File tree Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -35,7 +35,7 @@ locals {
3535
3636module "key_protect_all_inclusive" {
3737 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
38- version = " 5.1.6 "
38+ version = " 5.1.7 "
3939 resource_group_id = module. resource_group . resource_group_id
4040 # Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
4141 # Note: Database instance and Key Protect must be created on the same region.
@@ -98,7 +98,7 @@ module "icd_elasticsearch" {
9898module "secrets_manager" {
9999 count = var. existing_sm_instance_guid == null ? 1 : 0
100100 source = " terraform-ibm-modules/secrets-manager/ibm"
101- version = " 2.3.0 "
101+ version = " 2.3.1 "
102102 resource_group_id = module. resource_group . resource_group_id
103103 region = var. region
104104 secrets_manager_name = " ${ var . prefix } -secrets-manager"
@@ -110,7 +110,7 @@ module "secrets_manager" {
110110# Add a Secrets Group to the secret manager instance
111111module "secrets_manager_secrets_group" {
112112 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
113- version = " 1.3.6 "
113+ version = " 1.3.7 "
114114 region = local. sm_region
115115 secrets_manager_guid = local. sm_guid
116116 # tfsec:ignore:general-secrets-no-plaintext-exposure
Original file line number Diff line number Diff line change @@ -33,7 +33,7 @@ module "kms" {
3333 }
3434 count = local. create_new_kms_key
3535 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
36- version = " 5.1.6 "
36+ version = " 5.1.7 "
3737 create_key_protect_instance = false
3838 region = local. kms_region
3939 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -400,7 +400,7 @@ module "secrets_manager_service_credentials" {
400400 count = var. existing_secrets_manager_instance_crn == null ? 0 : 1
401401 depends_on = [time_sleep . wait_for_es_authorization_policy ]
402402 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
403- version = " 2.3.0 "
403+ version = " 2.3.1 "
404404 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
405405 existing_sm_instance_region = local. existing_secrets_manager_instance_region
406406 endpoint_type = var. existing_secrets_manager_endpoint_type
You can’t perform that action at this time.
0 commit comments