Skip to content

Commit

Permalink
Updating release candidate [skip ci] (#12)
Browse files Browse the repository at this point in the history
Co-authored-by: bczoma <[email protected]>
  • Loading branch information
github-actions[bot] and bczoma authored Mar 25, 2024
1 parent 3e80308 commit 211e7d2
Show file tree
Hide file tree
Showing 12 changed files with 23 additions and 23 deletions.
2 changes: 1 addition & 1 deletion ci/module-test/providers.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
terraform {
required_providers {
solacebroker = {
source = "registry.terraform.io/solaceproducts/solacebroker"
source = "registry.terraform.io/solaceproducts/solacebroker"
version = "~> 0.9"
}
}
Expand Down
2 changes: 1 addition & 1 deletion ci/template-test/providers.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
terraform {
required_providers {
solacebroker = {
source = "registry.terraform.io/solaceproducts/solacebroker"
source = "registry.terraform.io/solaceproducts/solacebroker"
version = "~> 0.9"
}
}
Expand Down
2 changes: 1 addition & 1 deletion examples/basic-vpn/providers.tf
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
terraform {
required_providers {
solacebroker = {
source = "registry.terraform.io/solaceproducts/solacebroker"
source = "registry.terraform.io/solaceproducts/solacebroker"
version = "~> 0.9"
}
}
Expand Down
14 changes: 7 additions & 7 deletions examples/client-certificate-authentication/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ provider "solacebroker" {
module "testvpn" {
source = "../.."

msg_vpn_name = "vpn-with-mtls"
msg_vpn_name = "vpn-with-mtls"
// No need to set the VPN enabled, it defaults to true
// enabled = true

Expand All @@ -36,14 +36,14 @@ module "testvpn" {

cert_matching_rule_conditions = [
{
source = "issuer"
source = "issuer"
expression = "C = CA, ST = Ontario, L = Kanata, O = Solace Systems, OU = IT, CN = *.messaging.solace"
}
]
cert_matching_rule_attribute_filters = [
{
filter_name = "testFilter"
attribute_name = "username"
filter_name = "testFilter"
attribute_name = "username"
attribute_value = "test"
}
]
Expand All @@ -55,14 +55,14 @@ output "created_vpn" {
}

output "created_cert_matching_rule" {
value = module.testvpn.cert_matching_rule
value = module.testvpn.cert_matching_rule
}

output "created_cert_matching_rule_conditions" {
value = module.testvpn.cert_matching_rule_conditions
value = module.testvpn.cert_matching_rule_conditions
}

output "created_cert_matching_rule_attribute_filters" {
value = module.testvpn.cert_matching_rule_attribute_filters
value = module.testvpn.cert_matching_rule_attribute_filters
}

2 changes: 1 addition & 1 deletion examples/client-certificate-authentication/providers.tf
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
terraform {
required_providers {
solacebroker = {
source = "registry.terraform.io/solaceproducts/solacebroker"
source = "registry.terraform.io/solaceproducts/solacebroker"
version = "~> 0.9"
}
}
Expand Down
8 changes: 4 additions & 4 deletions examples/customized-acl-and-client-profiles/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -21,10 +21,10 @@ provider "solacebroker" {
module "testvpn" {
source = "../.."

msg_vpn_name = "vpn-with-acl-and-client-profiles"
msg_vpn_name = "vpn-with-acl-and-client-profiles"

// Configure an ACL profile. This example allows clients to connect from any address. All other ACL rules are default
acl_profile_name = "my-acl-profile"
acl_profile_name = "my-acl-profile"
client_connect_default_action = "allow"

// Configure a client profile. This example disables compression, which is by default enabled. All other client profile settings are default
Expand All @@ -41,10 +41,10 @@ output "created_vpn" {
}

output "created_acl_profile" {
value = module.testvpn.acl_profile
value = module.testvpn.acl_profile
}

output "created_client_profile" {
value = module.testvpn.client_profile
value = module.testvpn.client_profile
}

2 changes: 1 addition & 1 deletion examples/customized-acl-and-client-profiles/providers.tf
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
terraform {
required_providers {
solacebroker = {
source = "registry.terraform.io/solaceproducts/solacebroker"
source = "registry.terraform.io/solaceproducts/solacebroker"
version = "~> 0.9"
}
}
Expand Down
4 changes: 2 additions & 2 deletions examples/oauth-authentication/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -21,11 +21,11 @@ provider "solacebroker" {
module "testvpn" {
source = "../.."

msg_vpn_name = "vpn-with-oauth"
msg_vpn_name = "vpn-with-oauth"
// No need to set the VPN enabled, it defaults to true
// enabled = true

oauth_profile_name = "sampleVpnOauthProfile"
oauth_profile_name = "sampleVpnOauthProfile"
// with "oauth_profile_name" defined, OAuth authentication will be automatically enabled on the message VPN
// no need to set the following:
// authentication_oauth_enabled = true
Expand Down
2 changes: 1 addition & 1 deletion examples/oauth-authentication/providers.tf
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
terraform {
required_providers {
solacebroker = {
source = "registry.terraform.io/solaceproducts/solacebroker"
source = "registry.terraform.io/solaceproducts/solacebroker"
version = "~> 0.9"
}
}
Expand Down
4 changes: 2 additions & 2 deletions examples/services-and-listen-ports/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -21,10 +21,10 @@ provider "solacebroker" {
module "testvpn" {
source = "../.."

msg_vpn_name = "rest-enabled-vpn"
msg_vpn_name = "rest-enabled-vpn"

// Enable and configure incoming messaging protocols, for example REST. Note that plain text is not recommended for production use.
service_rest_incoming_plain_text_enabled = true
service_rest_incoming_plain_text_enabled = true
service_rest_incoming_plain_text_listen_port = 9001

// Uncomment to disable plain text SMF - however secure transport SMF requires a server certificate installed on the broker
Expand Down
2 changes: 1 addition & 1 deletion examples/services-and-listen-ports/providers.tf
Original file line number Diff line number Diff line change
Expand Up @@ -17,7 +17,7 @@
terraform {
required_providers {
solacebroker = {
source = "registry.terraform.io/solaceproducts/solacebroker"
source = "registry.terraform.io/solaceproducts/solacebroker"
version = "~> 0.9"
}
}
Expand Down
2 changes: 1 addition & 1 deletion internal/gen-template/provider.tf
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
terraform {
required_providers {
solacebroker = {
source = "registry.terraform.io/solaceproducts/solacebroker"
source = "registry.terraform.io/solaceproducts/solacebroker"
version = "~> 0.9"
}
}
Expand Down

0 comments on commit 211e7d2

Please sign in to comment.