From 3904098b03f09d29d52a6c37b23845984a424611 Mon Sep 17 00:00:00 2001 From: Kumaraswamy Vithanala <64014824+kumarvit@users.noreply.github.com> Date: Mon, 21 Sep 2020 22:03:37 +0530 Subject: [PATCH] adding support to terraform v0.13 --- README.md | 13 ++++++++----- examples/complete/README.md | 3 ++- examples/complete/main.tf | 3 ++- 3 files changed, 12 insertions(+), 7 deletions(-) diff --git a/README.md b/README.md index adbae6a..4d2a18d 100644 --- a/README.md +++ b/README.md @@ -8,7 +8,8 @@ This Terraform Module creates a Key Vault also adds required access policies for ```hcl module "key-vault" { - source = "github.com/tietoevry-infra-as-code/terraform-azurerm-key-vault?ref=v2.0.0" + source = "kumarvna/key-vault/azurerm" + version = "2.0.0" # Resource Group and Key Vault pricing tier details resource_group_name = "rg-demo-project-shared-westeurope-001" @@ -71,7 +72,8 @@ Default action is set to `Allow` when no network rules matched. A `virtual_netwo ```hcl module "key-vault" { - source = "github.com/tietoevry-infra-as-code/terraform-azurerm-key-vault?ref=v2.0.0" + source = "kumarvna/key-vault/azurerm" + version = "2.0.0" # .... omitted @@ -152,7 +154,8 @@ End Date of the Project|Date when this application, workload, or service is plan ```hcl module "key-vault" { - source = "github.com/tietoevry-infra-as-code/terraform-azurerm-key-vault?ref=v2.0.0" + source = "kumarvna/key-vault/azurerm" + version = "2.0.0" # ... omitted @@ -177,7 +180,7 @@ azurerm | ~> 2.27 | Name | Version | |------|---------| -azurerm | ~> 2.27 +azurerm | 2.27 random | n/a azuread | n/a @@ -222,7 +225,7 @@ Name | Description ## Authors -Originally created by [Kumaraswamy Vithanala (Kumar)](mailto:kumaraswamy.vithanala@tieto.com) +Originally created by [Kumaraswamy Vithanala](mailto:kumaraswamy.vithanala@tieto.com) ## Other resources diff --git a/examples/complete/README.md b/examples/complete/README.md index 29cd013..48d01a2 100644 --- a/examples/complete/README.md +++ b/examples/complete/README.md @@ -6,7 +6,8 @@ Terraform Module to create a Key Vault also adds required access policies for AD ```hcl module "key-vault" { - source = "github.com/tietoevry-infra-as-code/terraform-azurerm-key-vault?ref=v2.0.0" + source = "kumarvna/key-vault/azurerm" + version = "2.0.0" # Resource Group and Key Vault pricing tier details resource_group_name = "rg-demo-project-shared-westeurope-001" diff --git a/examples/complete/main.tf b/examples/complete/main.tf index d2e0ccb..dec4735 100644 --- a/examples/complete/main.tf +++ b/examples/complete/main.tf @@ -1,5 +1,6 @@ module "key-vault" { - source = "github.com/tietoevry-infra-as-code/terraform-azurerm-key-vault?ref=v2.0.0" + source = "kumarvna/key-vault/azurerm" + version = "2.0.0" # Resource Group and Key Vault pricing tier details resource_group_name = "rg-demo-project-shared-westeurope-001"