This repository was archived by the owner on Mar 19, 2025. It is now read-only.
File tree Expand file tree Collapse file tree 3 files changed +9
-9
lines changed
tests/resources/existing-resources/instances Expand file tree Collapse file tree 3 files changed +9
-9
lines changed Original file line number Diff line number Diff line change @@ -25,15 +25,15 @@ This solution supports provisioning and configuring the following infrastructure
2525
2626| Name | Source | Version |
2727| ------| --------| ---------|
28- | <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.16.5 |
29- | <a name =" module_cos " ></a > [ cos] ( #module\_ cos ) | terraform-ibm-modules/cos/ibm//modules/fscloud | 8.16.5 |
28+ | <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.19.2 |
29+ | <a name =" module_cos " ></a > [ cos] ( #module\_ cos ) | terraform-ibm-modules/cos/ibm//modules/fscloud | 8.19.2 |
3030| <a name =" module_create_profile_attachment " ></a > [ create\_ profile\_ attachment] ( #module\_ create\_ profile\_ attachment ) | terraform-ibm-modules/scc/ibm//modules/attachment | 1.8.36 |
3131| <a name =" module_existing_cos_crn_parser " ></a > [ existing\_ cos\_ crn\_ parser] ( #module\_ existing\_ cos\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3232| <a name =" module_existing_en_crn_parser " ></a > [ existing\_ en\_ crn\_ parser] ( #module\_ existing\_ en\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3333| <a name =" module_existing_kms_crn_parser " ></a > [ existing\_ kms\_ crn\_ parser] ( #module\_ existing\_ kms\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3434| <a name =" module_existing_kms_key_crn_parser " ></a > [ existing\_ kms\_ key\_ crn\_ parser] ( #module\_ existing\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3535| <a name =" module_existing_scc_crn_parser " ></a > [ existing\_ scc\_ crn\_ parser] ( #module\_ existing\_ scc\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
36- | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.19.2 |
36+ | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.19.5 |
3737| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
3838| <a name =" module_scc " ></a > [ scc] ( #module\_ scc ) | terraform-ibm-modules/scc/ibm | 1.8.36 |
3939| <a name =" module_scc_wp " ></a > [ scc\_ wp] ( #module\_ scc\_ wp ) | terraform-ibm-modules/scc-workload-protection/ibm | 1.4.3 |
Original file line number Diff line number Diff line change @@ -115,7 +115,7 @@ module "kms" {
115115 }
116116 count = var. existing_scc_cos_kms_key_crn != null || var. existing_scc_cos_bucket_name != null || var. existing_scc_instance_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key or bucket, or SCC instance
117117 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
118- version = " 4.19.2 "
118+ version = " 4.19.5 "
119119 create_key_protect_instance = false
120120 region = local. kms_region
121121 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -187,7 +187,7 @@ module "cos" {
187187 }
188188 count = var. existing_scc_cos_bucket_name == null && var. existing_scc_instance_crn == null ? 1 : 0 # no need to call COS module if consumer is passing existing SCC instance or COS bucket
189189 source = " terraform-ibm-modules/cos/ibm//modules/fscloud"
190- version = " 8.16.5 "
190+ version = " 8.19.2 "
191191 resource_group_id = module. resource_group . resource_group_id
192192 create_cos_instance = var. existing_cos_instance_crn == null ? true : false # don't create instance if existing one passed in
193193 cos_instance_name = local. cos_instance_name
@@ -206,7 +206,7 @@ module "buckets" {
206206 count = local. create_cross_account_auth_policy ? 1 : 0
207207 depends_on = [time_sleep . wait_for_authorization_policy [0 ]]
208208 source = " terraform-ibm-modules/cos/ibm//modules/buckets"
209- version = " 8.16.5 "
209+ version = " 8.19.2 "
210210 bucket_configs = local. bucket_config
211211}
212212
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module "cos" {
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.16.5 "
19+ version = " 8.19.2 "
2020 resource_group_id = module. resource_group . resource_group_id
2121 region = var. region
2222 cos_instance_name = " ${ var . prefix } -cos"
@@ -32,7 +32,7 @@ module "cos" {
3232
3333module "cloud_monitoring" {
3434 source = " terraform-ibm-modules/observability-instances/ibm//modules/cloud_monitoring"
35- version = " 3.4.0 "
35+ version = " 3.4.1 "
3636 resource_group_id = module. resource_group . resource_group_id
3737 region = var. region
3838 instance_name = " ${ var . prefix } -mon"
@@ -46,7 +46,7 @@ module "cloud_monitoring" {
4646
4747module "event_notifications" {
4848 source = " terraform-ibm-modules/event-notifications/ibm"
49- version = " 1.15.14 "
49+ version = " 1.17.1 "
5050 resource_group_id = module. resource_group . resource_group_id
5151 name = " ${ var . prefix } -en"
5252 tags = var. resource_tags
You can’t perform that action at this time.
0 commit comments