Skip to content

Commit

Permalink
Addressed review comments:
Browse files Browse the repository at this point in the history
 On branch final_doc_changes_5_33
 Your branch is up to date with 'origin/final_doc_changes_5_33'.
  • Loading branch information
ravigfortanix committed Sep 25, 2024
1 parent d4c1d4c commit a9ecba7
Show file tree
Hide file tree
Showing 10 changed files with 14 additions and 14 deletions.
4 changes: 2 additions & 2 deletions docs/resources/acc_crypto_policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ variable "acct_id" {
resource "dsm_acc_crypto_policy" "name" {
acct_id = var.acct_id
cryptographic_policy = jsonencode({
legacy_policy = "allowed" # other values: prohibited and unprotect_only
legacy_policy = "allowed" # other accepted values: prohibited and unprotect_only
key_ops = [
"SIGN", "VERIFY", "ENCRYPT", "DECRYPT", "WRAPKEY", "UNWRAPKEY", "DERIVEKEY", "TRANSFORM", "MACGENERATE",
"MACVERIFY", "EXPORT", "APPMANAGEABLE", "AGREEKEY", "ENCAPSULATE", "DECAPSULATE"
Expand Down Expand Up @@ -101,7 +101,7 @@ resource "dsm_acc_crypto_policy" "name" {
resource "dsm_acc_crypto_policy" "name" {
acct_id = var.acct_id
cryptographic_policy = jsonencode({
legacy_policy = "prohibited" # other values: allowed and unprotect_only
legacy_policy = "prohibited" # other accepted values: allowed and unprotect_only
key_ops = [
"SIGN", "VERIFY", "ENCRYPT", "DECRYPT", "WRAPKEY", "UNWRAPKEY", "DERIVEKEY", "TRANSFORM", "MACGENERATE",
"MACVERIFY", "EXPORT", "APPMANAGEABLE", "AGREEKEY", "ENCAPSULATE", "DECAPSULATE"
Expand Down
2 changes: 1 addition & 1 deletion docs/resources/azure_group.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@ Creates a Fortanix DSM group mapped to Azure Key Vault in the cluster as a resou
resource "dsm_azure_group" "dsm_azure_group" {
name = "dsm_azure_group"
description = "Azure group"
url = "https:#testfortanixterraform.vault.azure.net/"
url = "https://testfortanixterraform.vault.azure.net/"
tenant_id = "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX"
client_id = "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX"
subscription_id = "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX"
Expand Down
2 changes: 1 addition & 1 deletion docs/resources/csr.md
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ Generates a CSR from an existing private key within DSM.

```terraform
# To use this resource, it is required to create a custom plugin in DSM first.
# Copy the plugin from https:#github.com/fortanix/terraform-provider-dsm/blob/main/plugins/Terraform-Plugin-CSR.lua
# Copy the plugin from https://github.com/fortanix/terraform-provider-dsm/blob/main/plugins/Terraform-Plugin-CSR.lua
# Create the custom plugin in DSM
# Plugin title: "Terraform Plugin - CSR"
Expand Down
2 changes: 1 addition & 1 deletion docs/resources/existing_group.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ resource "dsm_existing_group" "dsm_group" {
name = "dsm_group"
description = "Update existing group"
hmg = jsonencode({
url = "https:#sampleakv.vault.azure.net/"
url = "https://sampleakv.vault.azure.net/"
tls = {
mode = "required"
validate_hostname : false
Expand Down
4 changes: 2 additions & 2 deletions docs/resources/group_crypto_policy.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ resource "dsm_group" "group" {
name = "group"
}
## Adding cryptographic policy to the group
# Adding cryptographic policy to the group
# This resource is an example of a crypto policy with all the permissions allowed.
resource "dsm_group_crypto_policy" "group_crypto_policy" {
Expand Down Expand Up @@ -66,7 +66,7 @@ resource "dsm_group_crypto_policy" "group_crypto_policy" {
