Skip to content

Commit 63e57ed

Browse files
fix(deps): update dependencies
1 parent dcedbd5 commit 63e57ed

File tree

13 files changed

+34
-31
lines changed

13 files changed

+34
-31
lines changed

.github/workflows/ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ on:
88

99
jobs:
1010
call-terraform-ci-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.22.5
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-terraform-module-ci-v2.yml@v1.23.2
1212
secrets: inherit
1313
with:
1414
craSCCv2: true

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-release-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.22.5
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/common-release.yml@v1.23.2
1212
secrets: inherit

.secrets.baseline

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "go.sum|^.secrets.baseline$|^../.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2024-03-27T22:08:26Z",
6+
"generated_at": "2025-10-04T05:52:37Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"
@@ -77,7 +77,7 @@
7777
}
7878
],
7979
"results": {},
80-
"version": "0.13.1+ibm.62.dss",
80+
"version": "0.13.1+ibm.64.dss",
8181
"word_list": {
8282
"file": null,
8383
"hash": null

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ You need the following permissions to run this module.
7272

7373
| Name | Source | Version |
7474
|------|--------|---------|
75-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.2 |
75+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.3 |
7676
| <a name="module_kms_key_crn_parser"></a> [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
7777
| <a name="module_secrets"></a> [secrets](#module\_secrets) | ./modules/secrets | n/a |
7878

examples/advanced/main.tf

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "key_protect" {
1818
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
19-
version = "5.1.25"
19+
version = "5.3.1"
2020
key_protect_instance_name = "${var.prefix}-key-protect"
2121
resource_group_id = module.resource_group.resource_group_id
2222
region = var.region
@@ -39,7 +39,7 @@ module "key_protect" {
3939

4040
module "event_notifications" {
4141
source = "terraform-ibm-modules/event-notifications/ibm"
42-
version = "2.7.0"
42+
version = "2.8.2"
4343
resource_group_id = module.resource_group.resource_group_id
4444
name = "${var.prefix}-en"
4545
tags = var.resource_tags
@@ -124,7 +124,7 @@ module "secrets_manager" {
124124
# Create new code engine project
125125
module "code_engine_project" {
126126
source = "terraform-ibm-modules/code-engine/ibm//modules/project"
127-
version = "4.5.13"
127+
version = "4.6.0"
128128
name = "${var.prefix}-project"
129129
resource_group_id = module.resource_group.resource_group_id
130130
}
@@ -137,7 +137,7 @@ locals {
137137

138138
module "code_engine_secret" {
139139
source = "terraform-ibm-modules/code-engine/ibm//modules/secret"
140-
version = "4.5.13"
140+
version = "4.6.0"
141141
name = "${var.prefix}-rs"
142142
project_id = module.code_engine_project.id
143143
format = "registry"
@@ -157,7 +157,7 @@ resource "ibm_cr_namespace" "rg_namespace" {
157157
# Build example Go application in Code Engine project which dynamically generates User IBM Cloud IAM API Keys
158158
module "code_engine_build" {
159159
source = "terraform-ibm-modules/code-engine/ibm//modules/build"
160-
version = "4.5.13"
160+
version = "4.6.0"
161161
name = "${var.prefix}-build"
162162
region = var.region
163163
ibmcloud_api_key = var.ibmcloud_api_key
@@ -186,7 +186,7 @@ locals {
186186
module "code_engine_job" {
187187
depends_on = [module.code_engine_build]
188188
source = "terraform-ibm-modules/code-engine/ibm//modules/job"
189-
version = "4.5.13"
189+
version = "4.6.0"
190190
name = "${var.prefix}-job"
191191
image_reference = local.output_image
192192
image_secret = module.code_engine_secret.name
@@ -207,7 +207,7 @@ module "code_engine_job" {
207207
module "custom_credential_engine" {
208208
depends_on = [module.secrets_manager, module.code_engine_job]
209209
source = "terraform-ibm-modules/secrets-manager-custom-credentials-engine/ibm"
210-
version = "1.0.1"
210+
version = "1.0.3"
211211
secrets_manager_guid = module.secrets_manager.secrets_manager_guid
212212
secrets_manager_region = module.secrets_manager.secrets_manager_region
213213
custom_credential_engine_name = "${var.prefix}-test-custom-engine"

examples/fscloud/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
2020

2121
module "cbr_zone_schematics" {
2222
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
23-
version = "1.33.2"
23+
version = "1.33.3"
2424
name = "${var.prefix}-schematics-zone"
2525
zone_description = "CBR Network zone containing Schematics"
2626
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -39,7 +39,7 @@ module "cbr_zone_schematics" {
3939

4040
module "event_notification" {
4141
source = "terraform-ibm-modules/event-notifications/ibm"
42-
version = "2.7.0"
42+
version = "2.8.2"
4343
resource_group_id = module.resource_group.resource_group_id
4444
name = "${var.prefix}-en"
4545
tags = var.resource_tags

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -163,7 +163,7 @@ locals {
163163
module "cbr_rule" {
164164
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
165165
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
166-
version = "1.33.2"
166+
version = "1.33.3"
167167
rule_description = var.cbr_rules[count.index].description
168168
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
169169
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -130,7 +130,7 @@ module "kms" {
130130
}
131131
count = var.existing_secrets_manager_crn == null && var.kms_encryption_enabled && var.existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
132132
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
133-
version = "5.1.25"
133+
version = "5.3.1"
134134
create_key_protect_instance = false
135135
region = local.kms_region
136136
existing_kms_instance_crn = var.existing_kms_instance_crn

solutions/fully-configurable/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
ibm = {
66
source = "IBM-Cloud/ibm"
7-
version = "1.82.1"
7+
version = "1.83.1"
88
}
99
time = {
1010
source = "hashicorp/time"

0 commit comments

Comments
 (0)