Skip to content

Commit dceb7e0

Browse files
authored
fix: solution input default improvements and spelling inconsistencies (#1058)
1 parent 2de8265 commit dceb7e0

File tree

25 files changed

+42
-37
lines changed

25 files changed

+42
-37
lines changed

.secrets.baseline

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "go.sum|^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2023-12-16T18:26:42Z",
6+
"generated_at": "2023-12-16T18:26:41Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -930,7 +930,7 @@ module "cluster_pattern" {
930930
| <a name="input_service_endpoints"></a> [service\_endpoints](#input\_service\_endpoints) | Service endpoints for the App ID resource when created by the module. Can be `public`, `private`, or `public-and-private` | `string` | `"public-and-private"` | no |
931931
| <a name="input_skip_all_s2s_auth_policies"></a> [skip\_all\_s2s\_auth\_policies](#input\_skip\_all\_s2s\_auth\_policies) | Whether to skip the creation of all of the service-to-service authorization policies. If setting to true, policies must be in place on the account before provisioning. | `bool` | `false` | no |
932932
| <a name="input_skip_kms_block_storage_s2s_auth_policy"></a> [skip\_kms\_block\_storage\_s2s\_auth\_policy](#input\_skip\_kms\_block\_storage\_s2s\_auth\_policy) | Whether to skip the creation of a service-to-service authorization policy between block storage and the key management service. | `bool` | `false` | no |
933-
| <a name="input_skip_kms_kube_s2s_auth_policy"></a> [skip\_kms\_kube\_s2s\_auth\_policy](#input\_skip\_kms\_kube\_s2s\_auth\_policy) | Whether to skip the creation of a service-to-serivce authorization policy between kubernetes and the key management service. | `bool` | `false` | no |
933+
| <a name="input_skip_kms_kube_s2s_auth_policy"></a> [skip\_kms\_kube\_s2s\_auth\_policy](#input\_skip\_kms\_kube\_s2s\_auth\_policy) | Whether to skip the creation of a service-to-service authorization policy between kubernetes and the key management service. | `bool` | `false` | no |
934934
| <a name="input_ssh_keys"></a> [ssh\_keys](#input\_ssh\_keys) | SSH keys to use to provision a VSI. Must be an RSA key with a key size of either 2048 bits or 4096 bits (recommended). If `public_key` is not provided, the named key will be looked up from data. If a resource group name is added, it must be included in `var.resource_groups`. See https://cloud.ibm.com/docs/vpc?topic=vpc-ssh-keys. | <pre>list(<br/> object({<br/> name = string<br/> public_key = optional(string)<br/> resource_group = optional(string)<br/> })<br/> )</pre> | n/a | yes |
935935
| <a name="input_tags"></a> [tags](#input\_tags) | List of resource tags to apply to resources created by this module. | `list(string)` | `[]` | no |
936936
| <a name="input_teleport_config_data"></a> [teleport\_config\_data](#input\_teleport\_config\_data) | Teleport config data. This is used to create a single template for all teleport instances to use. Creating a single template allows for values to remain sensitive | <pre>object({<br/> teleport_license = optional(string)<br/> https_cert = optional(string)<br/> https_key = optional(string)<br/> domain = optional(string)<br/> cos_bucket_name = optional(string)<br/> cos_key_name = optional(string)<br/> teleport_version = optional(string)<br/> message_of_the_day = optional(string)<br/> hostname = optional(string)<br/> app_id_key_name = optional(string)<br/> claims_to_roles = optional(<br/> list(<br/> object({<br/> email = string<br/> roles = list(string)<br/> })<br/> )<br/> )<br/> })</pre> | `null` | no |
@@ -957,7 +957,7 @@ module "cluster_pattern" {
957957
| <a name="output_bastion_host_names"></a> [bastion\_host\_names](#output\_bastion\_host\_names) | List of bastion host names |
958958
| <a name="output_cluster_data"></a> [cluster\_data](#output\_cluster\_data) | List of cluster data |
959959
| <a name="output_cluster_names"></a> [cluster\_names](#output\_cluster\_names) | List of create cluster names |
960-
| <a name="output_cos_bucket_data"></a> [cos\_bucket\_data](#output\_cos\_bucket\_data) | List of data for COS buckets creaed |
960+
| <a name="output_cos_bucket_data"></a> [cos\_bucket\_data](#output\_cos\_bucket\_data) | List of data for COS buckets created |
961961
| <a name="output_cos_bucket_names"></a> [cos\_bucket\_names](#output\_cos\_bucket\_names) | List of names for COS buckets created |
962962
| <a name="output_cos_data"></a> [cos\_data](#output\_cos\_data) | List of Cloud Object Storage instance data |
963963
| <a name="output_cos_key_credentials_map"></a> [cos\_key\_credentials\_map](#output\_cos\_key\_credentials\_map) | Map of resource key credentials created for COS instances, organized by the key name supplied in the `cos.keys[]` input variable. Contains sensitive output including API keys and HMAC credentials. |

cluster.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -195,7 +195,7 @@ locals {
195195
)
196196
}
197197

198-
# for each cluster in the clusters_map, get the addons and their versions and create an addons map including the corosponding csi_driver_version
198+
# for each cluster in the clusters_map, get the addons and their versions and create an addons map including the corresponding csi_driver_version
199199
cluster_addons = {
200200
for cluster in local.clusters_map : "${var.prefix}-${cluster.name}" => {
201201
id = ibm_container_vpc_cluster.cluster["${var.prefix}-${cluster.name}"].id

dynamic_values/config_modules/service_authorizations/service_authorizations.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -88,7 +88,7 @@ locals {
8888
target_key_management_service = lookup(var.key_management, "name", null) != null ? lookup(var.key_management, "use_hs_crypto", false) == true ? "hs-crypto" : "kms" : null
8989

9090
# create a list of keys used for all buckets, since we are going to scope the auth policy to keys.
91-
# doing this in a local first becase it needs a distinct to get rid of duplicates from same keys used
91+
# doing this in a local first because it needs a distinct to get rid of duplicates from same keys used
9292
# on multiple buckets, and a distinct on the final map may error in terraform for_each before first apply.
9393
cos_bucket_key_list_distinct = distinct(
9494
flatten([

dynamic_values/unit_tests.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -82,7 +82,7 @@ module "ut_nest_to_map" {
8282

8383
locals {
8484
actual_netested_map = module.ut_nest_to_map.value
85-
assert_2_childen = regex("child-1;child-2", join(";", keys(local.actual_netested_map)))
85+
assert_2_children = regex("child-1;child-2", join(";", keys(local.actual_netested_map)))
8686
assert_children_groups = regex("ut-parent-name", local.actual_netested_map["child-1"].group)
8787
assert_children_test = regex("test-field", local.actual_netested_map["child-2"].test)
8888
}
@@ -137,7 +137,7 @@ module "ut_nest_to_map_prepend" {
137137
locals {
138138
actual_add_prefix_netested_map = module.ut_nest_to_map_prepend.value
139139
prefix_join = join(";", keys(local.actual_add_prefix_netested_map))
140-
assert_add_prefix_2_childen = regex("parent-name-child-1;parent-name-child-2", local.prefix_join)
140+
assert_add_prefix_2_children = regex("parent-name-child-1;parent-name-child-2", local.prefix_join)
141141
assert_add_prefix_children_groups = regex("ut-parent-name", local.actual_add_prefix_netested_map["parent-name-child-1"].group)
142142
assert_add_prefix_children_test = regex("test-field", local.actual_add_prefix_netested_map["parent-name-child-2"].test)
143143
assert_child_2_has_parameters = regex("true", local.actual_add_prefix_netested_map["parent-name-child-2"].parameters.HMAC)

ibm_catalog.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1161,7 +1161,7 @@
11611161
"url": "https://raw.githubusercontent.com/terraform-ibm-modules/terraform-ibm-landing-zone/main/reference-architectures/vpc.drawio.svg",
11621162
"type": "image/svg+xml"
11631163
},
1164-
"description": "This deployable architecture deploys a simple Virtual Private Cloud (VPC) infrastructure without any compute resources. You can use this architecture as a base on which to deploy compute resources. This variation uses two Virtual Private Clouds (VPC) - a Management VPC and a Workload VPC - to manage the environment and the deployed workload. Each VPC is a multi-zoned, multi-subnet implementation that keeps your workloads secure. A transit gateway connects the VPCs to each other and Virtual Private Endpoints are used connect to IBM Cloud services.<br><br> This variation integrates <b>key mangement services</b> to enhance security. It also leverages <b>Activity Tracker and Flow Logs</b> to collect and store Internet Protocol (IP) traffic information.<br><br> It securely connects to multiple networks with a <b>site-to-site</b> virtual private network and uses an <b>edge VPC</b> for secure access through the public internet . It configures <b>CBR (Context-based restrictions)</b> rules to allow traffic to flow only from the landing zone VPCs to specific cloud services. <br><br>This deployable architecture simplifies risk management and demonstrates regulatory compliance with Financial Services."
1164+
"description": "This deployable architecture deploys a simple Virtual Private Cloud (VPC) infrastructure without any compute resources. You can use this architecture as a base on which to deploy compute resources. This variation uses two Virtual Private Clouds (VPC) - a Management VPC and a Workload VPC - to manage the environment and the deployed workload. Each VPC is a multi-zoned, multi-subnet implementation that keeps your workloads secure. A transit gateway connects the VPCs to each other and Virtual Private Endpoints are used connect to IBM Cloud services.<br><br> This variation integrates <b>key management services</b> to enhance security. It also leverages <b>Activity Tracker and Flow Logs</b> to collect and store Internet Protocol (IP) traffic information.<br><br> It securely connects to multiple networks with a <b>site-to-site</b> virtual private network and uses an <b>edge VPC</b> for secure access through the public internet . It configures <b>CBR (Context-based restrictions)</b> rules to allow traffic to flow only from the landing zone VPCs to specific cloud services. <br><br>This deployable architecture simplifies risk management and demonstrates regulatory compliance with Financial Services."
11651165
}
11661166
]
11671167
},

outputs.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -171,7 +171,7 @@ output "cos_bucket_names" {
171171
}
172172

173173
output "cos_bucket_data" {
174-
description = "List of data for COS buckets creaed"
174+
description = "List of data for COS buckets created"
175175
value = [
176176
for instance in ibm_cos_bucket.buckets :
177177
instance

patterns/dynamic_values/config_modules/bastion_vsi/bastion_vsi.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -51,7 +51,7 @@ variable "teleport_instance_profile" {
5151
}
5252

5353
variable "teleport_vsi_image_name" {
54-
description = "Teleport VSI image name. Use the IBM Cloud CLI command `ibmcloud is images` to see availabled images."
54+
description = "Teleport VSI image name. Use the IBM Cloud CLI command `ibmcloud is images` to see available images."
5555
type = string
5656
}
5757

patterns/dynamic_values/config_modules/f5_tiers/f5_tiers.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,7 @@ variable "provision_teleport_in_f5" {
4444
locals {
4545
# Bastion if provisioning teleport in f5, otherwise empty array
4646
bastion_subnet_tiers = var.provision_teleport_in_f5 == true ? ["bastion"] : []
47-
# List of network tiers, if firewall type is null empty, otherwsie list of tiers
47+
# List of network tiers, if firewall type is null empty, otherwise list of tiers
4848
f5_network_tiers = var.vpn_firewall_type == null ? [] : var.vpn_firewall_types[var.vpn_firewall_type]
4949
vpn_tiers = var.vpn_firewall_type == "waf" || var.vpn_firewall_type == null ? [] : ["vpn-1", "vpn-2"]
5050
}

patterns/dynamic_values/config_modules/vpc/subnet_cidr.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
##############################################################################
2-
# [Unit Test] F5 on Managment
2+
# [Unit Test] F5 on Management
33
##############################################################################
44

55
module "ut_f5_on_management_cidr" {

0 commit comments

Comments
 (0)