Skip to content

Commit a7ec791

Browse files
fix(deps): update dependencies (#520)
1 parent d87e70c commit a7ec791

File tree

10 files changed

+21
-21
lines changed

10 files changed

+21
-21
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -114,9 +114,9 @@ You need the following permissions to run this module.
114114

115115
| Name | Source | Version |
116116
|------|--------|---------|
117-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.35.10 |
118-
| <a name="module_es_guid_crn_parser"></a> [es\_guid\_crn\_parser](#module\_es\_guid\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.7 |
119-
| <a name="module_kms_key_crn_parser"></a> [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.3.7 |
117+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.35.11 |
118+
| <a name="module_es_guid_crn_parser"></a> [es\_guid\_crn\_parser](#module\_es\_guid\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.4.1 |
119+
| <a name="module_kms_key_crn_parser"></a> [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.4.1 |
120120

121121
### Resources
122122

examples/fscloud/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3838
##############################################################################
3939
module "cbr_vpc_zone" {
4040
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
41-
version = "1.35.10"
41+
version = "1.35.11"
4242
name = "${var.prefix}-VPC-network-zone"
4343
zone_description = "CBR Network zone representing VPC"
4444
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -50,7 +50,7 @@ module "cbr_vpc_zone" {
5050

5151
module "cbr_zone_schematics" {
5252
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
53-
version = "1.35.10"
53+
version = "1.35.11"
5454
name = "${var.prefix}-schematics-zone"
5555
zone_description = "CBR Network zone containing Schematics"
5656
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id

main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ resource "ibm_resource_instance" "es_instance" {
5858
module "kms_key_crn_parser" {
5959
count = var.kms_encryption_enabled == true ? 1 : 0
6060
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
61-
version = "1.3.7"
61+
version = "1.4.1"
6262
crn = var.kms_key_crn
6363
}
6464

@@ -171,7 +171,7 @@ resource "time_sleep" "wait_for_kms_authorization_policy" {
171171
module "es_guid_crn_parser" {
172172
count = var.mirroring != null ? 1 : 0
173173
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
174-
version = "1.3.7"
174+
version = "1.4.1"
175175
crn = var.mirroring.source_crn
176176
}
177177

@@ -200,7 +200,7 @@ resource "time_sleep" "wait_for_es_s2s_policy" {
200200
module "cbr_rule" {
201201
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
202202
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
203-
version = "1.35.10"
203+
version = "1.35.11"
204204
rule_description = var.cbr_rules[count.index].description
205205
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
206206
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/quickstart/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ module "event_streams" {
3838
module "existing_sm_crn_parser" {
3939
count = var.existing_secrets_manager_instance_crn != null ? 1 : 0
4040
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
41-
version = "1.3.7"
41+
version = "1.4.1"
4242
crn = var.existing_secrets_manager_instance_crn
4343
}
4444

@@ -92,7 +92,7 @@ module "secrets_manager_service_credentials" {
9292
count = length(local.service_credential_secrets) > 0 ? 1 : 0
9393
depends_on = [time_sleep.wait_for_en_authorization_policy]
9494
source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
95-
version = "2.12.18"
95+
version = "2.12.21"
9696
existing_sm_instance_guid = local.existing_secrets_manager_instance_guid
9797
existing_sm_instance_region = local.existing_secrets_manager_instance_region
9898
endpoint_type = var.existing_secrets_manager_endpoint_type

solutions/quickstart/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
ibm = {
66
source = "IBM-Cloud/ibm"
7-
version = "1.87.1"
7+
version = "1.87.2"
88
}
99
time = {
1010
source = "hashicorp/time"

solutions/security-enforced/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -40,14 +40,14 @@ data "ibm_iam_account_settings" "iam_account_settings" {
4040
module "kms_instance_crn_parser" {
4141
count = var.existing_kms_instance_crn != null ? 1 : 0
4242
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
43-
version = "1.3.7"
43+
version = "1.4.1"
4444
crn = var.existing_kms_instance_crn
4545
}
4646

4747
module "kms_key_crn_parser" {
4848
count = var.existing_kms_key_crn != null ? 1 : 0
4949
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
50-
version = "1.3.7"
50+
version = "1.4.1"
5151
crn = var.existing_kms_key_crn
5252
}
5353

@@ -105,7 +105,7 @@ module "kms" {
105105
}
106106
count = var.existing_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
107107
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
108-
version = "5.5.21"
108+
version = "5.5.22"
109109
create_key_protect_instance = false
110110
region = local.kms_region
111111
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -170,7 +170,7 @@ module "event_streams" {
170170
module "existing_sm_crn_parser" {
171171
count = var.existing_secrets_manager_instance_crn != null ? 1 : 0
172172
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
173-
version = "1.3.7"
173+
version = "1.4.1"
174174
crn = var.existing_secrets_manager_instance_crn
175175
}
176176

@@ -224,7 +224,7 @@ module "secrets_manager_service_credentials" {
224224
count = length(local.service_credential_secrets) > 0 ? 1 : 0
225225
depends_on = [time_sleep.wait_for_en_authorization_policy]
226226
source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
227-
version = "2.12.18"
227+
version = "2.12.21"
228228
existing_sm_instance_guid = local.existing_secrets_manager_instance_guid
229229
existing_sm_instance_region = local.existing_secrets_manager_instance_region
230230
endpoint_type = var.existing_secrets_manager_endpoint_type

solutions/security-enforced/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
ibm = {
66
source = "IBM-Cloud/ibm"
7-
version = "1.87.1"
7+
version = "1.87.2"
88
}
99
time = {
1010
source = "hashicorp/time"

tests/go.mod

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ go 1.25.5
55
require (
66
github.com/IBM/go-sdk-core/v5 v5.21.2
77
github.com/stretchr/testify v1.11.1
8-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.65.2
8+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.66.0
99
)
1010

1111
require (

tests/go.sum

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -297,8 +297,8 @@ github.com/stretchr/testify v1.8.0/go.mod h1:yNjHg4UonilssWZ8iaSj1OCr/vHnekPRkoO
297297
github.com/stretchr/testify v1.8.2/go.mod h1:w2LPCIKwWwSfY2zedu0+kehJoqGctiVI29o6fzry7u4=
298298
github.com/stretchr/testify v1.11.1 h1:7s2iGBzp5EwR7/aIZr8ao5+dra3wiQyKjjFuvgVKu7U=
299299
github.com/stretchr/testify v1.11.1/go.mod h1:wZwfW3scLgRK+23gO65QZefKpKQRnfz6sD981Nm4B6U=
300-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.65.2 h1:jJT3ARq0MNm8N3qYQy9VtugSLt68zBfVUj1Poi1LiOE=
301-
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.65.2/go.mod h1:8HqpvEsxvfkL1LXqLyxPfV6n12M0b6Foj9DsNRy7mi0=
300+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.66.0 h1:FLJOt0WAekT6VxMXA5sAjs+GWj4E7zv77odCZcPjY2U=
301+
github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.66.0/go.mod h1:8HqpvEsxvfkL1LXqLyxPfV6n12M0b6Foj9DsNRy7mi0=
302302
github.com/tidwall/pretty v1.0.0/go.mod h1:XNkn88O1ChpSDQmQeStsy+sBenx6DDtFZJxhVysOjyk=
303303
github.com/tmccombs/hcl2json v0.6.4 h1:/FWnzS9JCuyZ4MNwrG4vMrFrzRgsWEOVi+1AyYUVLGw=
304304
github.com/tmccombs/hcl2json v0.6.4/go.mod h1:+ppKlIW3H5nsAsZddXPy2iMyvld3SHxyjswOZhavRDk=

0 commit comments

Comments
 (0)