@@ -40,14 +40,14 @@ data "ibm_iam_account_settings" "iam_account_settings" {
4040module "kms_instance_crn_parser" {
4141 count = var. existing_kms_instance_crn != null ? 1 : 0
4242 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
43- version = " 1.3.7 "
43+ version = " 1.4.1 "
4444 crn = var. existing_kms_instance_crn
4545}
4646
4747module "kms_key_crn_parser" {
4848 count = var. existing_kms_key_crn != null ? 1 : 0
4949 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
50- version = " 1.3.7 "
50+ version = " 1.4.1 "
5151 crn = var. existing_kms_key_crn
5252}
5353
@@ -105,7 +105,7 @@ module "kms" {
105105 }
106106 count = var. existing_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
107107 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
108- version = " 5.5.21 "
108+ version = " 5.5.22 "
109109 create_key_protect_instance = false
110110 region = local. kms_region
111111 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -170,7 +170,7 @@ module "event_streams" {
170170module "existing_sm_crn_parser" {
171171 count = var. existing_secrets_manager_instance_crn != null ? 1 : 0
172172 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
173- version = " 1.3.7 "
173+ version = " 1.4.1 "
174174 crn = var. existing_secrets_manager_instance_crn
175175}
176176
@@ -224,7 +224,7 @@ module "secrets_manager_service_credentials" {
224224 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
225225 depends_on = [time_sleep . wait_for_en_authorization_policy ]
226226 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
227- version = " 2.12.18 "
227+ version = " 2.12.21 "
228228 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
229229 existing_sm_instance_region = local. existing_secrets_manager_instance_region
230230 endpoint_type = var. existing_secrets_manager_endpoint_type
0 commit comments