File tree Expand file tree Collapse file tree 4 files changed +7
-7
lines changed Expand file tree Collapse file tree 4 files changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -21,7 +21,7 @@ locals {
2121
2222module "key_protect_all_inclusive" {
2323 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
24- version = " 5.0.1 "
24+ version = " 5.0.2 "
2525 resource_group_id = module. resource_group . resource_group_id
2626 region = var. region
2727 key_protect_instance_name = " ${ var . prefix } -kp"
@@ -45,7 +45,7 @@ locals {
4545
4646module "cos" {
4747 source = " terraform-ibm-modules/cos/ibm"
48- version = " 8.21.16 "
48+ version = " 8.21.20 "
4949 resource_group_id = module. resource_group . resource_group_id
5050 region = var. region
5151 cos_instance_name = " ${ var . prefix } -cos"
Original file line number Diff line number Diff line change @@ -77,7 +77,7 @@ locals {
7777
7878module "cos" {
7979 source = " terraform-ibm-modules/cos/ibm//modules/fscloud"
80- version = " 8.21.16 "
80+ version = " 8.21.20 "
8181 resource_group_id = module. resource_group . resource_group_id
8282 create_cos_instance = true
8383 cos_instance_name = " ${ var . prefix } -cos"
Original file line number Diff line number Diff line change @@ -197,7 +197,7 @@ module "kms" {
197197 }
198198 count = local. create_kms_keys ? 1 : 0
199199 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
200- version = " 5.0.1 "
200+ version = " 5.0.2 "
201201 create_key_protect_instance = false
202202 region = local. kms_region
203203 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -237,7 +237,7 @@ locals {
237237module "cos" {
238238 count = local. create_cos_bucket ? 1 : 0
239239 source = " terraform-ibm-modules/cos/ibm"
240- version = " 8.21.16 "
240+ version = " 8.21.20 "
241241 create_cos_instance = var. existing_cos_instance_crn == null ? true : false
242242 create_cos_bucket = local. create_cos_bucket
243243 existing_cos_instance_id = var. existing_cos_instance_crn
@@ -378,7 +378,7 @@ module "secrets_manager_service_credentials" {
378378 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
379379 depends_on = [time_sleep . wait_for_en_authorization_policy ]
380380 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
381- version = " 2.2.1 "
381+ version = " 2.2.6 "
382382 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
383383 existing_sm_instance_region = local. existing_secrets_manager_instance_region
384384 endpoint_type = var. existing_secrets_manager_endpoint_type
Original file line number Diff line number Diff line change @@ -18,7 +18,7 @@ module "event_notification" {
1818
1919module "cos" {
2020 source = " terraform-ibm-modules/cos/ibm"
21- version = " 8.21.16 "
21+ version = " 8.21.20 "
2222 resource_group_id = module. resource_group . resource_group_id
2323 region = var. region
2424 cos_instance_name = " ${ var . prefix } -cos"
You can’t perform that action at this time.
0 commit comments