Skip to content

Commit df61899

Browse files
feat: ability to point to existing kms instance as a stack input (#117)
* chore(deps): update ci dependencies (#113) * fix: update stack definition along with existing kms crn * updated ibm_catalog.json * fixes --------- Co-authored-by: Terraform IBM Modules Operations <[email protected]>
1 parent 80b744c commit df61899

File tree

2 files changed

+23
-5
lines changed

2 files changed

+23
-5
lines changed

ibm_catalog.json

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -261,7 +261,7 @@
261261
"key": "existing_secrets_manager_crn",
262262
"type": "string",
263263
"default_value": "__NULL__",
264-
"description": "The CRN of an existing secret manager instance to use in this solution. If not set, a new secret manager instance is provisioned. ",
264+
"description": "The CRN of an existing secret manager instance to use in this solution. If not set, a new secret manager instance is provisioned.",
265265
"required": false
266266
},
267267
{
@@ -277,6 +277,13 @@
277277
"default_value": "https://github.com/IBM/gen-ai-rag-watsonx-sample-application",
278278
"description": "The URL to the public git repository containing the sample rag application code.",
279279
"required": false
280+
},
281+
{
282+
"key": "existing_kms_instance_crn",
283+
"type": "string",
284+
"default_value": "__NULL__",
285+
"description": "The CRN of an existing KMS instance to use in this solution. If not set, a new KP instance is provisioned.",
286+
"required": false
280287
}
281288
],
282289
"outputs": [

stack_definition.json

Lines changed: 15 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -54,6 +54,13 @@
5454
"hidden": false,
5555
"default": null
5656
},
57+
{
58+
"name": "existing_kms_instance_crn",
59+
"required": false,
60+
"type": "string",
61+
"hidden": false,
62+
"default": null
63+
},
5764
{
5865
"name": "enable_platform_logs_metrics",
5966
"required": false,
@@ -115,7 +122,7 @@
115122
},
116123
{
117124
"name": "2a - Security Service - Key Management",
118-
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.30d23518-293d-428c-9353-e3236bad41ff-global",
125+
"version_locator": "7a4d68b4-cf8b-40cd-a3d1-f49aff526eb3.dafa6c99-436a-4d01-a379-8ef818af59a1-global",
119126
"inputs": [
120127
{
121128
"name": "resource_group_name",
@@ -136,6 +143,10 @@
136143
{
137144
"name": "region",
138145
"value": "ref:../../inputs/region"
146+
},
147+
{
148+
"name": "existing_kms_instance_crn",
149+
"value": "ref:../../inputs/existing_kms_instance_crn"
139150
}
140151
]
141152
},
@@ -161,7 +172,7 @@
161172
},
162173
{
163174
"name": "existing_kms_instance_crn",
164-
"value": "ref:../2a - Security Service - Key Management/outputs/key_protect_crn"
175+
"value": "ref:../2a - Security Service - Key Management/outputs/kms_instance_crn"
165176
},
166177
{
167178
"name": "use_existing_resource_group",
@@ -199,7 +210,7 @@
199210
},
200211
{
201212
"name": "existing_kms_instance_crn",
202-
"value": "ref:../2a - Security Service - Key Management/outputs/key_protect_crn"
213+
"value": "ref:../2a - Security Service - Key Management/outputs/kms_instance_crn"
203214
},
204215
{
205216
"name": "use_existing_resource_group",
@@ -225,7 +236,7 @@
225236
},
226237
{
227238
"name": "existing_kms_instance_crn",
228-
"value": "ref:../2a - Security Service - Key Management/outputs/key_protect_crn"
239+
"value": "ref:../2a - Security Service - Key Management/outputs/kms_instance_crn"
229240
},
230241
{
231242
"name": "resource_group_name",

0 commit comments

Comments
 (0)