Skip to content

Commit 1b4165c

Browse files
fix(deps): update CBR module to 1.15.0 (#22)
1 parent 958b2ff commit 1b4165c

File tree

6 files changed

+10
-10
lines changed

6 files changed

+10
-10
lines changed

.secrets.baseline

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "go.sum|^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2023-10-07T00:03:02Z",
6+
"generated_at": "2023-10-08T00:03:02Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -64,7 +64,7 @@ You need the following permissions to run this module.
6464

6565
| Name | Source | Version |
6666
|------|--------|---------|
67-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.12.1 |
67+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.15.0 |
6868

6969
### Resources
7070

examples/basic/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
##############################################################################
44

55
module "resource_group" {
6-
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.0.6"
6+
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.1.0"
77
# if an existing resource group is not set (null) create a new one using prefix
88
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
99
existing_resource_group_name = var.resource_group

examples/complete/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ locals {
88
##############################################################################
99

1010
module "resource_group" {
11-
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.0.6"
11+
source = "git::https://github.com/terraform-ibm-modules/terraform-ibm-resource-group.git?ref=v1.1.0"
1212
# if an existing resource group is not set (null) create a new one using prefix
1313
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1414
existing_resource_group_name = var.resource_group
@@ -20,7 +20,7 @@ module "resource_group" {
2020

2121
module "key_protect_all_inclusive" {
2222
source = "terraform-ibm-modules/key-protect-all-inclusive/ibm"
23-
version = "4.2.0"
23+
version = "4.4.0"
2424
resource_group_id = module.resource_group.resource_group_id
2525
# Only us-south, eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
2626
# Note: Database instance and Key Protect must be created on the same region.
@@ -93,7 +93,7 @@ resource "ibm_resource_instance" "secrets_manager" {
9393
# Add a Secrets Group to the secret manager instance
9494
module "secrets_manager_secrets_group" {
9595
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
96-
version = "1.0.1"
96+
version = "1.1.0"
9797
region = local.sm_region
9898
secrets_manager_guid = local.sm_guid
9999
#tfsec:ignore:general-secrets-no-plaintext-exposure
@@ -104,7 +104,7 @@ module "secrets_manager_secrets_group" {
104104
# Add service credentials to secret manager as a username/password secret type in the created secret group
105105
module "secrets_manager_service_credentials_user_pass" {
106106
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
107-
version = "1.0.0"
107+
version = "1.1.1"
108108
for_each = var.service_credential_names
109109
region = local.sm_region
110110
secrets_manager_guid = local.sm_guid
@@ -119,7 +119,7 @@ module "secrets_manager_service_credentials_user_pass" {
119119
# Add secrets manager certificate to secret manager as a certificate secret type in the created secret group
120120
module "secrets_manager_service_credentials_cert" {
121121
source = "terraform-ibm-modules/secrets-manager-secret/ibm"
122-
version = "1.0.0"
122+
version = "1.1.1"
123123
region = local.sm_region
124124
secrets_manager_guid = local.sm_guid
125125
secret_group_id = module.secrets_manager_secrets_group.secret_group_id

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ resource "ibm_database" "elasticsearch" {
136136
module "cbr_rule" {
137137
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
138138
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
139-
version = "1.12.1"
139+
version = "1.15.0"
140140
rule_description = var.cbr_rules[count.index].description
141141
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
142142
rule_contexts = var.cbr_rules[count.index].rule_contexts

module-metadata.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -502,7 +502,7 @@
502502
"cbr_rule": {
503503
"name": "cbr_rule",
504504
"source": "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module",
505-
"version": "1.12.1",
505+
"version": "1.15.0",
506506
"attributes": {
507507
"count": "cbr_rules",
508508
"enforcement_mode": "cbr_rules",

0 commit comments

Comments
 (0)