File tree Expand file tree Collapse file tree 2 files changed +6
-6
lines changed Expand file tree Collapse file tree 2 files changed +6
-6
lines changed Original file line number Diff line number Diff line change @@ -35,7 +35,7 @@ locals {
3535
3636module  "key_protect_all_inclusive"  {
3737  source             =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
38-   version            =  " 5.0.1 " 
38+   version            =  " 5.0.2 " 
3939  resource_group_id  =   module. resource_group . resource_group_id 
4040  #  Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
4141  #  Note: Database instance and Key Protect must be created on the same region.
@@ -95,7 +95,7 @@ module "icd_elasticsearch" {
9595module  "secrets_manager"  {
9696  count                 =   var. existing_sm_instance_guid  ==  null  ?  1  :  0 
9797  source                =  " terraform-ibm-modules/secrets-manager/ibm" 
98-   version               =  " 2.2.1 " 
98+   version               =  " 2.2.5 " 
9999  resource_group_id     =   module. resource_group . resource_group_id 
100100  region                =   var. region 
101101  secrets_manager_name  =  " ${ var . prefix } -secrets-manager" 
@@ -107,7 +107,7 @@ module "secrets_manager" {
107107#  Add a Secrets Group to the secret manager instance
108108module  "secrets_manager_secrets_group"  {
109109  source                =  " terraform-ibm-modules/secrets-manager-secret-group/ibm" 
110-   version               =  " 1.3.3 " 
110+   version               =  " 1.3.4 " 
111111  region                =   local. sm_region 
112112  secrets_manager_guid  =   local. sm_guid 
113113  # tfsec:ignore:general-secrets-no-plaintext-exposure
Original file line number Diff line number Diff line change @@ -40,7 +40,7 @@ module "kms" {
4040  }
4141  count                        =   local. create_new_kms_key 
4242  source                       =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
43-   version                      =  " 5.0.1 " 
43+   version                      =  " 5.0.2 " 
4444  create_key_protect_instance  =  false 
4545  region                       =   local. kms_region 
4646  existing_kms_instance_crn    =   var. existing_kms_instance_crn 
@@ -419,7 +419,7 @@ module "secrets_manager_service_credentials" {
419419  count                        =   var. existing_secrets_manager_instance_crn  ==  null  ?  0  :  1 
420420  depends_on                   =   [time_sleep . wait_for_es_authorization_policy ]
421421  source                       =  " terraform-ibm-modules/secrets-manager/ibm//modules/secrets" 
422-   version                      =  " 2.2.1 " 
422+   version                      =  " 2.2.5 " 
423423  existing_sm_instance_guid    =   local. existing_secrets_manager_instance_guid 
424424  existing_sm_instance_region  =   local. existing_secrets_manager_instance_region 
425425  endpoint_type                =   var. existing_secrets_manager_endpoint_type 
@@ -446,7 +446,7 @@ data "http" "es_metadata" {
446446module  "code_engine_kibana"  {
447447  count                =   var. enable_kibana_dashboard  ?  1  :  0 
448448  source               =  " terraform-ibm-modules/code-engine/ibm" 
449-   version              =  " 4.2.1 " 
449+   version              =  " 4.2.2 " 
450450  resource_group_id    =   module. resource_group . resource_group_id 
451451  project_name         =   local. code_engine_project_name 
452452  existing_project_id  =   local. code_engine_project_id 
    
 
   
 
     
   
   
          
     
  
    
     
 
    
      
     
 
     
    You can’t perform that action at this time.
  
 
    
  
     
    
      
        
     
 
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments