File tree Expand file tree Collapse file tree 6 files changed +8
-8
lines changed
Expand file tree Collapse file tree 6 files changed +8
-8
lines changed Original file line number Diff line number Diff line change @@ -114,7 +114,7 @@ You need the following permissions to run this module.
114114
115115| Name | Source | Version |
116116| ------| --------| ---------|
117- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.35.11 |
117+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.35.12 |
118118| <a name =" module_es_guid_crn_parser " ></a > [ es\_ guid\_ crn\_ parser] ( #module\_ es\_ guid\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.4.1 |
119119| <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.4.1 |
120120
Original file line number Diff line number Diff line change @@ -38,7 +38,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3838# #############################################################################
3939module "cbr_vpc_zone" {
4040 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
41- version = " 1.35.11 "
41+ version = " 1.35.12 "
4242 name = " ${ var . prefix } -VPC-network-zone"
4343 zone_description = " CBR Network zone representing VPC"
4444 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
@@ -50,7 +50,7 @@ module "cbr_vpc_zone" {
5050
5151module "cbr_zone_schematics" {
5252 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
53- version = " 1.35.11 "
53+ version = " 1.35.12 "
5454 name = " ${ var . prefix } -schematics-zone"
5555 zone_description = " CBR Network zone containing Schematics"
5656 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -200,7 +200,7 @@ resource "time_sleep" "wait_for_es_s2s_policy" {
200200module "cbr_rule" {
201201 count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
202202 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
203- version = " 1.35.11 "
203+ version = " 1.35.12 "
204204 rule_description = var. cbr_rules [count . index ]. description
205205 enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
206206 rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -92,7 +92,7 @@ module "secrets_manager_service_credentials" {
9292 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
9393 depends_on = [time_sleep . wait_for_en_authorization_policy ]
9494 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
95- version = " 2.12.21 "
95+ version = " 2.12.22 "
9696 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
9797 existing_sm_instance_region = local. existing_secrets_manager_instance_region
9898 endpoint_type = var. existing_secrets_manager_endpoint_type
Original file line number Diff line number Diff line change @@ -105,7 +105,7 @@ module "kms" {
105105 }
106106 count = var. existing_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
107107 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
108- version = " 5.5.22 "
108+ version = " 5.5.23 "
109109 create_key_protect_instance = false
110110 region = local. kms_region
111111 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -224,7 +224,7 @@ module "secrets_manager_service_credentials" {
224224 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
225225 depends_on = [time_sleep . wait_for_en_authorization_policy ]
226226 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
227- version = " 2.12.21 "
227+ version = " 2.12.22 "
228228 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
229229 existing_sm_instance_region = local. existing_secrets_manager_instance_region
230230 endpoint_type = var. existing_secrets_manager_endpoint_type
You can’t perform that action at this time.
0 commit comments