Skip to content

Commit ecd103a

Browse files
shemaudaniel-butler-irl
authored andcommitted
fix(deps): updated KMS module to 4.16.4 in the DA solution (#315)
1 parent 0d58a53 commit ecd103a

File tree

2 files changed

+5
-7
lines changed

2 files changed

+5
-7
lines changed

examples/complete/main.tf

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ module "resource_group" {
2020

2121
module "key_protect_all_inclusive" {
2222
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
23-
version = "4.15.13"
23+
version = "4.16.4"
2424
resource_group_id = module.resource_group.resource_group_id
2525
# Only us-south, eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
2626
# Note: Database instance and Key Protect must be created on the same region.
@@ -29,8 +29,7 @@ module "key_protect_all_inclusive" {
2929
resource_tags = var.resource_tags
3030
keys = [
3131
{
32-
key_ring_name = "icd"
33-
force_delete_key_ring = true
32+
key_ring_name = "icd"
3433
keys = [
3534
{
3635
key_name = "${var.prefix}-elasticsearch"

solutions/standard/main.tf

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -69,17 +69,16 @@ module "kms" {
6969
}
7070
count = var.existing_kms_key_crn != null || local.use_existing_db_instance ? 0 : 1 # no need to create any KMS resources if passing an existing key
7171
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
72-
version = "4.15.13"
72+
version = "4.16.4"
7373
create_key_protect_instance = false
7474
region = local.existing_kms_instance_region
7575
existing_kms_instance_crn = var.existing_kms_instance_crn
7676
key_ring_endpoint_type = var.kms_endpoint_type
7777
key_endpoint_type = var.kms_endpoint_type
7878
keys = [
7979
{
80-
key_ring_name = local.elasticsearch_key_ring_name
81-
existing_key_ring = false
82-
force_delete_key_ring = true
80+
key_ring_name = local.elasticsearch_key_ring_name
81+
existing_key_ring = false
8382
keys = [
8483
{
8584
key_name = local.elasticsearch_key_name

0 commit comments

Comments
 (0)