File tree Expand file tree Collapse file tree 2 files changed +6
-6
lines changed Expand file tree Collapse file tree 2 files changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -35,7 +35,7 @@ locals {
3535
3636module "key_protect_all_inclusive" {
3737 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
38- version = " 4.20.0 "
38+ version = " 4.21.3 "
3939 resource_group_id = module. resource_group . resource_group_id
4040 # Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
4141 # Note: Database instance and Key Protect must be created on the same region.
@@ -95,7 +95,7 @@ module "icd_elasticsearch" {
9595module "secrets_manager" {
9696 count = var. existing_sm_instance_guid == null ? 1 : 0
9797 source = " terraform-ibm-modules/secrets-manager/ibm"
98- version = " 1.24.3 "
98+ version = " 1.25.4 "
9999 resource_group_id = module. resource_group . resource_group_id
100100 region = var. region
101101 secrets_manager_name = " ${ var . prefix } -secrets-manager"
@@ -107,7 +107,7 @@ module "secrets_manager" {
107107# Add a Secrets Group to the secret manager instance
108108module "secrets_manager_secrets_group" {
109109 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
110- version = " 1.2.2 "
110+ version = " 1.2.3 "
111111 region = local. sm_region
112112 secrets_manager_guid = local. sm_guid
113113 # tfsec:ignore:general-secrets-no-plaintext-exposure
Original file line number Diff line number Diff line change @@ -40,7 +40,7 @@ module "kms" {
4040 }
4141 count = local. create_new_kms_key
4242 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
43- version = " 4.20.0 "
43+ version = " 4.21.3 "
4444 create_key_protect_instance = false
4545 region = local. kms_region
4646 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -419,7 +419,7 @@ module "secrets_manager_service_credentials" {
419419 count = var. existing_secrets_manager_instance_crn == null ? 0 : 1
420420 depends_on = [time_sleep . wait_for_es_authorization_policy ]
421421 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
422- version = " 1.24.3 "
422+ version = " 1.25.4 "
423423 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
424424 existing_sm_instance_region = local. existing_secrets_manager_instance_region
425425 endpoint_type = var. existing_secrets_manager_endpoint_type
@@ -446,7 +446,7 @@ data "http" "es_metadata" {
446446module "code_engine_kibana" {
447447 count = var. enable_kibana_dashboard ? 1 : 0
448448 source = " terraform-ibm-modules/code-engine/ibm"
449- version = " 3.2.0 "
449+ version = " 3.2.3 "
450450 resource_group_id = module. resource_group . resource_group_id
451451 project_name = local. code_engine_project_name
452452 existing_project_id = local. code_engine_project_id
You can’t perform that action at this time.
0 commit comments