File tree Expand file tree Collapse file tree 5 files changed +6
-6
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 5 files changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -69,7 +69,7 @@ You need the following permissions to run this module.
6969| Name | Source | Version |
7070| ------| --------| ---------|
7171| <a name =" module_backup_key_crn_parser " ></a > [ backup\_ key\_ crn\_ parser] ( #module\_ backup\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
72- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.4 |
72+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.5 |
7373| <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
7474
7575### Resources
Original file line number Diff line number Diff line change @@ -98,7 +98,7 @@ module "icd_elasticsearch" {
9898module "secrets_manager" {
9999 count = var. existing_sm_instance_guid == null ? 1 : 0
100100 source = " terraform-ibm-modules/secrets-manager/ibm"
101- version = " 2.6.13 "
101+ version = " 2.6.16 "
102102 resource_group_id = module. resource_group . resource_group_id
103103 region = var. region
104104 secrets_manager_name = " ${ var . prefix } -secrets-manager"
Original file line number Diff line number Diff line change @@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3939# #############################################################################
4040module "cbr_zone" {
4141 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
42- version = " 1.32.4 "
42+ version = " 1.32.5 "
4343 name = " ${ var . prefix } -VPC-network-zone"
4444 zone_description = " CBR Network zone containing VPC"
4545 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -304,7 +304,7 @@ resource "ibm_resource_tag" "elasticsearch_tag" {
304304module "cbr_rule" {
305305 count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
306306 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
307- version = " 1.32.4 "
307+ version = " 1.32.5 "
308308 rule_description = var. cbr_rules [count . index ]. description
309309 enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
310310 rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -398,7 +398,7 @@ module "secrets_manager_service_credentials" {
398398 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
399399 depends_on = [time_sleep . wait_for_elasticsearch_authorization_policy ]
400400 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
401- version = " 2.6.13 "
401+ version = " 2.6.16 "
402402 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
403403 existing_sm_instance_region = local. existing_secrets_manager_instance_region
404404 endpoint_type = var. existing_secrets_manager_endpoint_type
@@ -425,7 +425,7 @@ data "http" "es_metadata" {
425425module "code_engine_kibana" {
426426 count = var. enable_kibana_dashboard ? 1 : 0
427427 source = " terraform-ibm-modules/code-engine/ibm"
428- version = " 4.4.4 "
428+ version = " 4.5.1 "
429429 resource_group_id = module. resource_group . resource_group_id
430430 project_name = local. code_engine_project_name
431431 existing_project_id = local. code_engine_project_id
You can’t perform that action at this time.
0 commit comments