File tree Expand file tree Collapse file tree 5 files changed +7
-7
lines changed Expand file tree Collapse file tree 5 files changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -68,7 +68,7 @@ You need the following permissions to run this module.
6868
6969|  Name |  Source |  Version | 
7070| ------| --------| ---------| 
71- |  <a  name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule )  |  terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module |  1.24.0  | 
71+ |  <a  name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule )  |  terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module |  1.24.1  | 
7272
7373### Resources  
7474
Original file line number Diff line number Diff line change @@ -20,7 +20,7 @@ module "resource_group" {
2020
2121module  "key_protect_all_inclusive"  {
2222  source             =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
23-   version            =  " 4.15.9 " 
23+   version            =  " 4.15.11 " 
2424  resource_group_id  =   module. resource_group . resource_group_id 
2525  #  Only us-south, eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
2626  #  Note: Database instance and Key Protect must be created on the same region.
@@ -73,7 +73,7 @@ module "icd_elasticsearch" {
7373#  Create Secrets Manager Instance (if not using existing one)
7474module  "secrets_manager"  {
7575  source                =  " terraform-ibm-modules/secrets-manager/ibm" 
76-   version               =  " 1.17.10 " 
76+   version               =  " 1.17.12 " 
7777  resource_group_id     =   module. resource_group . resource_group_id 
7878  region                =   var. region 
7979  secrets_manager_name  =  " ${ var . prefix } -secrets-manager" 
Original file line number Diff line number Diff line change @@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3939# #############################################################################
4040module  "cbr_zone"  {
4141  source            =  " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" 
42-   version           =  " 1.24.0 " 
42+   version           =  " 1.24.1 " 
4343  name              =  " ${ var . prefix } -VPC-network-zone" 
4444  zone_description  =  " CBR Network zone containing VPC" 
4545  account_id        =   data. ibm_iam_account_settings . iam_account_settings . account_id 
Original file line number Diff line number Diff line change @@ -195,7 +195,7 @@ resource "ibm_resource_tag" "elasticsearch_tag" {
195195module  "cbr_rule"  {
196196  count             =  length (var. cbr_rules ) >  0  ?  length (var. cbr_rules ) :  0 
197197  source            =  " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" 
198-   version           =  " 1.24.0 " 
198+   version           =  " 1.24.1 " 
199199  rule_description  =   var. cbr_rules [count . index ]. description 
200200  enforcement_mode  =   var. cbr_rules [count . index ]. enforcement_mode 
201201  rule_contexts     =   var. cbr_rules [count . index ]. rule_contexts 
Original file line number Diff line number Diff line change @@ -67,7 +67,7 @@ module "kms" {
6767  }
6868  count                        =   var. existing_kms_key_crn  !=  null  ||  local. use_existing_db_instance  ?  0  :  1  #  no need to create any KMS resources if passing an existing key
6969  source                       =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
70-   version                      =  " 4.15.9 " 
70+   version                      =  " 4.15.11 " 
7171  create_key_protect_instance  =  false 
7272  region                       =   local. existing_kms_instance_region 
7373  existing_kms_instance_crn    =   var. existing_kms_instance_crn 
@@ -175,7 +175,7 @@ module "secrets_manager_service_credentials" {
175175  count                        =  length (local. service_credential_secrets ) >  0  ?  1  :  0 
176176  depends_on                   =   [time_sleep . wait_for_es_authorization_policy ]
177177  source                       =  " terraform-ibm-modules/secrets-manager/ibm//modules/secrets" 
178-   version                      =  " 1.17.10 " 
178+   version                      =  " 1.17.12 " 
179179  existing_sm_instance_guid    =   local. existing_secrets_manager_instance_guid 
180180  existing_sm_instance_region  =   local. existing_secrets_manager_instance_region 
181181  endpoint_type                =   var. existing_secrets_manager_endpoint_type 
    
 
   
 
     
   
   
          
     
  
    
     
 
    
      
     
 
     
    You can’t perform that action at this time.
  
 
    
  
     
    
      
        
     
 
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments