Skip to content

Commit 6a2c47c

Browse files
chore(deps): update common-dev-assets digest to 7cb1ccb (#252)
Co-authored-by: Renovate Bot <renovate@whitesourcesoftware.com>
1 parent 93b08d8 commit 6a2c47c

File tree

2 files changed

+6
-6
lines changed

2 files changed

+6
-6
lines changed

profiles/fscloud/README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -11,24 +11,24 @@ The default values in this profile were scanned by [IBM Code Risk Analyzer (CRA)
1111
The IBM Cloud Framework for Financial Services mandates the application of an inbound network-based allowlist in front of the IBM Cloud Databases for (ICD) PostgreSQL instance. You can comply with this requirement by using the `cbr_rules` variable in the module, which can be used to create a narrow context-based restriction rule that is scoped to the PostgreSQL instance. CRA does not currently support checking for context-based restrictions, so you can ignore the failing rule after you set the context-based restriction.
1212

1313
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
14-
## Requirements
14+
### Requirements
1515

1616
| Name | Version |
1717
|------|---------|
1818
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.3.0 |
1919
| <a name="requirement_ibm"></a> [ibm](#requirement\_ibm) | >= 1.54.0 |
2020

21-
## Modules
21+
### Modules
2222

2323
| Name | Source | Version |
2424
|------|--------|---------|
2525
| <a name="module_postgresql_db"></a> [postgresql\_db](#module\_postgresql\_db) | ../../ | n/a |
2626

27-
## Resources
27+
### Resources
2828

2929
No resources.
3030

31-
## Inputs
31+
### Inputs
3232

3333
| Name | Description | Type | Default | Required |
3434
|------|-------------|------|---------|:--------:|
@@ -52,7 +52,7 @@ No resources.
5252
| <a name="input_skip_iam_authorization_policy"></a> [skip\_iam\_authorization\_policy](#input\_skip\_iam\_authorization\_policy) | Set to true to skip the creation of an IAM authorization policy that permits all PostgreSQL database instances in the resource group to read the encryption key from the Hyper Protect Crypto Services instance. The HPCS instance is passed in through the var.existing\_kms\_instance\_guid variable. | `bool` | `false` | no |
5353
| <a name="input_users"></a> [users](#input\_users) | A list of users that you want to create on the database. Multiple blocks are allowed. The user password must be in the range of 10-32 characters. Be warned that in most case using IAM service credentials (via the var.service\_credential\_names) is sufficient to control access to the Postgres instance. This blocks creates native postgres database users, more info on that can be found here https://cloud.ibm.com/docs/databases-for-postgresql?topic=databases-for-postgresql-user-management&interface=ui | <pre>list(object({<br> name = string<br> password = string # pragma: allowlist secret<br> type = string # "type" is required to generate the connection string for the outputs.<br> role = optional(string)<br> }))</pre> | `[]` | no |
5454

55-
## Outputs
55+
### Outputs
5656

5757
| Name | Description |
5858
|------|-------------|

0 commit comments

Comments
 (0)