File tree Expand file tree Collapse file tree 5 files changed +6
-6
lines changed Expand file tree Collapse file tree 5 files changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -67,7 +67,7 @@ You need the following permissions to run this module.
6767
6868| Name | Source | Version |
6969| ------| --------| ---------|
70- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.22.0 |
70+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.22.1 |
7171
7272### Resources
7373
Original file line number Diff line number Diff line change @@ -20,7 +20,7 @@ module "resource_group" {
2020
2121module "key_protect_all_inclusive" {
2222 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
23- version = " 4.11.8 "
23+ version = " 4.13.0 "
2424 resource_group_id = module. resource_group . resource_group_id
2525 # Only us-south, eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
2626 # Note: Database instance and Key Protect must be created on the same region.
@@ -89,7 +89,7 @@ resource "elasticsearch_cluster_settings" "global" {
8989# Create Secrets Manager Instance (if not using existing one)
9090module "secrets_manager" {
9191 source = " terraform-ibm-modules/secrets-manager/ibm"
92- version = " 1.13.3 "
92+ version = " 1.13.4 "
9393 resource_group_id = module. resource_group . resource_group_id
9494 region = var. region
9595 secrets_manager_name = " ${ var . prefix } -secrets-manager"
Original file line number Diff line number Diff line change @@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3939# #############################################################################
4040module "cbr_zone" {
4141 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
42- version = " 1.22.0 "
42+ version = " 1.22.1 "
4343 name = " ${ var . prefix } -VPC-network-zone"
4444 zone_description = " CBR Network zone containing VPC"
4545 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -144,7 +144,7 @@ resource "ibm_resource_tag" "elasticsearch_tag" {
144144module "cbr_rule" {
145145 count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
146146 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
147- version = " 1.22.0 "
147+ version = " 1.22.1 "
148148 rule_description = var. cbr_rules [count . index ]. description
149149 enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
150150 rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -12,7 +12,7 @@ module "kms" {
1212 }
1313 count = var. existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key
1414 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
15- version = " 4.11.8 "
15+ version = " 4.13.0 "
1616 create_key_protect_instance = false
1717 region = var. kms_region
1818 existing_kms_instance_guid = var. existing_kms_instance_guid
You can’t perform that action at this time.
0 commit comments