This repository was archived by the owner on May 28, 2025. It is now read-only.
File tree Expand file tree Collapse file tree 7 files changed +22
-22
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 7 files changed +22
-22
lines changed Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.1.6 "
7+ version = " 1.2.0 "
88 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
99 existing_resource_group_name = var. resource_group
1010}
@@ -16,7 +16,7 @@ module "resource_group" {
1616module "cos" {
1717 count = var. existing_scc_instance_crn == null ? 1 : 0
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.21.6 "
19+ version = " 8.21.8 "
2020 cos_instance_name = " ${ var . prefix } -cos"
2121 kms_encryption_enabled = false
2222 retention_enabled = false
@@ -30,7 +30,7 @@ module "cos" {
3030
3131module "event_notification" {
3232 source = " terraform-ibm-modules/event-notifications/ibm"
33- version = " 1.19.7 "
33+ version = " 1.19.11 "
3434 resource_group_id = module. resource_group . resource_group_id
3535 name = " ${ var . prefix } -en"
3636 tags = var. resource_tags
@@ -45,7 +45,7 @@ module "event_notification" {
4545
4646module "scc_wp" {
4747 source = " terraform-ibm-modules/scc-workload-protection/ibm"
48- version = " 1.5.4 "
48+ version = " 1.5.5 "
4949 name = " ${ var . prefix } -wp"
5050 region = var. region
5151 resource_group_id = module. resource_group . resource_group_id
Original file line number Diff line number Diff line change 11module "resource_group" {
22 source = " terraform-ibm-modules/resource-group/ibm"
3- version = " 1.1.6 "
3+ version = " 1.2.0 "
44 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
55 existing_resource_group_name = var. resource_group
66}
77
88module "cos" {
99 source = " terraform-ibm-modules/cos/ibm"
10- version = " 8.21.6 "
10+ version = " 8.21.8 "
1111 cos_instance_name = " ${ var . prefix } -cos"
1212 kms_encryption_enabled = false
1313 retention_enabled = false
Original file line number Diff line number Diff line change @@ -29,14 +29,14 @@ This solution supports provisioning and configuring the following infrastructure
2929
3030| Name | Source | Version |
3131| ------| --------| ---------|
32- | <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.6 |
32+ | <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.8 |
3333| <a name =" module_existing_cos_crn_parser " ></a > [ existing\_ cos\_ crn\_ parser] ( #module\_ existing\_ cos\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3434| <a name =" module_existing_en_crn_parser " ></a > [ existing\_ en\_ crn\_ parser] ( #module\_ existing\_ en\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3535| <a name =" module_existing_kms_crn_parser " ></a > [ existing\_ kms\_ crn\_ parser] ( #module\_ existing\_ kms\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3636| <a name =" module_existing_kms_key_crn_parser " ></a > [ existing\_ kms\_ key\_ crn\_ parser] ( #module\_ existing\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
3737| <a name =" module_existing_scc_crn_parser " ></a > [ existing\_ scc\_ crn\_ parser] ( #module\_ existing\_ scc\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
38- | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.21.3 |
39- | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
38+ | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.21.5 |
39+ | <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
4040| <a name =" module_scc " ></a > [ scc] ( #module\_ scc ) | ../.. | n/a |
4141| <a name =" module_scc_attachment " ></a > [ scc\_ attachment] ( #module\_ scc\_ attachment ) | ../../modules/attachment | n/a |
4242
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.1.6 "
7+ version = " 1.2.0 "
88 existing_resource_group_name = var. existing_resource_group_name
99}
1010
@@ -100,7 +100,7 @@ module "kms" {
100100 }
101101 count = var. existing_scc_instance_crn == null && var. kms_encryption_enabled_bucket && var. existing_kms_key_crn == null ? 1 : 0
102102 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
103- version = " 4.21.3 "
103+ version = " 4.21.5 "
104104 create_key_protect_instance = false
105105 region = local. kms_region
106106 existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -171,7 +171,7 @@ module "buckets" {
171171 count = var. existing_scc_instance_crn == null ? 1 : 0
172172 depends_on = [time_sleep . wait_for_authorization_policy [0 ]]
173173 source = " terraform-ibm-modules/cos/ibm//modules/buckets"
174- version = " 8.21.6 "
174+ version = " 8.21.8 "
175175 bucket_configs = local. bucket_config
176176}
177177
Original file line number Diff line number Diff line change 11module "resource_group" {
22 source = " terraform-ibm-modules/resource-group/ibm"
3- version = " 1.1.6 "
3+ version = " 1.2.0 "
44 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
55 existing_resource_group_name = var. resource_group
66}
77
88module "cos" {
99 source = " terraform-ibm-modules/cos/ibm"
10- version = " 8.21.6 "
10+ version = " 8.21.8 "
1111 cos_instance_name = " ${ var . prefix } -cos"
1212 kms_encryption_enabled = false
1313 retention_enabled = false
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.1.6 "
7+ version = " 1.2.0 "
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
@@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module "cos" {
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.21.6 "
19+ version = " 8.21.8 "
2020 cos_instance_name = " ${ var . prefix } -cos"
2121 kms_encryption_enabled = false
2222 retention_enabled = false
@@ -30,7 +30,7 @@ module "cos" {
3030
3131module "scc" {
3232 source = " terraform-ibm-modules/scc/ibm"
33- version = " 2.1.7 "
33+ version = " 2.1.8 "
3434 instance_name = var. prefix
3535 region = var. region
3636 resource_group_id = module. resource_group . resource_group_id
@@ -45,7 +45,7 @@ module "scc" {
4545
4646module "scc_wp" {
4747 source = " terraform-ibm-modules/scc-workload-protection/ibm"
48- version = " 1.5.4 "
48+ version = " 1.5.5 "
4949 name = var. prefix
5050 region = var. region
5151 resource_group_id = module. resource_group . resource_group_id
Original file line number Diff line number Diff line change 44
55module "resource_group" {
66 source = " terraform-ibm-modules/resource-group/ibm"
7- version = " 1.1.6 "
7+ version = " 1.2.0 "
88 # if an existing resource group is not set (null) create a new one using prefix
99 resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
1010 existing_resource_group_name = var. resource_group
@@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module "cos" {
1818 source = " terraform-ibm-modules/cos/ibm"
19- version = " 8.21.6 "
19+ version = " 8.21.8 "
2020 resource_group_id = module. resource_group . resource_group_id
2121 cos_instance_name = " ${ var . prefix } -cos"
2222 cos_tags = var. resource_tags
@@ -29,7 +29,7 @@ module "cos" {
2929
3030module "scc_wp" {
3131 source = " terraform-ibm-modules/scc-workload-protection/ibm"
32- version = " 1.5.4 "
32+ version = " 1.5.5 "
3333 name = var. prefix
3434 region = var. region
3535 resource_group_id = module. resource_group . resource_group_id
@@ -56,7 +56,7 @@ module "cloud_monitoring" {
5656
5757module "event_notifications" {
5858 source = " terraform-ibm-modules/event-notifications/ibm"
59- version = " 1.19.7 "
59+ version = " 1.19.11 "
6060 resource_group_id = module. resource_group . resource_group_id
6161 name = " ${ var . prefix } -en"
6262 tags = var. resource_tags
You can’t perform that action at this time.
0 commit comments