File tree Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -72,7 +72,7 @@ module "icd_elasticsearch" {
7272#  Create Secrets Manager Instance (if not using existing one)
7373module  "secrets_manager"  {
7474  source                =  " terraform-ibm-modules/secrets-manager/ibm" 
75-   version               =  " 1.19.2 " 
75+   version               =  " 1.19.3 " 
7676  resource_group_id     =  . resource_group . resource_group_id 
7777  region                =  . region 
7878  secrets_manager_name  =  " ${ var . prefix } -secrets-manager" 
Original file line number Diff line number Diff line change @@ -169,7 +169,7 @@ module "backup_kms" {
169169  }
170170  count                        =  . use_ibm_owned_encryption_key  ?  0  :  var. existing_backup_kms_key_crn  !=  null  ?  0  :  var. existing_backup_kms_instance_crn  !=  null  ?  1  :  0 
171171  source                       =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
172-   version                      =  " 4.16.8 " 
172+   version                      =  " 4.17.1 " 
173173  create_key_protect_instance  =  false 
174174  region                       =  . existing_backup_kms_instance_region 
175175  existing_kms_instance_crn    =  . existing_backup_kms_instance_crn 
@@ -314,7 +314,7 @@ module "secrets_manager_service_credentials" {
314314  count                        =  . existing_secrets_manager_instance_crn  ==  null  ?  0  :  1 
315315  depends_on                   =  time_sleep . wait_for_es_authorization_policy ]
316316  source                       =  " terraform-ibm-modules/secrets-manager/ibm//modules/secrets" 
317-   version                      =  " 1.19.2 " 
317+   version                      =  " 1.19.3 " 
318318  existing_sm_instance_guid    =  . existing_secrets_manager_instance_guid 
319319  existing_sm_instance_region  =  . existing_secrets_manager_instance_region 
320320  endpoint_type                =  . existing_secrets_manager_endpoint_type 
@@ -373,7 +373,7 @@ data "http" "es_metadata" {
373373module  "code_engine_kibana"  {
374374  count                =  . enable_kibana_dashboard  ?  1  :  0 
375375  source               =  " terraform-ibm-modules/code-engine/ibm" 
376-   version              =  " 2.1.2 " 
376+   version              =  " 2.1.3 " 
377377  resource_group_id    =  . resource_group . resource_group_id 
378378  project_name         =  . code_engine_project_name 
379379  existing_project_id  =  . code_engine_project_id 
 
 
   
 
     
   
   
          
    
    
     
    
      
     
     
    You can’t perform that action at this time.
  
 
    
  
    
      
        
     
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments