File tree Expand file tree Collapse file tree 2 files changed +4
-4
lines changed 
solutions/fully-configurable Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -35,7 +35,7 @@ locals {
3535
3636module  "key_protect_all_inclusive"  {
3737  source             =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
38-   version            =  " 5.1.11 " 
38+   version            =  " 5.1.12 " 
3939  resource_group_id  =  . resource_group . resource_group_id 
4040  #  Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
4141  #  Note: Database instance and Key Protect must be created on the same region.
@@ -98,7 +98,7 @@ module "icd_elasticsearch" {
9898module  "secrets_manager"  {
9999  count                 =  . existing_sm_instance_guid  ==  null  ?  1  :  0 
100100  source                =  " terraform-ibm-modules/secrets-manager/ibm" 
101-   version               =  " 2.6.12 " 
101+   version               =  " 2.6.13 " 
102102  resource_group_id     =  . resource_group . resource_group_id 
103103  region                =  . region 
104104  secrets_manager_name  =  " ${ var . prefix } -secrets-manager" 
Original file line number Diff line number Diff line change @@ -32,7 +32,7 @@ module "kms" {
3232  }
3333  count                        =  . create_new_kms_key  ?  1  :  0 
3434  source                       =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
35-   version                      =  " 5.1.11 " 
35+   version                      =  " 5.1.12 " 
3636  create_key_protect_instance  =  false 
3737  region                       =  . kms_region 
3838  existing_kms_instance_crn    =  . existing_kms_instance_crn 
@@ -398,7 +398,7 @@ module "secrets_manager_service_credentials" {
398398  count                        =  length (local. service_credential_secrets ) >  0  ?  1  :  0 
399399  depends_on                   =  time_sleep . wait_for_elasticsearch_authorization_policy ]
400400  source                       =  " terraform-ibm-modules/secrets-manager/ibm//modules/secrets" 
401-   version                      =  " 2.6.12 " 
401+   version                      =  " 2.6.13 " 
402402  existing_sm_instance_guid    =  . existing_secrets_manager_instance_guid 
403403  existing_sm_instance_region  =  . existing_secrets_manager_instance_region 
404404  endpoint_type                =  . existing_secrets_manager_endpoint_type 
 
 
   
 
     
   
   
          
    
    
     
    
      
     
     
    You can’t perform that action at this time.
  
 
    
  
    
      
        
     
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments