File tree Expand file tree Collapse file tree 7 files changed +11
-11
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 7 files changed +11
-11
lines changed Original file line number Diff line number Diff line change @@ -69,7 +69,7 @@ You need the following permissions to run this module.
6969| Name | Source | Version |
7070| ------| --------| ---------|
7171| <a name =" module_backup_key_crn_parser " ></a > [ backup\_ key\_ crn\_ parser] ( #module\_ backup\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
72- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.5 |
72+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.6 |
7373| <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
7474
7575### Resources
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.2.1 "
7+ version = " 1.3.0 "
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.2.1 "
7+ version = " 1.3.0 "
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change @@ -19,7 +19,7 @@ locals {
1919
2020module "resource_group" {
2121 source = " terraform-ibm-modules/resource-group/ibm"
22- version = " 1.2.1 "
22+ version = " 1.3.0 "
2323 # if an existing resource group is not set (null) create a new one using prefix
2424 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
2525 existing_resource_group_name = var. resource_group
@@ -36,7 +36,7 @@ locals {
3636
3737module "key_protect_all_inclusive" {
3838 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
39- version = " 5.1.14 "
39+ version = " 5.1.15 "
4040 resource_group_id = module. resource_group . resource_group_id
4141 # Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
4242 # Note: Database instance and Key Protect must be created on the same region.
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.2.1 "
7+ version = " 1.3.0 "
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
@@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3939# #############################################################################
4040module "cbr_zone" {
4141 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
42- version = " 1.32.5 "
42+ version = " 1.32.6 "
4343 name = " ${ var . prefix } -VPC-network-zone"
4444 zone_description = " CBR Network zone containing VPC"
4545 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -303,7 +303,7 @@ resource "ibm_resource_tag" "elasticsearch_tag" {
303303module "cbr_rule" {
304304 count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
305305 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
306- version = " 1.32.5 "
306+ version = " 1.32.6 "
307307 rule_description = var. cbr_rules [count . index ]. description
308308 enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
309309 rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change 77
88module "resource_group" {
99 source = " terraform-ibm-modules/resource-group/ibm"
10- version = " 1.2.1 "
10+ version = " 1.3.0 "
1111 existing_resource_group_name = var. existing_resource_group_name
1212}
1313
@@ -32,7 +32,7 @@ module "kms" {
3232 }
3333 count = local. create_new_kms_key ? 1 : 0
3434 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
35- version = " 5.1.14 "
35+ version = " 5.1.15 "
3636 create_key_protect_instance = false
3737 region = local. kms_region
3838 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -428,7 +428,7 @@ data "http" "es_metadata" {
428428module "code_engine_kibana" {
429429 count = var. enable_kibana_dashboard ? 1 : 0
430430 source = " terraform-ibm-modules/code-engine/ibm"
431- version = " 4.5.1 "
431+ version = " 4.5.3 "
432432 resource_group_id = module. resource_group . resource_group_id
433433 project_name = local. code_engine_project_name
434434 existing_project_id = local. code_engine_project_id
You can’t perform that action at this time.
0 commit comments