Skip to content

Commit

Permalink
fix: update references to point to hashicorp module registry (#414)
Browse files Browse the repository at this point in the history
  • Loading branch information
mounika-nalla committed Jun 19, 2023
1 parent 2b89499 commit 434a50f
Show file tree
Hide file tree
Showing 3 changed files with 18 additions and 9 deletions.
3 changes: 2 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,8 @@ For more information about the current VPN server limitations, see [VPN server l
```hcl
# Replace "master" with a GIT release version to lock into a specific release
module "client-to-site-vpn" {
source = "git::https://github.com/terraform-ibm-module/terraform-ibm-client-to-site-vpn.git?ref=main"
source = "terraform-ibm-modules/client-to-site-vpn/ibm"
version = "latest" # Replace "latest" with a release version to lock into a specific release
server_cert_crn = "crn:<...>" # CRN to a server secret or certificate in Secrets Manager
vpn_gateway_name = "example-vpn"
resource_group_id = "65xxxxxxxxxxxxxxxa3fd"
Expand Down
12 changes: 8 additions & 4 deletions examples/highavailability_mode/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,8 @@ locals {
##############################################################################

module "resource_group" {
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.0.5"
source = "terraform-ibm-modules/resource-group/ibm"
version = "1.0.5"
# if an existing resource group is not set (null) create a new one using prefix
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
existing_resource_group_name = var.resource_group
Expand Down Expand Up @@ -45,7 +46,8 @@ resource "ibm_sm_secret_group" "secret_group" {
module "private_secret_engine" {
depends_on = [ibm_resource_instance.secrets_manager]
count = var.existing_sm_instance_guid == null ? 1 : 0
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-private-cert-engine?ref=v1.0.0"
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
version = "1.0.0"
secrets_manager_guid = local.sm_guid
region = local.sm_region
root_ca_name = var.root_ca_name
Expand All @@ -60,7 +62,8 @@ module "private_secret_engine" {

module "secrets_manager_private_certificate" {
depends_on = [module.private_secret_engine]
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-private-cert.git?ref=v1.0.0"
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
version = "1.0.0"
cert_name = "${var.prefix}-cts-vpn-private-cert"
cert_description = "an example private cert"
cert_template = var.certificate_template_name
Expand All @@ -79,7 +82,8 @@ module "secrets_manager_private_certificate" {

# Minimal VPC for illustation purpose: 2 subnets across 2 availability zones
module "basic_vpc" {
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-landing-zone-vpc.git?ref=v7.3.0"
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
version = "7.3.0"
resource_group_id = module.resource_group.resource_group_id
region = var.region
name = "vpc"
Expand Down
12 changes: 8 additions & 4 deletions examples/landing-zone/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,8 @@ locals {
##############################################################################

module "resource_group" {
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.0.5"
source = "terraform-ibm-modules/resource-group/ibm"
version = "1.0.5"
# if an existing resource group is not set (null) create a new one using prefix
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
existing_resource_group_name = var.resource_group
Expand All @@ -36,7 +37,8 @@ resource "ibm_resource_instance" "secrets_manager" {
module "private_secret_engine" {
depends_on = [ibm_resource_instance.secrets_manager]
count = var.existing_sm_instance_guid == null ? 1 : 0
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-private-cert-engine?ref=v1.0.0"
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
version = "1.0.0"
secrets_manager_guid = local.sm_guid
region = local.sm_region
root_ca_name = var.root_ca_name
Expand All @@ -61,7 +63,8 @@ resource "ibm_sm_secret_group" "secret_group" {

module "secrets_manager_private_certificate" {
depends_on = [module.private_secret_engine]
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-secrets-manager-private-cert.git?ref=v1.0.0"
source = "terraform-ibm-modules/secrets-manager-private-cert/ibm"
version = "1.0.0"
cert_name = "${var.prefix}-cts-vpn-private-cert"
cert_description = "an example private cert"
cert_template = var.certificate_template_name
Expand Down Expand Up @@ -140,7 +143,8 @@ module "vpn" {
}

module "client_to_site_sg" {
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-security-group?ref=v1.0.0"
source = "terraform-ibm-modules/security-group/ibm"
version = "1.0.0"
add_ibm_cloud_internal_rules = true
vpc_id = var.vpc_id != null ? var.vpc_id : local.vpc_id
resource_group = module.resource_group.resource_group_id
Expand Down

0 comments on commit 434a50f

Please sign in to comment.