|
7 | 7 |
|
8 | 8 | module "resource_group" { |
9 | 9 | source = "terraform-ibm-modules/resource-group/ibm" |
10 | | - version = "1.4.4" |
| 10 | + version = "1.4.6" |
11 | 11 | existing_resource_group_name = var.existing_resource_group_name |
12 | 12 | } |
13 | 13 |
|
@@ -62,21 +62,21 @@ module "kms" { |
62 | 62 | module "kms_instance_crn_parser" { |
63 | 63 | count = var.existing_kms_instance_crn != null ? 1 : 0 |
64 | 64 | source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" |
65 | | - version = "1.3.3" |
| 65 | + version = "1.3.5" |
66 | 66 | crn = var.existing_kms_instance_crn |
67 | 67 | } |
68 | 68 |
|
69 | 69 | module "kms_key_crn_parser" { |
70 | 70 | count = var.existing_kms_key_crn != null ? 1 : 0 |
71 | 71 | source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" |
72 | | - version = "1.3.3" |
| 72 | + version = "1.3.5" |
73 | 73 | crn = var.existing_kms_key_crn |
74 | 74 | } |
75 | 75 |
|
76 | 76 | module "kms_backup_key_crn_parser" { |
77 | 77 | count = var.existing_backup_kms_key_crn != null ? 1 : 0 |
78 | 78 | source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" |
79 | | - version = "1.3.3" |
| 79 | + version = "1.3.5" |
80 | 80 | crn = var.existing_backup_kms_key_crn |
81 | 81 | } |
82 | 82 |
|
@@ -239,7 +239,7 @@ locals { |
239 | 239 | module "es_instance_crn_parser" { |
240 | 240 | count = var.existing_elasticsearch_instance_crn != null ? 1 : 0 |
241 | 241 | source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" |
242 | | - version = "1.3.3" |
| 242 | + version = "1.3.5" |
243 | 243 | crn = var.existing_elasticsearch_instance_crn |
244 | 244 | } |
245 | 245 |
|
@@ -347,7 +347,7 @@ locals { |
347 | 347 | module "sm_instance_crn_parser" { |
348 | 348 | count = var.existing_secrets_manager_instance_crn != null ? 1 : 0 |
349 | 349 | source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" |
350 | | - version = "1.3.3" |
| 350 | + version = "1.3.5" |
351 | 351 | crn = var.existing_secrets_manager_instance_crn |
352 | 352 | } |
353 | 353 |
|
@@ -432,7 +432,7 @@ locals { |
432 | 432 | module "secrets_manager_service_credentials" { |
433 | 433 | count = length(local.service_credential_secrets) > 0 ? 1 : 0 |
434 | 434 | source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets" |
435 | | - version = "2.12.3" |
| 435 | + version = "2.12.4" |
436 | 436 | # converted into implicit dependency and removed explicit depends_on time_sleep.wait_for_elasticsearch_authorization_policy for this module because of issue https://github.com/terraform-ibm-modules/terraform-ibm-icd-redis/issues/608 |
437 | 437 | existing_sm_instance_guid = local.create_secrets_manager_auth_policy > 0 ? time_sleep.wait_for_elasticsearch_authorization_policy[0].triggers["secrets_manager_guid"] : local.existing_secrets_manager_instance_guid |
438 | 438 | existing_sm_instance_region = local.create_secrets_manager_auth_policy > 0 ? time_sleep.wait_for_elasticsearch_authorization_policy[0].triggers["secrets_manager_region"] : local.existing_secrets_manager_instance_region |
@@ -483,7 +483,7 @@ data "external" "es_metadata" { |
483 | 483 | module "code_engine_kibana" { |
484 | 484 | count = var.enable_kibana_dashboard ? 1 : 0 |
485 | 485 | source = "terraform-ibm-modules/code-engine/ibm" |
486 | | - version = "4.7.6" |
| 486 | + version = "4.7.7" |
487 | 487 | resource_group_id = module.resource_group.resource_group_id |
488 | 488 | project_name = local.code_engine_project_name |
489 | 489 | existing_project_id = local.code_engine_project_id |
|
0 commit comments