77
88module "resource_group" {
99 source = " terraform-ibm-modules/resource-group/ibm"
10- version = " 1.4.0 "
10+ version = " 1.4.3 "
1111 existing_resource_group_name = var. existing_resource_group_name
1212}
1313
@@ -32,7 +32,7 @@ module "kms" {
3232 }
3333 count = local. create_new_kms_key ? 1 : 0
3434 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
35- version = " 5.5.0 "
35+ version = " 5.5.3 "
3636 create_key_protect_instance = false
3737 region = local. kms_region
3838 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -62,21 +62,21 @@ module "kms" {
6262module "kms_instance_crn_parser" {
6363 count = var. existing_kms_instance_crn != null ? 1 : 0
6464 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
65- version = " 1.3.0 "
65+ version = " 1.3.3 "
6666 crn = var. existing_kms_instance_crn
6767}
6868
6969module "kms_key_crn_parser" {
7070 count = var. existing_kms_key_crn != null ? 1 : 0
7171 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
72- version = " 1.3.0 "
72+ version = " 1.3.3 "
7373 crn = var. existing_kms_key_crn
7474}
7575
7676module "kms_backup_key_crn_parser" {
7777 count = var. existing_backup_kms_key_crn != null ? 1 : 0
7878 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
79- version = " 1.3.0 "
79+ version = " 1.3.3 "
8080 crn = var. existing_backup_kms_key_crn
8181}
8282
@@ -239,7 +239,7 @@ locals {
239239module "es_instance_crn_parser" {
240240 count = var. existing_elasticsearch_instance_crn != null ? 1 : 0
241241 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
242- version = " 1.3.0 "
242+ version = " 1.3.3 "
243243 crn = var. existing_elasticsearch_instance_crn
244244}
245245
@@ -347,7 +347,7 @@ locals {
347347module "sm_instance_crn_parser" {
348348 count = var. existing_secrets_manager_instance_crn != null ? 1 : 0
349349 source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
350- version = " 1.3.0 "
350+ version = " 1.3.3 "
351351 crn = var. existing_secrets_manager_instance_crn
352352}
353353
@@ -432,7 +432,7 @@ locals {
432432module "secrets_manager_service_credentials" {
433433 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
434434 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
435- version = " 2.11.9 "
435+ version = " 2.12.3 "
436436 # converted into implicit dependency and removed explicit depends_on time_sleep.wait_for_elasticsearch_authorization_policy for this module because of issue https://github.com/terraform-ibm-modules/terraform-ibm-icd-redis/issues/608
437437 existing_sm_instance_guid = local. create_secrets_manager_auth_policy > 0 ? time_sleep. wait_for_elasticsearch_authorization_policy [0 ]. triggers [" secrets_manager_guid" ] : local. existing_secrets_manager_instance_guid
438438 existing_sm_instance_region = local. create_secrets_manager_auth_policy > 0 ? time_sleep. wait_for_elasticsearch_authorization_policy [0 ]. triggers [" secrets_manager_region" ] : local. existing_secrets_manager_instance_region
@@ -483,7 +483,7 @@ data "external" "es_metadata" {
483483module "code_engine_kibana" {
484484 count = var. enable_kibana_dashboard ? 1 : 0
485485 source = " terraform-ibm-modules/code-engine/ibm"
486- version = " 4.7.1 "
486+ version = " 4.7.5 "
487487 resource_group_id = module. resource_group . resource_group_id
488488 project_name = local. code_engine_project_name
489489 existing_project_id = local. code_engine_project_id
0 commit comments