Skip to content

Commit 428a4b4

Browse files
fix(deps): update terraform dependencies (#727)
1 parent 8a4f25b commit 428a4b4

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -250,7 +250,7 @@ Optionally, you need the following permissions to attach Access Management tags
250250
| <a name="module_attach_sg_to_lb"></a> [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
251251
| <a name="module_attach_sg_to_master_vpe"></a> [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
252252
| <a name="module_attach_sg_to_registry_vpe"></a> [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
253-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.2 |
253+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.3 |
254254
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.25 |
255255
| <a name="module_existing_secrets_manager_instance_parser"></a> [existing\_secrets\_manager\_instance\_parser](#module\_existing\_secrets\_manager\_instance\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
256256

examples/advanced/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ locals {
2222

2323
module "kp_all_inclusive" {
2424
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
25-
version = "5.1.9"
25+
version = "5.1.10"
2626
key_protect_instance_name = "${var.prefix}-kp-instance"
2727
resource_group_id = module.resource_group.resource_group_id
2828
region = var.region

examples/fscloud/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -112,7 +112,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
112112

113113
module "cbr_vpc_zone" {
114114
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
115-
version = "1.32.2"
115+
version = "1.32.3"
116116
name = "${var.prefix}-VPC-network-zone"
117117
zone_description = "CBR Network zone representing VPC"
118118
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -124,7 +124,7 @@ module "cbr_vpc_zone" {
124124

125125
module "cbr_zone_schematics" {
126126
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
127-
version = "1.32.2"
127+
version = "1.32.3"
128128
name = "${var.prefix}-schematics-zone"
129129
zone_description = "CBR Network zone containing Schematics"
130130
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -139,7 +139,7 @@ module "cbr_zone_schematics" {
139139

140140
module "cbr_rules" {
141141
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
142-
version = "1.32.2"
142+
version = "1.32.3"
143143
rule_description = "${var.prefix} rule for vpc flow log access to cos"
144144
enforcement_mode = "enabled"
145145
resources = [{

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -695,7 +695,7 @@ locals {
695695
module "cbr_rule" {
696696
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
697697
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
698-
version = "1.32.2"
698+
version = "1.32.3"
699699
rule_description = var.cbr_rules[count.index].description
700700
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
701701
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ module "kms" {
9595
}
9696
count = (var.kms_encryption_enabled_boot_volume && var.existing_boot_volume_kms_key_crn == null) || (var.kms_encryption_enabled_cluster && var.existing_cluster_kms_key_crn == null) ? 1 : 0
9797
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
98-
version = "5.1.9"
98+
version = "5.1.10"
9999
create_key_protect_instance = false
100100
region = local.cluster_kms_region
101101
existing_kms_instance_crn = var.existing_kms_instance_crn

0 commit comments

Comments
 (0)