File tree Expand file tree Collapse file tree 3 files changed +5
-5
lines changed Expand file tree Collapse file tree 3 files changed +5
-5
lines changed Original file line number Diff line number Diff line change @@ -53,7 +53,7 @@ locals {
5353
5454module "key_protect_all_inclusive" {
5555 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
56- version = " 5.1.5 "
56+ version = " 5.1.6 "
5757 resource_group_id = module. resource_group . resource_group_id
5858 # Only us-south, us-east and eu-de backup encryption keys are supported. See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok for details.
5959 # Note: Database instance and Key Protect must be created on the same region.
@@ -136,7 +136,7 @@ module "icd_mongodb" {
136136module "secrets_manager" {
137137 count = var. existing_secrets_manager_instance_guid == null ? 1 : 0
138138 source = " terraform-ibm-modules/secrets-manager/ibm"
139- version = " 2.2.9 "
139+ version = " 2.3.0 "
140140 resource_group_id = module. resource_group . resource_group_id
141141 region = var. region
142142 secrets_manager_name = " ${ var . prefix } -secrets-manager"
Original file line number Diff line number Diff line change @@ -25,7 +25,7 @@ module "kms" {
2525 }
2626 count = local. create_new_kms_key ? 1 : 0
2727 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
28- version = " 5.1.5 "
28+ version = " 5.1.6 "
2929 create_key_protect_instance = false
3030 region = local. kms_region
3131 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -386,7 +386,7 @@ module "secrets_manager_service_credentials" {
386386 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
387387 depends_on = [time_sleep . wait_for_mongodb_authorization_policy ]
388388 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
389- version = " 2.2.9 "
389+ version = " 2.3.0 "
390390 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
391391 existing_sm_instance_region = local. existing_secrets_manager_instance_region
392392 endpoint_type = var. existing_secrets_manager_endpoint_type
Original file line number Diff line number Diff line change @@ -4,7 +4,7 @@ terraform {
44 required_providers {
55 ibm = {
66 source = " IBM-Cloud/ibm"
7- version = " 1.78.2 "
7+ version = " 1.78.3 "
88 }
99 time = {
1010 source = " hashicorp/time"
You can’t perform that action at this time.
0 commit comments