}
# This resource is an example of a crypto policy with some restrictions.
# rsa, ec and dsa are defined beas null, hence they are not allowed to do any operations for rsa, ec and dsa.
# rsa, ec and dsa are defined as null, hence they are not allowed to do any operations for rsa, ec and dsa.
# Similarly, if others are not required in the use case, those values can be defined as null.
resource "dsm_group_crypto_policy" "group_crypto_policy" {
name = dsm_group.group.name
Expand Down
4 changes: 2 additions & 2 deletions examples/resources/dsm_acc_crypto_policy/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ variable "acct_id" {
resource "dsm_acc_crypto_policy" "name" {
acct_id = var.acct_id
cryptographic_policy = jsonencode({
legacy_policy = "allowed" # other values: prohibited and unprotect_only
legacy_policy = "allowed" # other accepted values: prohibited and unprotect_only
key_ops = [
"SIGN", "VERIFY", "ENCRYPT", "DECRYPT", "WRAPKEY", "UNWRAPKEY", "DERIVEKEY", "TRANSFORM", "MACGENERATE",
"MACVERIFY", "EXPORT", "APPMANAGEABLE", "AGREEKEY", "ENCAPSULATE", "DECAPSULATE"
Expand Down Expand Up @@ -86,7 +86,7 @@ resource "dsm_acc_crypto_policy" "name" {
resource "dsm_acc_crypto_policy" "name" {
acct_id = var.acct_id
cryptographic_policy = jsonencode({
legacy_policy = "prohibited" # other values: allowed and unprotect_only
legacy_policy = "prohibited" # other accepted values: allowed and unprotect_only
key_ops = [
"SIGN", "VERIFY", "ENCRYPT", "DECRYPT", "WRAPKEY", "UNWRAPKEY", "DERIVEKEY", "TRANSFORM", "MACGENERATE",
"MACVERIFY", "EXPORT", "APPMANAGEABLE", "AGREEKEY", "ENCAPSULATE", "DECAPSULATE"
Expand Down
2 changes: 1 addition & 1 deletion examples/resources/dsm_azure_group/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@
resource "dsm_azure_group" "dsm_azure_group" {
name = "dsm_azure_group"
description = "Azure group"
url = "https:#testfortanixterraform.vault.azure.net/"
url = "https://testfortanixterraform.vault.azure.net/"
tenant_id = "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX"
client_id = "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX"
subscription_id = "XXXXXXXX-XXXX-XXXX-XXXX-XXXXXXXXXXXX"
Expand Down
2 changes: 1 addition & 1 deletion examples/resources/dsm_csr/resource.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
# To use this resource, it is required to create a custom plugin in DSM first.
# Copy the plugin from https:#github.com/fortanix/terraform-provider-dsm/blob/main/plugins/Terraform-Plugin-CSR.lua
# Copy the plugin from https://github.com/fortanix/terraform-provider-dsm/blob/main/plugins/Terraform-Plugin-CSR.lua
# Create the custom plugin in DSM
# Plugin title: "Terraform Plugin - CSR"

Expand Down
2 changes: 1 addition & 1 deletion examples/resources/dsm_existing_group/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ resource "dsm_existing_group" "dsm_group" {
name = "dsm_group"
description = "Update existing group"
hmg = jsonencode({
url = "https:#sampleakv.vault.azure.net/"
url = "https://sampleakv.vault.azure.net/"
tls = {
mode = "required"
validate_hostname : false
Expand Down
4 changes: 2 additions & 2 deletions examples/resources/dsm_group_crypto_policy/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ resource "dsm_group" "group" {
name = "group"
}

## Adding cryptographic policy to the group
# Adding cryptographic policy to the group

# This resource is an example of a crypto policy with all the permissions allowed.
resource "dsm_group_crypto_policy" "group_crypto_policy" {
Expand Down Expand Up @@ -51,7 +51,7 @@ resource "dsm_group_crypto_policy" "group_crypto_policy" {
}

# This resource is an example of a crypto policy with some restrictions.
# rsa, ec and dsa are defined beas null, hence they are not allowed to do any operations for rsa, ec and dsa.
# rsa, ec and dsa are defined as null, hence they are not allowed to do any operations for rsa, ec and dsa.
# Similarly, if others are not required in the use case, those values can be defined as null.
resource "dsm_group_crypto_policy" "group_crypto_policy" {
name = dsm_group.group.name
Expand Down

0 comments on commit a9ecba7

Please sign in to comment.