File tree 5 files changed +7
-7
lines changed 5 files changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -65,7 +65,7 @@ You need the following permissions to run this module.
65
65
| Name | Source | Version |
66
66
| ------| --------| ---------|
67
67
| <a name =" module_backup_key_crn_parser " ></a > [ backup\_ key\_ crn\_ parser] ( #module\_ backup\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
68
- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | git::https://github.com/terraform-ibm-modules/terraform-ibm-cbr//modules/cbr-rule-module | v1.30 .0 |
68
+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | git::https://github.com/terraform-ibm-modules/terraform-ibm-cbr//modules/cbr-rule-module | v1.31 .0 |
69
69
| <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
70
70
71
71
### Resources
Original file line number Diff line number Diff line change @@ -21,7 +21,7 @@ locals {
21
21
22
22
module "key_protect_all_inclusive" {
23
23
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
24
- version = " 5.0.0 "
24
+ version = " 5.0.1 "
25
25
resource_group_id = module. resource_group . resource_group_id
26
26
# Note: Database instance and Key Protect must be created in the same region when using BYOK
27
27
# See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok
@@ -75,7 +75,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
75
75
# #############################################################################
76
76
77
77
module "cbr_zone" {
78
- source = " git::https://github.com/terraform-ibm-modules/terraform-ibm-cbr//modules/cbr-zone-module?ref=v1.30 .0"
78
+ source = " git::https://github.com/terraform-ibm-modules/terraform-ibm-cbr//modules/cbr-zone-module?ref=v1.31 .0"
79
79
name = " ${ var . prefix } -VPC-network-zone"
80
80
zone_description = " CBR Network zone representing VPC"
81
81
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
39
39
# #############################################################################
40
40
module "cbr_zone" {
41
41
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
42
- version = " 1.30 .0"
42
+ version = " 1.31 .0"
43
43
name = " ${ var . prefix } -VPC-network-zone"
44
44
zone_description = " CBR Network zone representing VPC"
45
45
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -308,7 +308,7 @@ resource "ibm_resource_tag" "rabbitmq_tag" {
308
308
# #############################################################################
309
309
module "cbr_rule" {
310
310
count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
311
- source = " git::https://github.com/terraform-ibm-modules/terraform-ibm-cbr//modules/cbr-rule-module?ref=v1.30 .0"
311
+ source = " git::https://github.com/terraform-ibm-modules/terraform-ibm-cbr//modules/cbr-rule-module?ref=v1.31 .0"
312
312
rule_description = var. cbr_rules [count . index ]. description
313
313
enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
314
314
rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -32,7 +32,7 @@ module "kms" {
32
32
}
33
33
count = local. create_new_kms_key ? 1 : 0
34
34
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
35
- version = " 5.0.0 "
35
+ version = " 5.0.1 "
36
36
create_key_protect_instance = false
37
37
region = local. kms_region
38
38
existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -392,7 +392,7 @@ module "secrets_manager_service_credentials" {
392
392
count = length (local. service_credential_secrets ) > 0 ? 1 : 0
393
393
depends_on = [time_sleep . wait_for_rabbitmq_authorization_policy ]
394
394
source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
395
- version = " 2.1.1 "
395
+ version = " 2.2.0 "
396
396
existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
397
397
existing_sm_instance_region = local. existing_secrets_manager_instance_region
398
398
endpoint_type = var. existing_secrets_manager_endpoint_type
You can’t perform that action at this time.
0 commit comments