File tree Expand file tree Collapse file tree 5 files changed +6
-6
lines changed
Expand file tree Collapse file tree 5 files changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -67,7 +67,7 @@ You need the following permissions to run this module.
6767
6868| Name | Source | Version |
6969| ------| --------| ---------|
70- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.22.2 |
70+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.23.0 |
7171
7272### Resources
7373
Original file line number Diff line number Diff line change @@ -20,7 +20,7 @@ module "resource_group" {
2020
2121module "key_protect_all_inclusive" {
2222 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
23- version = " 4.13.4 "
23+ version = " 4.14.2 "
2424 resource_group_id = module. resource_group . resource_group_id
2525 # Only us-south, eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
2626 # Note: Database instance and Key Protect must be created on the same region.
@@ -93,7 +93,7 @@ resource "elasticsearch_cluster_settings" "global" {
9393# Create Secrets Manager Instance (if not using existing one)
9494module "secrets_manager" {
9595 source = " terraform-ibm-modules/secrets-manager/ibm"
96- version = " 1.14.2 "
96+ version = " 1.16.1 "
9797 resource_group_id = module. resource_group . resource_group_id
9898 region = var. region
9999 secrets_manager_name = " ${ var . prefix } -secrets-manager"
Original file line number Diff line number Diff line change @@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3939# #############################################################################
4040module "cbr_zone" {
4141 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
42- version = " 1.22.2 "
42+ version = " 1.23.0 "
4343 name = " ${ var . prefix } -VPC-network-zone"
4444 zone_description = " CBR Network zone containing VPC"
4545 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -191,7 +191,7 @@ resource "ibm_resource_tag" "elasticsearch_tag" {
191191module "cbr_rule" {
192192 count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
193193 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
194- version = " 1.22.2 "
194+ version = " 1.23.0 "
195195 rule_description = var. cbr_rules [count . index ]. description
196196 enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
197197 rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -34,7 +34,7 @@ module "kms" {
3434 }
3535 count = var. existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key
3636 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
37- version = " 4.13.4 "
37+ version = " 4.14.2 "
3838 create_key_protect_instance = false
3939 region = local. existing_kms_instance_region
4040 existing_kms_instance_guid = local. existing_kms_instance_guid
You can’t perform that action at this time.
0 commit comments