Skip to content

Commit a68ca68

Browse files
fix(deps): update terraform dependencies
1 parent 47c0021 commit a68ca68

File tree

7 files changed

+23
-23
lines changed

7 files changed

+23
-23
lines changed

README.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -63,9 +63,9 @@ You need the following permissions to run this module.
6363

6464
| Name | Source | Version |
6565
|------|--------|---------|
66-
| <a name="module_backup_key_crn_parser"></a> [backup\_key\_crn\_parser](#module\_backup\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
67-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
68-
| <a name="module_kms_key_crn_parser"></a> [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
66+
| <a name="module_backup_key_crn_parser"></a> [backup\_key\_crn\_parser](#module\_backup\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
67+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.2 |
68+
| <a name="module_kms_key_crn_parser"></a> [kms\_key\_crn\_parser](#module\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
6969

7070
### Resources
7171

examples/backup-restore/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.2.0"
7+
version = "1.2.1"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group

examples/basic/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.2.0"
7+
version = "1.2.1"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group

examples/complete/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ locals {
1919

2020
module "resource_group" {
2121
source = "terraform-ibm-modules/resource-group/ibm"
22-
version = "1.2.0"
22+
version = "1.2.1"
2323
# if an existing resource group is not set (null) create a new one using prefix
2424
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
2525
existing_resource_group_name = var.resource_group
@@ -53,7 +53,7 @@ locals {
5353

5454
module "key_protect_all_inclusive" {
5555
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
56-
version = "5.1.7"
56+
version = "5.1.8"
5757
resource_group_id = module.resource_group.resource_group_id
5858
# Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
5959
# Note: Database instance and Key Protect must be created on the same region.
@@ -89,7 +89,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
8989
##############################################################################
9090
module "cbr_zone" {
9191
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
92-
version = "1.31.0"
92+
version = "1.31.2"
9393
name = "${var.prefix}-VPC-network-zone"
9494
zone_description = "CBR Network zone containing VPC"
9595
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -136,7 +136,7 @@ module "icd_mongodb" {
136136
module "secrets_manager" {
137137
count = var.existing_secrets_manager_instance_guid == null ? 1 : 0
138138
source = "terraform-ibm-modules/secrets-manager/ibm"
139-
version = "2.3.1"
139+
version = "2.6.3"
140140
resource_group_id = module.resource_group.resource_group_id
141141
region = var.region
142142
secrets_manager_name = "${var.prefix}-secrets-manager"
@@ -148,7 +148,7 @@ module "secrets_manager" {
148148
# Add a Secrets Group to the secret manager instance
149149
module "secrets_manager_secrets_group" {
150150
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
151-
version = "1.3.7"
151+
version = "1.3.8"
152152
region = local.secrets_manager_region
153153
secrets_manager_guid = local.secrets_manager_guid
154154
#tfsec:ignore:general-secrets-no-plaintext-exposure

examples/fscloud/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.2.0"
7+
version = "1.2.1"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3939
##############################################################################
4040
module "cbr_zone" {
4141
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
42-
version = "1.31.0"
42+
version = "1.31.2"
4343
name = "${var.prefix}-VPC-network-zone"
4444
zone_description = "CBR Network zone containing VPC"
4545
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id

main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,14 +31,14 @@ locals {
3131
module "kms_key_crn_parser" {
3232
count = local.parse_kms_key ? 1 : 0
3333
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
34-
version = "1.1.0"
34+
version = "1.2.0"
3535
crn = var.kms_key_crn
3636
}
3737

3838
module "backup_key_crn_parser" {
3939
count = local.parse_backup_kms_key ? 1 : 0
4040
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
41-
version = "1.1.0"
41+
version = "1.2.0"
4242
crn = local.backup_encryption_key_crn
4343
}
4444

@@ -306,7 +306,7 @@ resource "ibm_resource_tag" "mongodb_tag" {
306306
module "cbr_rule" {
307307
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
308308
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
309-
version = "1.31.0"
309+
version = "1.31.2"
310310
rule_description = var.cbr_rules[count.index].description
311311
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
312312
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/standard/main.tf

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.2.0"
7+
version = "1.2.1"
88
resource_group_name = var.use_existing_resource_group == false ? ((var.prefix != null && var.prefix != "") ? "${var.prefix}-${var.resource_group_name}" : var.resource_group_name) : null
99
existing_resource_group_name = var.use_existing_resource_group == true ? var.resource_group_name : null
1010
}
@@ -25,7 +25,7 @@ module "kms" {
2525
}
2626
count = local.create_new_kms_key ? 1 : 0
2727
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
28-
version = "5.1.7"
28+
version = "5.1.8"
2929
create_key_protect_instance = false
3030
region = local.kms_region
3131
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -55,21 +55,21 @@ module "kms" {
5555
module "kms_instance_crn_parser" {
5656
count = var.existing_kms_instance_crn != null ? 1 : 0
5757
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
58-
version = "1.1.0"
58+
version = "1.2.0"
5959
crn = var.existing_kms_instance_crn
6060
}
6161

6262
module "kms_key_crn_parser" {
6363
count = var.existing_kms_key_crn != null ? 1 : 0
6464
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
65-
version = "1.1.0"
65+
version = "1.2.0"
6666
crn = var.existing_kms_key_crn
6767
}
6868

6969
module "kms_backup_key_crn_parser" {
7070
count = var.existing_backup_kms_key_crn != null ? 1 : 0
7171
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
72-
version = "1.1.0"
72+
version = "1.2.0"
7373
crn = var.existing_backup_kms_key_crn
7474
}
7575

@@ -232,7 +232,7 @@ locals {
232232
module "mongodb_instance_crn_parser" {
233233
count = var.existing_mongodb_instance_crn != null ? 1 : 0
234234
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
235-
version = "1.1.0"
235+
version = "1.2.0"
236236
crn = var.existing_mongodb_instance_crn
237237
}
238238

@@ -317,7 +317,7 @@ locals {
317317
module "secrets_manager_instance_crn_parser" {
318318
count = var.existing_secrets_manager_instance_crn != null ? 1 : 0
319319
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
320-
version = "1.1.0"
320+
version = "1.2.0"
321321
crn = var.existing_secrets_manager_instance_crn
322322
}
323323

@@ -386,7 +386,7 @@ module "secrets_manager_service_credentials" {
386386
count = length(local.service_credential_secrets) > 0 ? 1 : 0
387387
depends_on = [time_sleep.wait_for_mongodb_authorization_policy]
388388
source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
389-
version = "2.3.1"
389+
version = "2.6.3"
390390
existing_sm_instance_guid = local.existing_secrets_manager_instance_guid
391391
existing_sm_instance_region = local.existing_secrets_manager_instance_region
392392
endpoint_type = var.existing_secrets_manager_endpoint_type

0 commit comments

Comments
 (0)