Skip to content

Commit f585fc2

Browse files
fix(deps): update terraform-module
1 parent 0e330a3 commit f585fc2

File tree

9 files changed

+24
-24
lines changed

9 files changed

+24
-24
lines changed

README.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -243,12 +243,12 @@ Optionally, you need the following permissions to attach Access Management tags
243243
244244
| Name | Source | Version |
245245
|------|--------|---------|
246-
| <a name="module_attach_sg_to_api_vpe"></a> [attach\_sg\_to\_api\_vpe](#module\_attach\_sg\_to\_api\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
247-
| <a name="module_attach_sg_to_lb"></a> [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
248-
| <a name="module_attach_sg_to_master_vpe"></a> [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
249-
| <a name="module_attach_sg_to_registry_vpe"></a> [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.6.2 |
246+
| <a name="module_attach_sg_to_api_vpe"></a> [attach\_sg\_to\_api\_vpe](#module\_attach\_sg\_to\_api\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
247+
| <a name="module_attach_sg_to_lb"></a> [attach\_sg\_to\_lb](#module\_attach\_sg\_to\_lb) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
248+
| <a name="module_attach_sg_to_master_vpe"></a> [attach\_sg\_to\_master\_vpe](#module\_attach\_sg\_to\_master\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
249+
| <a name="module_attach_sg_to_registry_vpe"></a> [attach\_sg\_to\_registry\_vpe](#module\_attach\_sg\_to\_registry\_vpe) | terraform-ibm-modules/security-group/ibm | 2.7.0 |
250250
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
251-
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.20 |
251+
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | terraform-ibm-modules/cos/ibm | 8.21.21 |
252252
253253
### Resources
254254

examples/advanced/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ locals {
2222

2323
module "kp_all_inclusive" {
2424
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
25-
version = "5.0.2"
25+
version = "5.1.2"
2626
key_protect_instance_name = "${var.prefix}-kp-instance"
2727
resource_group_id = module.resource_group.resource_group_id
2828
region = var.region
@@ -223,7 +223,7 @@ module "observability_instances" {
223223

224224
module "trusted_profile" {
225225
source = "terraform-ibm-modules/trusted-profile/ibm"
226-
version = "2.2.0"
226+
version = "2.3.0"
227227
trusted_profile_name = "${var.prefix}-profile"
228228
trusted_profile_description = "Logs agent Trusted Profile"
229229
# As a `Sender`, you can send logs to your IBM Cloud Logs service instance - but not query or tail logs. This role is meant to be used by agents and routers sending logs.
@@ -248,7 +248,7 @@ module "trusted_profile" {
248248
module "observability_agents" {
249249
depends_on = [module.kube_audit]
250250
source = "terraform-ibm-modules/observability-agents/ibm"
251-
version = "2.7.0"
251+
version = "2.7.2"
252252
cluster_id = module.ocp_base.cluster_id
253253
cluster_resource_group_id = module.resource_group.resource_group_id
254254
# Cloud Logs agent

examples/custom_sg/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ locals {
8585
module "custom_sg" {
8686
for_each = toset(["custom-cluster-sg", "custom-worker-pool-sg", "custom-lb-sg", "custom-master-vpe-sg", "custom-registry-vpe-sg", "custom-kube-api-vpe-sg"])
8787
source = "terraform-ibm-modules/security-group/ibm"
88-
version = "2.6.2"
88+
version = "2.7.0"
8989
add_ibm_cloud_internal_rules = false
9090
security_group_name = each.key
9191
security_group_rules = []

examples/fscloud/main.tf

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "cos_fscloud" {
1818
source = "terraform-ibm-modules/cos/ibm"
19-
version = "8.21.20"
19+
version = "8.21.21"
2020
resource_group_id = module.resource_group.resource_group_id
2121
create_cos_bucket = false
2222
cos_instance_name = "${var.prefix}-cos"
@@ -30,7 +30,7 @@ module "cos_fscloud" {
3030

3131
module "flowlogs_bucket" {
3232
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
33-
version = "8.21.20"
33+
version = "8.21.21"
3434

3535
bucket_configs = [
3636
{
@@ -52,7 +52,7 @@ module "flowlogs_bucket" {
5252
module "vpc" {
5353
depends_on = [module.flowlogs_bucket]
5454
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
55-
version = "7.23.5"
55+
version = "7.23.7"
5656
resource_group_id = module.resource_group.resource_group_id
5757
region = var.region
5858
prefix = var.prefix
@@ -225,7 +225,7 @@ locals {
225225
module "custom_sg" {
226226
for_each = toset(["custom-lb-sg"])
227227
source = "terraform-ibm-modules/security-group/ibm"
228-
version = "2.6.2"
228+
version = "2.7.0"
229229
add_ibm_cloud_internal_rules = false
230230
security_group_name = each.key
231231
security_group_rules = []

examples/multiple_mzr_clusters/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -188,7 +188,7 @@ module "observability_instances" {
188188

