File tree Expand file tree Collapse file tree 5 files changed +6
-6
lines changed Expand file tree Collapse file tree 5 files changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -67,7 +67,7 @@ You need the following permissions to run this module.
6767
6868|  Name |  Source |  Version | 
6969| ------| --------| ---------| 
70- |  <a  name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule )  |  terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module |  1.22.2  | 
70+ |  <a  name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule )  |  terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module |  1.23.0  | 
7171
7272### Resources  
7373
Original file line number Diff line number Diff line change @@ -20,7 +20,7 @@ module "resource_group" {
2020
2121module  "key_protect_all_inclusive"  {
2222  source             =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
23-   version            =  " 4.13.4 " 
23+   version            =  " 4.14.2 " 
2424  resource_group_id  =   module. resource_group . resource_group_id 
2525  #  Only us-south, eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
2626  #  Note: Database instance and Key Protect must be created on the same region.
@@ -93,7 +93,7 @@ resource "elasticsearch_cluster_settings" "global" {
9393#  Create Secrets Manager Instance (if not using existing one)
9494module  "secrets_manager"  {
9595  source                =  " terraform-ibm-modules/secrets-manager/ibm" 
96-   version               =  " 1.14.2 " 
96+   version               =  " 1.16.1 " 
9797  resource_group_id     =   module. resource_group . resource_group_id 
9898  region                =   var. region 
9999  secrets_manager_name  =  " ${ var . prefix } -secrets-manager" 
Original file line number Diff line number Diff line change @@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3939# #############################################################################
4040module  "cbr_zone"  {
4141  source            =  " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" 
42-   version           =  " 1.22.2 " 
42+   version           =  " 1.23.0 " 
4343  name              =  " ${ var . prefix } -VPC-network-zone" 
4444  zone_description  =  " CBR Network zone containing VPC" 
4545  account_id        =   data. ibm_iam_account_settings . iam_account_settings . account_id 
Original file line number Diff line number Diff line change @@ -191,7 +191,7 @@ resource "ibm_resource_tag" "elasticsearch_tag" {
191191module  "cbr_rule"  {
192192  count             =  length (var. cbr_rules ) >  0  ?  length (var. cbr_rules ) :  0 
193193  source            =  " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" 
194-   version           =  " 1.22.2 " 
194+   version           =  " 1.23.0 " 
195195  rule_description  =   var. cbr_rules [count . index ]. description 
196196  enforcement_mode  =   var. cbr_rules [count . index ]. enforcement_mode 
197197  rule_contexts     =   var. cbr_rules [count . index ]. rule_contexts 
Original file line number Diff line number Diff line change @@ -34,7 +34,7 @@ module "kms" {
3434  }
3535  count                        =   var. existing_kms_key_crn  !=  null  ?  0  :  1  #  no need to create any KMS resources if passing an existing key
3636  source                       =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
37-   version                      =  " 4.13.4 " 
37+   version                      =  " 4.14.2 " 
3838  create_key_protect_instance  =  false 
3939  region                       =   local. existing_kms_instance_region 
4040  existing_kms_instance_guid   =   local. existing_kms_instance_guid 
    
 
   
 
     
   
   
          
     
  
    
     
 
    
      
     
 
     
    You can’t perform that action at this time.
  
 
    
  
     
    
      
        
     
 
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments