File tree Expand file tree Collapse file tree 5 files changed +8
-8
lines changed Expand file tree Collapse file tree 5 files changed +8
-8
lines changed Original file line number Diff line number Diff line change @@ -64,7 +64,7 @@ You need the following permissions to run this module.
6464| Name | Source | Version |
6565| ------| --------| ---------|
6666| <a name =" module_backup_key_crn_parser " ></a > [ backup\_ key\_ crn\_ parser] ( #module\_ backup\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
67- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.30 .0 |
67+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31 .0 |
6868| <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
6969
7070### Resources
Original file line number Diff line number Diff line change @@ -53,7 +53,7 @@ locals {
5353
5454module "key_protect_all_inclusive" {
5555 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
56- version = " 5.0.0 "
56+ version = " 5.0.1 "
5757 resource_group_id = module. resource_group . resource_group_id
5858 # Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
5959 # Note: Database instance and Key Protect must be created on the same region.
@@ -89,7 +89,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
8989# #############################################################################
9090module "cbr_zone" {
9191 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
92- version = " 1.30 .0"
92+ version = " 1.31 .0"
9393 name = " ${ var . prefix } -VPC-network-zone"
9494 zone_description = " CBR Network zone containing VPC"
9595 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
@@ -133,7 +133,7 @@ module "icd_mongodb" {
133133module "secrets_manager" {
134134 count = var. existing_secret_manager_instance_guid == null ? 1 : 0
135135 source = " terraform-ibm-modules/secrets-manager/ibm"
136- version = " 2.1.1 "
136+ version = " 2.2.0 "
137137 resource_group_id = module. resource_group . resource_group_id
138138 region = var. region
139139 secrets_manager_name = " ${ var . prefix } -secrets-manager"
Original file line number Diff line number Diff line change @@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3939# #############################################################################
4040module "cbr_zone" {
4141 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
42- version = " 1.30 .0"
42+ version = " 1.31 .0"
4343 name = " ${ var . prefix } -VPC-network-zone"
4444 zone_description = " CBR Network zone containing VPC"
4545 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -317,7 +317,7 @@ resource "ibm_resource_tag" "mongodb_tag" {
317317module "cbr_rule" {
318318 count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
319319 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
320- version = " 1.30 .0"
320+ version = " 1.31 .0"
321321 rule_description = var. cbr_rules [count . index ]. description
322322 enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
323323 rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -40,7 +40,7 @@ module "kms" {
4040 }
4141 count = local. create_new_kms_key
4242 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
43- version = " 5.0.0 "
43+ version = " 5.0.1 "
4444 create_key_protect_instance = false
4545 region = local. kms_region
4646 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -418,7 +418,7 @@ module "secrets_manager_service_credentials" {
418418 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
419419 depends_on = [time_sleep . wait_for_mongodb_authorization_policy ]
420420 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
421- version = " 2.1.1 "
421+ version = " 2.2.0 "
422422 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
423423 existing_sm_instance_region = local. existing_secrets_manager_instance_region
424424 endpoint_type = var. existing_secrets_manager_endpoint_type
You can’t perform that action at this time.
0 commit comments