This repository was archived by the owner on Mar 19, 2025. It is now read-only.
File tree Expand file tree Collapse file tree 3 files changed +8
-8
lines changed
tests/resources/existing-resources/instances Expand file tree Collapse file tree 3 files changed +8
-8
lines changed Original file line number Diff line number Diff line change @@ -25,15 +25,15 @@ This solution supports provisioning and configuring the following infrastructure
2525
2626| Name | Source | Version |
2727| ------| --------| ---------|
28- | <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.19.5 |
29- | <a name =" module_cos " ></a > [ cos] ( #module\_ cos ) | terraform-ibm-modules/cos/ibm//modules/fscloud | 8.19.5 |
28+ | <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.19.8 |
29+ | <a name =" module_cos " ></a > [ cos] ( #module\_ cos ) | terraform-ibm-modules/cos/ibm//modules/fscloud | 8.19.8 |
3030| <a name =" module_create_profile_attachment " ></a > [ create\_ profile\_ attachment] ( #module\_ create\_ profile\_ attachment ) | terraform-ibm-modules/scc/ibm//modules/attachment | 1.11.2 |
3131| <a name =" module_existing_cos_crn_parser " ></a > [ existing\_ cos\_ crn\_ parser] ( #module\_ existing\_ cos\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3232| <a name =" module_existing_en_crn_parser " ></a > [ existing\_ en\_ crn\_ parser] ( #module\_ existing\_ en\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3333| <a name =" module_existing_kms_crn_parser " ></a > [ existing\_ kms\_ crn\_ parser] ( #module\_ existing\_ kms\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3434| <a name =" module_existing_kms_key_crn_parser " ></a > [ existing\_ kms\_ key\_ crn\_ parser] ( #module\_ existing\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3535| <a name =" module_existing_scc_crn_parser " ></a > [ existing\_ scc\_ crn\_ parser] ( #module\_ existing\_ scc\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
36- | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.20.0 |
36+ | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.21.1 |
3737| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
3838| <a name =" module_scc " ></a > [ scc] ( #module\_ scc ) | terraform-ibm-modules/scc/ibm | 1.11.2 |
3939| <a name =" module_scc_wp " ></a > [ scc\_ wp] ( #module\_ scc\_ wp ) | terraform-ibm-modules/scc-workload-protection/ibm | 1.4.3 |
Original file line number Diff line number Diff line change @@ -126,7 +126,7 @@ module "kms" {
126126 }
127127 count = local. use_kms_module ? 1 : 0 # no need to create any KMS resources if passing an existing key or bucket, or SCC instance
128128 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
129- version = " 4.20.0 "
129+ version = " 4.21.1 "
130130 create_key_protect_instance = false
131131 region = local. kms_region
132132 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -196,7 +196,7 @@ module "cos" {
196196 }
197197 count = var. existing_scc_cos_bucket_name == null && var. existing_scc_instance_crn == null ? 1 : 0 # no need to call COS module if consumer is passing existing SCC instance or COS bucket
198198 source = " terraform-ibm-modules/cos/ibm//modules/fscloud"
199- version = " 8.19.5 "
199+ version = " 8.19.8 "
200200 resource_group_id = module. resource_group . resource_group_id
201201 create_cos_instance = var. existing_cos_instance_crn == null ? true : false # don't create instance if existing one passed in
202202 cos_instance_name = local. cos_instance_name
@@ -215,7 +215,7 @@ module "buckets" {
215215 count = local. create_cross_account_auth_policy ? 1 : 0
216216 depends_on = [time_sleep . wait_for_authorization_policy [0 ]]
217217 source = " terraform-ibm-modules/cos/ibm//modules/buckets"
218- version = " 8.19.5 "
218+ version = " 8.19.8 "
219219 bucket_configs = local. bucket_config
220220}
221221
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module "cos" {
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.19.5 "
19+ version = " 8.19.8 "
2020 resource_group_id = module. resource_group . resource_group_id
2121 region = var. region
2222 cos_instance_name = " ${ var . prefix } -cos"
@@ -46,7 +46,7 @@ module "cloud_monitoring" {
4646
4747module "event_notifications" {
4848 source = " terraform-ibm-modules/event-notifications/ibm"
49- version = " 1.18.8 "
49+ version = " 1.18.10 "
5050 resource_group_id = module. resource_group . resource_group_id
5151 name = " ${ var . prefix } -en"
5252 tags = var. resource_tags
You can’t perform that action at this time.
0 commit comments