Skip to content

Commit a411d61

Browse files
committed
Update secure.storage.sh
change tap to spaces
1 parent bf82eb8 commit a411d61

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

cloud-infrastructure/storage/block-storage/asset/secure.storage.sh

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ fi
5454
myOCID=$ii
5555
myNAME=$( cat "${myTEMPFILE}"|jq --raw-output '.[] | [.[] | select(.'\"id\"'=='\"$ii\"')] | .[].'\"display-name\"' ' )
5656
if [ 0 -lt $(echo "${myNAME}" | grep "${FRANKFURT_BLOCK_VOLUME_NAME}" | wc -l) ] ; then
57-
BLOCK_VOLUME_OCID=${myOCID}
57+
BLOCK_VOLUME_OCID=${myOCID}
5858
echo "${PF1} Block Volume name.........: ${myNAME}" >> "${LOG_FILE}"
5959
echo "${PF1} Block Volume OCID.........: ${myOCID}" >> "${LOG_FILE}"
6060
fi
@@ -90,7 +90,7 @@ fi
9090
myOCID=$ii
9191
myNAME=$( cat "${myTEMPFILE}"|jq --raw-output '.[] | [.[] | select(.'\"id\"'=='\"$ii\"')] | .[].'\"display-name\"' ' )
9292
if [ 0 -lt $(echo "${myNAME}" | grep "${FRANKFURT_BLOCK_VOLUME_NAME}Backup" | wc -l) ] ; then
93-
BLOCK_VOLUME_BACKUP_OCID=${myOCID}
93+
BLOCK_VOLUME_BACKUP_OCID=${myOCID}
9494
echo "${PF1} Block Volume Backup name..: ${myNAME}" >> "${LOG_FILE}"
9595
echo "${PF1} Block Volume Backup OCID..: ${myOCID}" >> "${LOG_FILE}"
9696
fi
@@ -107,8 +107,8 @@ if [ 1 -eq 1 ] ; then
107107
color_print "${IGreen}" "($MYCOUNT) $(date "+%d.%m.%Y %H:%M:%S") : $MYOUTPUT"
108108

109109
: ' ---------------------------------------------------------------------------------------------------------------------------------------
110-
Encrypt Data in Block Volumes https://docs.oracle.com/en/solutions/oci-best-practices/protect-data-rest1.html
111-
oci bv volume-kms-key update https://docs.oracle.com/en-us/iaas/tools/oci-cli/latest/oci_cli_docs/cmdref/bv/volume-kms-key/update.html
110+
Encrypt Data in Block Volumes https://docs.oracle.com/en/solutions/oci-best-practices/protect-data-rest1.html
111+
oci bv volume-kms-key update https://docs.oracle.com/en-us/iaas/tools/oci-cli/latest/oci_cli_docs/cmdref/bv/volume-kms-key/update.html
112112
-------------------------------------------------------------------------------------------------------------------------------------------'
113113

114114
echo "Secure Storage with Customer managed Key" >> "${LOG_FILE}"
@@ -125,7 +125,7 @@ fi
125125
color_print "${MYcolor}" "${PF1} BLOCK volume backup change from Oracle managed Key to Customer managed Key (coming soon)"
126126
if [ 1 -eq 0 ] ; then # BLOCK volume backup change from Oracle managed Key to Customer managed Key (coming soon)
127127
: ' ---------------------------------------------------------------------------------------------------------------------------------------
128-
Backup Data in Storage Services https://docs.oracle.com/en/solutions/oci-best-practices/back-your-data1.html
128+
Backup Data in Storage Services https://docs.oracle.com/en/solutions/oci-best-practices/back-your-data1.html
129129
-------------------------------------------------------------------------------------------------------------------------------------------'
130130
oci --profile "${REGION_PROFILE}" bv backup-kms-key update --volume-id "${BLOCK_VOLUME_BACKUP_OCID}" --kms-key-id "${MasterEncryptionKey_OCID}"
131131

@@ -139,8 +139,8 @@ if [ 1 -eq 1 ] ; then # Rotation of Customer managed Key
139139
: ' ---------------------------------------------------------------------------------------------------------------------------------------
140140
Periodically rotating keys limits the amount of data
141141
encrypted or signed by one key version. If a key is
142-
ever compromised, key rotation thus reduces the risk. https://docs.oracle.com/en-us/iaas/Content/KeyManagement/Concepts/keyoverview.htm#concepts
143-
kms management key-version create https://docs.oracle.com/en-us/iaas/tools/oci-cli/latest/oci_cli_docs/cmdref/kms/management/key-version/create.html
142+
ever compromised, key rotation thus reduces the risk. https://docs.oracle.com/en-us/iaas/Content/KeyManagement/Concepts/keyoverview.htm#concepts
143+
kms management key-version create https://docs.oracle.com/en-us/iaas/tools/oci-cli/latest/oci_cli_docs/cmdref/kms/management/key-version/create.html
144144
-------------------------------------------------------------------------------------------------------------------------------------------'
145145

146146
oci --profile "${REGION_PROFILE}" kms management key-version create --key-id "${MasterEncryptionKey_OCID}" --endpoint "${ManagementEndpoint}" --wait-for-state "ENABLED"

0 commit comments

Comments
 (0)