File tree Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -53,7 +53,7 @@ locals {
5353
5454module  "key_protect_all_inclusive"  {
5555  source             =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
56-   version            =  " 5.1.6 " 
56+   version            =  " 5.1.7 " 
5757  resource_group_id  =   module. resource_group . resource_group_id 
5858  #  Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
5959  #  Note: Database instance and Key Protect must be created on the same region.
@@ -136,7 +136,7 @@ module "icd_mongodb" {
136136module  "secrets_manager"  {
137137  count                 =   var. existing_secrets_manager_instance_guid  ==  null  ?  1  :  0 
138138  source                =  " terraform-ibm-modules/secrets-manager/ibm" 
139-   version               =  " 2.3.0 " 
139+   version               =  " 2.3.1 " 
140140  resource_group_id     =   module. resource_group . resource_group_id 
141141  region                =   var. region 
142142  secrets_manager_name  =  " ${ var . prefix } -secrets-manager" 
@@ -148,7 +148,7 @@ module "secrets_manager" {
148148#  Add a Secrets Group to the secret manager instance
149149module  "secrets_manager_secrets_group"  {
150150  source                =  " terraform-ibm-modules/secrets-manager-secret-group/ibm" 
151-   version               =  " 1.3.6 " 
151+   version               =  " 1.3.7 " 
152152  region                =   local. secrets_manager_region 
153153  secrets_manager_guid  =   local. secrets_manager_guid 
154154  # tfsec:ignore:general-secrets-no-plaintext-exposure
Original file line number Diff line number Diff line change @@ -25,7 +25,7 @@ module "kms" {
2525  }
2626  count                        =   local. create_new_kms_key  ?  1  :  0 
2727  source                       =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
28-   version                      =  " 5.1.6 " 
28+   version                      =  " 5.1.7 " 
2929  create_key_protect_instance  =  false 
3030  region                       =   local. kms_region 
3131  existing_kms_instance_crn    =   var. existing_kms_instance_crn 
@@ -386,7 +386,7 @@ module "secrets_manager_service_credentials" {
386386  count                        =  length (local. service_credential_secrets ) >  0  ?  1  :  0 
387387  depends_on                   =   [time_sleep . wait_for_mongodb_authorization_policy ]
388388  source                       =  " terraform-ibm-modules/secrets-manager/ibm//modules/secrets" 
389-   version                      =  " 2.3.0 " 
389+   version                      =  " 2.3.1 " 
390390  existing_sm_instance_guid    =   local. existing_secrets_manager_instance_guid 
391391  existing_sm_instance_region  =   local. existing_secrets_manager_instance_region 
392392  endpoint_type                =   var. existing_secrets_manager_endpoint_type 
    
 
   
 
     
   
   
          
     
  
    
     
 
    
      
     
 
     
    You can’t perform that action at this time.
  
 
    
  
     
    
      
        
     
 
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments