File tree Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Expand file tree Collapse file tree 2 files changed +4
-4
lines changed Original file line number Diff line number Diff line change @@ -21,7 +21,7 @@ locals {
2121
2222module "key_protect_all_inclusive" {
2323 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
24- version = " 5.1.6 "
24+ version = " 5.1.7 "
2525 resource_group_id = module. resource_group . resource_group_id
2626 # Note: Database instance and Key Protect must be created in the same region when using BYOK
2727 # See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok
@@ -58,7 +58,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
5858
5959module "vpc" {
6060 source = " terraform-ibm-modules/landing-zone-vpc/ibm"
61- version = " 7.23.11 "
61+ version = " 7.23.12 "
6262 resource_group_id = module. resource_group . resource_group_id
6363 region = var. region
6464 prefix = var. prefix
Original file line number Diff line number Diff line change @@ -25,7 +25,7 @@ module "kms" {
2525 }
2626 count = local. create_new_kms_key ? 1 : 0
2727 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
28- version = " 5.1.6 "
28+ version = " 5.1.7 "
2929 create_key_protect_instance = false
3030 region = local. kms_region
3131 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -390,7 +390,7 @@ module "secrets_manager_service_credentials" {
390390 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
391391 depends_on = [time_sleep . wait_for_mysql_authorization_policy ]
392392 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
393- version = " 2.3.0 "
393+ version = " 2.3.1 "
394394 existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
395395 existing_sm_instance_region = local. existing_secrets_manager_instance_region
396396 endpoint_type = var. existing_secrets_manager_endpoint_type
You can’t perform that action at this time.
0 commit comments