File tree Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Expand file tree Collapse file tree 2 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -53,7 +53,7 @@ locals {
5353
5454module "key_protect_all_inclusive" {
5555 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
56- version = " 5.0.1 "
56+ version = " 5.0.2 "
5757 resource_group_id = module. resource_group . resource_group_id
5858 # Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
5959 # Note: Database instance and Key Protect must be created on the same region.
@@ -133,7 +133,7 @@ module "icd_mongodb" {
133133module "secrets_manager" {
134134 count = var. existing_secret_manager_instance_guid == null ? 1 : 0
135135 source = " terraform-ibm-modules/secrets-manager/ibm"
136- version = " 2.2.3 "
136+ version = " 2.2.4 "
137137 resource_group_id = module. resource_group . resource_group_id
138138 region = var. region
139139 secrets_manager_name = " ${ var . prefix } -secrets-manager"
@@ -145,7 +145,7 @@ module "secrets_manager" {
145145# Add a Secrets Group to the secret manager instance
146146module "secrets_manager_secrets_group" {
147147 source = " terraform-ibm-modules/secrets-manager-secret-group/ibm"
148- version = " 1.3.3 "
148+ version = " 1.3.4 "
149149 region = local. secret_manager_region
150150 secrets_manager_guid = local. secret_manager_guid
151151 # tfsec:ignore:general-secrets-no-plaintext-exposure
Original file line number Diff line number Diff line change @@ -26,7 +26,7 @@ module "kms" {
2626 }
2727 count = local. create_new_kms_key
2828 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
29- version = " 5.0.1 "
29+ version = " 5.0.2 "
3030 create_key_protect_instance = false
3131 region = local. kms_region
3232 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -392,7 +392,7 @@ module "secrets_manager_service_credentials" {
392392 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
393393 depends_on = [time_sleep . wait_for_mongodb_authorization_policy ]
394394 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
395- version = " 2.2.3 "
395+ version = " 2.2.4 "
396396 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
397397 existing_sm_instance_region = local. existing_secrets_manager_instance_region
398398 endpoint_type = var. existing_secrets_manager_endpoint_type
You can’t perform that action at this time.
0 commit comments