File tree Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -35,7 +35,7 @@ locals {
3535
3636module "key_protect_all_inclusive" {
3737 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
38- version = " 4.20.0 "
38+ version = " 4.21.1 "
3939 resource_group_id = module. resource_group . resource_group_id
4040 # Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
4141 # Note: Database instance and Key Protect must be created on the same region.
@@ -95,7 +95,7 @@ module "icd_elasticsearch" {
9595module "secrets_manager" {
9696 count = var. existing_sm_instance_guid == null ? 1 : 0
9797 source = " terraform-ibm-modules/secrets-manager/ibm"
98- version = " 1.24.3 "
98+ version = " 1.25.1 "
9999 resource_group_id = module. resource_group . resource_group_id
100100 region = var. region
101101 secrets_manager_name = " ${ var . prefix } -secrets-manager"
Original file line number Diff line number Diff line change @@ -40,7 +40,7 @@ module "kms" {
4040 }
4141 count = local. create_new_kms_key
4242 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
43- version = " 4.20.0 "
43+ version = " 4.21.1 "
4444 create_key_protect_instance = false
4545 region = local. kms_region
4646 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -422,7 +422,7 @@ module "secrets_manager_service_credentials" {
422422 count = var. existing_secrets_manager_instance_crn == null ? 0 : 1
423423 depends_on = [time_sleep . wait_for_es_authorization_policy ]
424424 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
425- version = " 1.24.3 "
425+ version = " 1.25.1 "
426426 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
427427 existing_sm_instance_region = local. existing_secrets_manager_instance_region
428428 endpoint_type = var. existing_secrets_manager_endpoint_type
@@ -449,7 +449,7 @@ data "http" "es_metadata" {
449449module "code_engine_kibana" {
450450 count = var. enable_kibana_dashboard ? 1 : 0
451451 source = " terraform-ibm-modules/code-engine/ibm"
452- version = " 3.2.0 "
452+ version = " 3.2.1 "
453453 resource_group_id = module. resource_group . resource_group_id
454454 project_name = local. code_engine_project_name
455455 existing_project_id = local. code_engine_project_id
You can’t perform that action at this time.
0 commit comments