "test-key"

examples/existing-resources/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ terraform {
66
required_providers {
77
ibm = {
88
source = "IBM-Cloud/ibm"
9-
version = ">= 1.65.0"
9+
version = ">= 1.69.0"
1010
}
1111
}
1212
}

main.tf

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -75,19 +75,17 @@ locals {
7575
for key_ring in var.keys :
7676
key_ring.existing_key_ring ? [] : [{
7777
key_ring_name = key_ring.key_ring_name
78-
force_delete = key_ring.force_delete_key_ring
7978
}]
8079
])
8180
}
8281

8382
module "kms_key_rings" {
8483
source = "terraform-ibm-modules/kms-key-ring/ibm"
85-
version = "v2.4.1"
84+
version = "v2.5.0"
8685
for_each = { for obj in local.key_rings : obj.key_ring_name => obj }
8786
instance_id = local.kms_guid
8887
endpoint_type = var.key_ring_endpoint_type
8988
key_ring_id = each.value.key_ring_name
90-
force_delete = each.value.force_delete
9189
}
9290

9391
moved {

solutions/standard/DA-keys.md

Lines changed: 1 addition & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
When you add a key management service from the IBM Cloud catalog to an IBM Cloud Projects service, you can configure key rings and keys. In the edit mode for the projects configuration, select the Configure panel and then click the optional tab.
44

5-
In the configuration, specify the name of the key ring, whether the key ring exists, and whether to force the deletion of the key. The object also contains a list of keys with all the information about the keys that you want to create in that key ring.
5+
In the configuration, specify the name of the key ring and whether the key ring exists. The object also contains a list of keys with all the information about the keys that you want to create in that key ring.
66

77
To enter a custom value, use the edit action to open the "Edit Array" panel. Add the KMS key ring and key configurations to the array here.
88

@@ -12,7 +12,6 @@ To enter a custom value, use the edit action to open the "Edit Array" panel. Add
1212

1313
- `key_ring_name` (required): A unique human-readable name that identifies this key ring. To protect your privacy, do not use personal data, such as your name or location. The key ring name can be between 2 and 100 characters.
1414
- `existing_key_ring` (optional, default = `false`): Set to true if the key ring already exists and keys should be added to it.
15-
- `force_delete_key_ring` (optional, default = `true`): Whether to force delete the key ring with a destroy command or when the projects configuration is removed. When `true` this force deletes the key ring in the event that it contains keys in the `Destroyed` state, see [Deleting key rings](https://cloud.ibm.com/docs/key-protect?topic=key-protect-grouping-keys&interface=api#delete-key-ring-api).
1615

1716
### Key options
1817

@@ -28,7 +27,6 @@ The following example includes all the configuration options for two key rings.
2827
{
2928
"key_ring_name": "da-ring-1",
3029
"existing_key_ring": false,
31-
"force_delete_key_ring": true,
3230
"keys": [
3331
{
3432
"key_name": "da-key-1-1",
@@ -49,7 +47,6 @@ The following example includes all the configuration options for two key rings.
4947
{
5048
"key_ring_name": "da-ring-2",
5149
"existing_key_ring": false,
52-
"force_delete_key_ring": true,
5350
"keys": [
5451
{
5552
"key_name": "da-key-2-1",

solutions/standard/variables.tf

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -92,9 +92,8 @@ variable "kms_endpoint_type" {
9292

9393
variable "keys" {
9494
type = list(object({
95-
key_ring_name = string
96-
existing_key_ring = optional(bool, false)
97-
force_delete_key_ring = optional(bool, true)
95+
key_ring_name = string
96+
existing_key_ring = optional(bool, false)
9897
keys = list(object({
9998
key_name = string
10099
standard_key = optional(bool, false)

variables.tf

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -96,9 +96,8 @@ variable "existing_kms_instance_crn" {
9696

9797
variable "keys" {
9898
type = list(object({
99-
key_ring_name = string
100-
existing_key_ring = optional(bool, false)
101-
force_delete_key_ring = optional(bool, false)
99+
key_ring_name = string
100+
existing_key_ring = optional(bool, false)
102101
keys = list(object({
103102
key_name = string
104103
standard_key = optional(bool, false)

version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ terraform {
77
# tflint-ignore: terraform_unused_required_providers
88
ibm = {
99
source = "IBM-Cloud/ibm"
10-
version = ">= 1.65.0, <2.0.0"
10+
version = ">= 1.69.0, <2.0.0"
1111
}
1212
}
1313
}

0 commit comments

Comments
 (0)