File tree Expand file tree Collapse file tree 11 files changed +18
-18
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 11 files changed +18
-18
lines changed Original file line number Diff line number Diff line change @@ -65,7 +65,7 @@ You need the following permissions to run this module.
6565| Name | Source | Version |
6666| ------| --------| ---------|
6767| <a name =" module_backup_key_crn_parser " ></a > [ backup\_ key\_ crn\_ parser] ( #module\_ backup\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
68- | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.4 |
68+ | <a name =" module_cbr_rule " ></a > [ cbr\_ rule] ( #module\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.33.5 |
6969| <a name =" module_kms_key_crn_parser " ></a > [ kms\_ key\_ crn\_ parser] ( #module\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.2.0 |
7070
7171### Resources
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.3 .0"
7+ version = " 1.4 .0"
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.3 .0"
7+ version = " 1.4 .0"
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change @@ -17,7 +17,7 @@ locals {
1717
1818module "resource_group" {
1919 source = " terraform-ibm-modules/resource-group/ibm"
20- version = " 1.3 .0"
20+ version = " 1.4 .0"
2121 # if an existing resource group is not set (null) create a new one using prefix
2222 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
2323 existing_resource_group_name = var. resource_group
@@ -52,7 +52,7 @@ locals {
5252
5353module "key_protect_all_inclusive" {
5454 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
55- version = " 5.3.4 "
55+ version = " 5.4.0 "
5656 resource_group_id = module. resource_group . resource_group_id
5757 # Note: Database instance and Key Protect must be created in the same region when using BYOK
5858 # See https://cloud.ibm.com/docs/cloud-databases?topic=cloud-databases-key-protect&interface=ui#key-byok
@@ -89,7 +89,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
8989
9090module "cbr_zone" {
9191 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
92- version = " 1.33.4 "
92+ version = " 1.33.5 "
9393 name = " ${ var . prefix } -VPC-network-zone"
9494 zone_description = " CBR Network zone containing VPC"
9595 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.3 .0"
7+ version = " 1.4 .0"
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
@@ -39,7 +39,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
3939# #############################################################################
4040module "cbr_zone" {
4141 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
42- version = " 1.33.4 "
42+ version = " 1.33.5 "
4343 name = " ${ var . prefix } -VPC-network-zone"
4444 zone_description = " CBR Network zone containing VPC"
4545 account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change @@ -306,7 +306,7 @@ resource "ibm_resource_tag" "rabbitmq_tag" {
306306module "cbr_rule" {
307307 count = length (var. cbr_rules ) > 0 ? length (var. cbr_rules ) : 0
308308 source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
309- version = " 1.33.4 "
309+ version = " 1.33.5 "
310310 rule_description = var. cbr_rules [count . index ]. description
311311 enforcement_mode = var. cbr_rules [count . index ]. enforcement_mode
312312 rule_contexts = var. cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change 77
88module "resource_group" {
99 source = " terraform-ibm-modules/resource-group/ibm"
10- version = " 1.3 .0"
10+ version = " 1.4 .0"
1111 existing_resource_group_name = var. existing_resource_group_name
1212}
1313
@@ -32,7 +32,7 @@ module "kms" {
3232 }
3333 count = local. create_new_kms_key ? 1 : 0
3434 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
35- version = " 5.3.4 "
35+ version = " 5.4.0 "
3636 create_key_protect_instance = false
3737 region = local. kms_region
3838 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -401,7 +401,7 @@ locals {
401401module "secrets_manager_service_credentials" {
402402 count = length (local. service_credential_secrets ) > 0 ? 1 : 0
403403 source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
404- version = " 2.10.2 "
404+ version = " 2.10.3 "
405405 # converted into implicit dependency and removed explicit depends_on time_sleep.wait_for_rabbitmq_authorization_policy for this module because of issue https://github.com/terraform-ibm-modules/terraform-ibm-icd-redis/issues/608
406406 existing_sm_instance_guid = local. create_sm_auth_policy > 0 ? time_sleep. wait_for_rabbitmq_authorization_policy [0 ]. triggers [" secrets_manager_guid" ] : local. existing_secrets_manager_instance_guid
407407 existing_sm_instance_region = local. create_sm_auth_policy > 0 ? time_sleep. wait_for_rabbitmq_authorization_policy [0 ]. triggers [" secrets_manager_region" ] : local. existing_secrets_manager_instance_region
Original file line number Diff line number Diff line change @@ -4,7 +4,7 @@ terraform {
44 required_providers {
55 ibm = {
66 source = " IBM-Cloud/ibm"
7- version = " 1.83.3 "
7+ version = " 1.84.1 "
88 }
99 time = {
1010 source = " hashicorp/time"
Original file line number Diff line number Diff line change @@ -2,13 +2,13 @@ module github.com/terraform-ibm-modules/terraform-ibm-icd-rabbitmq
22
33go 1.24.0
44
5- toolchain go1.25.2
5+ toolchain go1.25.3
66
77require (
88 github.com/google/uuid v1.6.0
99 github.com/gruntwork-io/terratest v0.51.0
1010 github.com/stretchr/testify v1.11.1
11- github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.12
11+ github.com/terraform-ibm-modules/ibmcloud-terratest-wrapper v1.60.14
1212)
1313
1414require (
You can’t perform that action at this time.
0 commit comments