-
Notifications
You must be signed in to change notification settings - Fork 6
feat: added support for creating resource key with private endpoints #472
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
/run pipeline |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This also needs to be exposed to the DAs.
|
/run pipeline |
|
@Khuzaima05, did you the test the scenario with "public-and-private" endpoint as per this comment? |
yes, I have tested the scenario for |
Co-authored-by: Akash Kumar <[email protected]>
Co-authored-by: Akash Kumar <[email protected]>
|
/run pipeline |
|
/run pipeline |
|
/run pipeline |
|
/run pipeline |
ocofaigh
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
see comments
|
@Khuzaima05 Something else I noticed is that we seem to have alot of duplication in the DA markdown docs. For inputs that are the same in both variations, don't duplicate the docs. Just have both variations pointing to the one doc. And if its easier to maintain and read, I would split it 1 doc per input type to avoid any confusion with inputs that might be in 1 variations and not in another |
@ocofaigh Yes, all complex variables in the quickstart are already documented in the DA_docs for the security_enforced version. Therefore, I’ve removed the DA_docs from the quickstart and updated the variable references accordingly. |
|
/run pipeline |
|
/run pipeline |
ocofaigh
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
see latest comments
|
/run pipeline |
ocofaigh
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
still not right #472 (comment)
|
/run pipeline |
|
Addons test failed (Wesley is working on a workaround for this intermittent issue): Going to retry.. |
|
/run pipeline |
|
/run pipeline |
|
🎉 This PR is included in version 4.6.0 🎉 The release is available on:
Your semantic-release bot 📦🚀 |


This PR adds support for creating Event Streams resource key scoped to private endpoints.
Previously, the module only created service credentials for public endpoints by default. Event Streams supports generating credentials for both public and private endpoints, and this functionality is enabled in Terraform by passing the parameters block to the ibm_resource_key resource.
Reference: Terraform IBM Provider – resource_key parameters
Changes:
Updated the ibm_resource_key resource to allow passing the parameters argument so that service credentials can be created for private endpoints (e.g., {"service-endpoints" = "private"}).
Updated the fs-cloud example to demonstrate creating Event Streams service credentials with private endpoints.
issue: #444
Release required?
x.x.X)x.X.x)X.x.x)Release notes content
Run the pipeline
If the CI pipeline doesn't run when you create the PR, the PR requires a user with GitHub collaborators access to run the pipeline.
Run the CI pipeline when the PR is ready for review and you expect tests to pass. Add a comment to the PR with the following text:
Checklist for reviewers
For mergers