44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.4.3 "
7+ version = " 1.4.5 "
88 existing_resource_group_name = var. existing_resource_group_name
99}
1010
@@ -16,15 +16,15 @@ module "resource_group" {
1616module "existing_kms_crn_parser" {
1717 count = var. existing_kms_instance_crn != null ? 1 : 0
1818 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19- version = " 1.3.3 "
19+ version = " 1.3.4 "
2020 crn = var. existing_kms_instance_crn
2121}
2222
2323# If existing KMS root key CRN passed, parse details from it
2424module "existing_kms_key_crn_parser" {
2525 count = var. existing_kms_root_key_crn != null ? 1 : 0
2626 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
27- version = " 1.3.3 "
27+ version = " 1.3.4 "
2828 crn = var. existing_kms_root_key_crn
2929}
3030
@@ -63,7 +63,7 @@ module "kms" {
6363 }
6464 count = local. create_kms_keys ? 1 : 0
6565 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
66- version = " 5.5.3 "
66+ version = " 5.5.4 "
6767 create_key_protect_instance = false
6868 region = local. kms_region
6969 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -96,7 +96,7 @@ module "kms" {
9696module "cos_kms_key_crn_parser" {
9797 count = (local. create_kms_keys || var. existing_kms_root_key_crn != null ) ? 1 : 0
9898 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
99- version = " 1.3.3 "
99+ version = " 1.3.4 "
100100 crn = local. cos_kms_key_crn
101101}
102102
@@ -190,7 +190,7 @@ resource "ibm_iam_authorization_policy" "en_kms_policy" {
190190module "existing_cos_crn_parser" {
191191 count = var. existing_cos_instance_crn != null ? 1 : 0
192192 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
193- version = " 1.3.3 "
193+ version = " 1.3.4 "
194194 crn = var. existing_cos_instance_crn
195195}
196196
@@ -236,7 +236,7 @@ locals {
236236module "cos_buckets" {
237237 count = var. enable_collecting_failed_events && var. existing_event_notifications_instance_crn == null ? 1 : 0
238238 source = " terraform-ibm-modules/cos/ibm//modules/buckets"
239- version = " 10.7.0 "
239+ version = " 10.7.2 "
240240 bucket_configs = local. bucket_config
241241}
242242
@@ -248,7 +248,7 @@ module "cos_buckets" {
248248module "existing_en_crn_parser" {
249249 count = var. existing_event_notifications_instance_crn != null ? 1 : 0
250250 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
251- version = " 1.3.3 "
251+ version = " 1.3.4 "
252252 crn = var. existing_event_notifications_instance_crn
253253}
254254
@@ -307,7 +307,7 @@ module "event_notifications" {
307307module "existing_sm_crn_parser" {
308308 count = var. existing_secrets_manager_instance_crn != null ? 1 : 0
309309 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
310- version = " 1.3.3 "
310+ version = " 1.3.4 "
311311 crn = var. existing_secrets_manager_instance_crn
312312}
313313
@@ -361,7 +361,7 @@ module "secrets_manager_service_credentials" {
361361 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
362362 depends_on = [time_sleep . wait_for_en_authorization_policy ]
363363 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
364- version = " 2.12.3 "
364+ version = " 2.12.4 "
365365 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
366366 existing_sm_instance_region = local. existing_secrets_manager_instance_region
367367 endpoint_type = var. existing_secrets_manager_endpoint_type
0 commit comments