diff --git a/main.tf b/main.tf index 961d75be..c358e01e 100644 --- a/main.tf +++ b/main.tf @@ -36,6 +36,7 @@ resource "ibm_iam_authorization_policy" "kms_policy" { target_service_name = local.kms_service target_resource_instance_id = var.existing_kms_instance_guid roles = ["Reader"] + description = "Allow all ICD Postgres instances in the resource group ${var.resource_group_id} to read from the ${local.kms_service} instance GUID ${var.existing_kms_instance_guid}" } # workaround for https://github.com/IBM-Cloud/terraform-provider-ibm/issues/4478 diff --git a/module-metadata.json b/module-metadata.json index b89cabb1..34fd7dd0 100644 --- a/module-metadata.json +++ b/module-metadata.json @@ -272,6 +272,7 @@ "required": true, "source": [ "ibm_database.postgresql_db.resource_group_id", + "ibm_iam_authorization_policy.kms_policy.description", "ibm_iam_authorization_policy.kms_policy.source_resource_group_id" ], "pos": { @@ -489,7 +490,7 @@ }, "pos": { "filename": "main.tf", - "line": 49 + "line": 50 } }, "ibm_iam_authorization_policy.kms_policy": { @@ -498,6 +499,7 @@ "name": "kms_policy", "attributes": { "count": "kms_encryption_enabled", + "description": "resource_group_id", "source_resource_group_id": "resource_group_id", "target_resource_instance_id": "existing_kms_instance_guid" }, @@ -521,7 +523,7 @@ }, "pos": { "filename": "main.tf", - "line": 189 + "line": 190 } }, "ibm_resource_tag.postgresql_tag": { @@ -537,7 +539,7 @@ }, "pos": { "filename": "main.tf", - "line": 140 + "line": 141 } }, "time_sleep.wait_for_authorization_policy": { @@ -549,7 +551,7 @@ }, "pos": { "filename": "main.tf", - "line": 42 + "line": 43 } } }, @@ -569,7 +571,7 @@ }, "pos": { "filename": "main.tf", - "line": 217 + "line": 218 } } }, @@ -648,7 +650,7 @@ }, "pos": { "filename": "main.tf", - "line": 150 + "line": 151 } } }