189189
module "observability_agents_1" {
190190
source = "terraform-ibm-modules/observability-agents/ibm"
191-
version = "2.7.0"
191+
version = "2.7.2"
192192
providers = {
193193
helm = helm.helm_cluster_1
194194
}
@@ -201,7 +201,7 @@ module "observability_agents_1" {
201201

202202
module "observability_agents_2" {
203203
source = "terraform-ibm-modules/observability-agents/ibm"
204-
version = "2.7.0"
204+
version = "2.7.2"
205205
providers = {
206206
helm = helm.helm_cluster_2
207207
}

main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -108,7 +108,7 @@ module "cos_instance" {
108108
count = var.enable_registry_storage && !var.use_existing_cos ? 1 : 0
109109

110110
source = "terraform-ibm-modules/cos/ibm"
111-
version = "8.21.20"
111+
version = "8.21.21"
112112
cos_instance_name = local.cos_name
113113
resource_group_id = var.resource_group_id
114114
cos_plan = local.cos_plan
@@ -628,7 +628,7 @@ module "attach_sg_to_lb" {
628628
depends_on = [null_resource.confirm_lb_active]
629629
count = length(var.additional_lb_security_group_ids)
630630
source = "terraform-ibm-modules/security-group/ibm"
631-
version = "2.6.2"
631+
version = "2.7.0"
632632
existing_security_group_id = var.additional_lb_security_group_ids[count.index]
633633
use_existing_security_group_id = true
634634
target_ids = [for index in range(var.number_of_lbs) : local.lbs_associated_with_cluster[index]] # number_of_lbs is necessary to give a static number of elements to tf to accomplish the apply when the cluster does not initially exists
@@ -679,7 +679,7 @@ locals {
679679
module "attach_sg_to_master_vpe" {
680680
count = length(var.additional_vpe_security_group_ids["master"])
681681
source = "terraform-ibm-modules/security-group/ibm"
682-
version = "2.6.2"
682+
version = "2.7.0"
683683
existing_security_group_id = var.additional_vpe_security_group_ids["master"][count.index]
684684
use_existing_security_group_id = true
685685
target_ids = [local.master_vpe_id]
@@ -688,7 +688,7 @@ module "attach_sg_to_master_vpe" {
688688
module "attach_sg_to_api_vpe" {
689689
count = length(var.additional_vpe_security_group_ids["api"])
690690
source = "terraform-ibm-modules/security-group/ibm"
691-
version = "2.6.2"
691+
version = "2.7.0"
692692
existing_security_group_id = var.additional_vpe_security_group_ids["api"][count.index]
693693
use_existing_security_group_id = true
694694
target_ids = [local.api_vpe_id]
@@ -697,7 +697,7 @@ module "attach_sg_to_api_vpe" {
697697
module "attach_sg_to_registry_vpe" {
698698
count = length(var.additional_vpe_security_group_ids["registry"])
699699
source = "terraform-ibm-modules/security-group/ibm"
700-
version = "2.6.2"
700+
version = "2.7.0"
701701
existing_security_group_id = var.additional_vpe_security_group_ids["registry"][count.index]
702702
use_existing_security_group_id = true
703703
target_ids = [local.registry_vpe_id]

solutions/fully-configurable/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ The following resources are provisioned by this example:
2727
| <a name="module_existing_cluster_kms_key_crn_parser"></a> [existing\_cluster\_kms\_key\_crn\_parser](#module\_existing\_cluster\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
2828
| <a name="module_existing_kms_crn_parser"></a> [existing\_kms\_crn\_parser](#module\_existing\_kms\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
2929
| <a name="module_existing_vpc_crn_parser"></a> [existing\_vpc\_crn\_parser](#module\_existing\_vpc\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
30-
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.0.2 |
30+
| <a name="module_kms"></a> [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.2 |
3131
| <a name="module_ocp_base"></a> [ocp\_base](#module\_ocp\_base) | ../.. | n/a |
3232
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
3333

solutions/fully-configurable/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -95,7 +95,7 @@ module "kms" {
9595
}
9696
count = (var.kms_encryption_enabled_boot_volume && var.existing_boot_volume_kms_key_crn == null) || (var.kms_encryption_enabled_cluster && var.existing_cluster_kms_key_crn == null) ? 1 : 0
9797
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
98-
version = "5.0.2"
98+
version = "5.1.2"
9999
create_key_protect_instance = false
100100
region = local.cluster_kms_region
101101
existing_kms_instance_crn = var.existing_kms_instance_crn

tests/existing-resources/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ module "resource_group" {
1414

1515
module "vpc" {
1616
source = "terraform-ibm-modules/landing-zone-vpc/ibm"
17-
version = "7.23.5"
17+
version = "7.23.7"
1818
resource_group_id = module.resource_group.resource_group_id
1919
region = var.region
2020
name = "vpc"
@@ -38,7 +38,7 @@ module "vpc" {
3838

3939
module "cos" {
4040
source = "terraform-ibm-modules/cos/ibm"
41-
version = "8.21.20"
41+
version = "8.21.21"
4242
resource_group_id = module.resource_group.resource_group_id
4343
region = var.region
4444
cos_instance_name = "${var.prefix}-cos"

0 commit comments

Comments
 (0)