diff --git a/README.md b/README.md index 03067ab..115b7e6 100644 --- a/README.md +++ b/README.md @@ -73,7 +73,7 @@ You need the following permissions to run this module. | Name | Source | Version | |------|--------|---------| -| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.30.0 | +| [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 | | [crn\_parser](#module\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 | | [en\_crn\_parser](#module\_en\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 | diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf index 4cadfce..017c9bf 100644 --- a/examples/advanced/main.tf +++ b/examples/advanced/main.tf @@ -16,7 +16,7 @@ module "resource_group" { module "cos" { count = var.existing_scc_instance_crn == null ? 1 : 0 source = "terraform-ibm-modules/cos/ibm" - version = "8.21.11" + version = "8.21.16" cos_instance_name = "${var.prefix}-cos" kms_encryption_enabled = false retention_enabled = false @@ -30,7 +30,7 @@ module "cos" { module "event_notification" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "1.19.18" + version = "1.19.20" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags @@ -45,7 +45,7 @@ module "event_notification" { module "scc_wp" { source = "terraform-ibm-modules/scc-workload-protection/ibm" - version = "1.5.8" + version = "1.5.9" name = "${var.prefix}-wp" region = var.region resource_group_id = module.resource_group.resource_group_id @@ -150,7 +150,7 @@ resource "ibm_is_vpc" "example_vpc" { ############################################################################## module "cbr_zone" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.30.0" + version = "1.31.0" name = "${var.prefix}-VPC-network-zone" zone_description = "CBR Network zone representing VPC" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id diff --git a/examples/basic/main.tf b/examples/basic/main.tf index f5fa20e..be5363f 100644 --- a/examples/basic/main.tf +++ b/examples/basic/main.tf @@ -7,7 +7,7 @@ module "resource_group" { module "cos" { source = "terraform-ibm-modules/cos/ibm" - version = "8.21.11" + version = "8.21.16" cos_instance_name = "${var.prefix}-cos" kms_encryption_enabled = false retention_enabled = false diff --git a/main.tf b/main.tf index 134ce40..5bce99d 100644 --- a/main.tf +++ b/main.tf @@ -231,7 +231,7 @@ resource "ibm_scc_provider_type_instance" "custom_integrations" { module "cbr_rule" { count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0 source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.30.0" + version = "1.31.0" rule_description = var.cbr_rules[count.index].description enforcement_mode = var.cbr_rules[count.index].enforcement_mode rule_contexts = var.cbr_rules[count.index].rule_contexts diff --git a/solutions/fully-configurable/README.md b/solutions/fully-configurable/README.md index c08a7a5..1d28541 100644 --- a/solutions/fully-configurable/README.md +++ b/solutions/fully-configurable/README.md @@ -29,13 +29,13 @@ This solution supports provisioning and configuring the following infrastructure | Name | Source | Version | |------|--------|---------| -| [buckets](#module\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.11 | +| [buckets](#module\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.16 | | [existing\_cos\_crn\_parser](#module\_existing\_cos\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 | | [existing\_en\_crn\_parser](#module\_existing\_en\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 | | [existing\_kms\_crn\_parser](#module\_existing\_kms\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 | | [existing\_kms\_key\_crn\_parser](#module\_existing\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 | | [existing\_scc\_crn\_parser](#module\_existing\_scc\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 | -| [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.0.0 | +| [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.0.1 | | [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.0 | | [scc](#module\_scc) | ../.. | n/a | | [scc\_attachment](#module\_scc\_attachment) | ../../modules/attachment | n/a | diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf index 26f48d0..4112a5b 100644 --- a/solutions/fully-configurable/main.tf +++ b/solutions/fully-configurable/main.tf @@ -100,7 +100,7 @@ module "kms" { } count = var.existing_scc_instance_crn == null && var.kms_encryption_enabled_bucket && var.existing_kms_key_crn == null ? 1 : 0 source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.0.0" + version = "5.0.1" create_key_protect_instance = false region = local.kms_region existing_kms_instance_crn = var.existing_kms_instance_crn @@ -171,7 +171,7 @@ module "buckets" { count = var.existing_scc_instance_crn == null ? 1 : 0 depends_on = [time_sleep.wait_for_authorization_policy[0]] source = "terraform-ibm-modules/cos/ibm//modules/buckets" - version = "8.21.11" + version = "8.21.16" bucket_configs = local.bucket_config } diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf index c851539..a136563 100644 --- a/tests/existing-resources/main.tf +++ b/tests/existing-resources/main.tf @@ -7,7 +7,7 @@ module "resource_group" { module "cos" { source = "terraform-ibm-modules/cos/ibm" - version = "8.21.11" + version = "8.21.16" cos_instance_name = "${var.prefix}-cos" kms_encryption_enabled = false retention_enabled = false diff --git a/tests/resources/existing-resources-test/main.tf b/tests/resources/existing-resources-test/main.tf index fe45f97..a7a83ff 100644 --- a/tests/resources/existing-resources-test/main.tf +++ b/tests/resources/existing-resources-test/main.tf @@ -16,7 +16,7 @@ module "resource_group" { module "cos" { source = "terraform-ibm-modules/cos/ibm" - version = "8.21.11" + version = "8.21.16" cos_instance_name = "${var.prefix}-cos" kms_encryption_enabled = false retention_enabled = false @@ -30,7 +30,7 @@ module "cos" { module "scc" { source = "terraform-ibm-modules/scc/ibm" - version = "2.1.12" + version = "2.1.14" instance_name = var.prefix region = var.region resource_group_id = module.resource_group.resource_group_id @@ -45,7 +45,7 @@ module "scc" { module "scc_wp" { source = "terraform-ibm-modules/scc-workload-protection/ibm" - version = "1.5.8" + version = "1.5.9" name = var.prefix region = var.region resource_group_id = module.resource_group.resource_group_id diff --git a/tests/resources/prereq-resources/main.tf b/tests/resources/prereq-resources/main.tf index a85be62..7d0284b 100644 --- a/tests/resources/prereq-resources/main.tf +++ b/tests/resources/prereq-resources/main.tf @@ -16,7 +16,7 @@ module "resource_group" { module "cos" { source = "terraform-ibm-modules/cos/ibm" - version = "8.21.11" + version = "8.21.16" resource_group_id = module.resource_group.resource_group_id cos_instance_name = "${var.prefix}-cos" cos_tags = var.resource_tags @@ -29,7 +29,7 @@ module "cos" { module "scc_wp" { source = "terraform-ibm-modules/scc-workload-protection/ibm" - version = "1.5.8" + version = "1.5.9" name = var.prefix region = var.region resource_group_id = module.resource_group.resource_group_id @@ -42,7 +42,7 @@ module "scc_wp" { module "cloud_monitoring" { source = "terraform-ibm-modules/observability-instances/ibm//modules/cloud_monitoring" - version = "3.5.0" + version = "3.5.1" resource_group_id = module.resource_group.resource_group_id region = var.region instance_name = "${var.prefix}-mon" @@ -56,7 +56,7 @@ module "cloud_monitoring" { module "event_notifications" { source = "terraform-ibm-modules/event-notifications/ibm" - version = "1.19.18" + version = "1.19.20" resource_group_id = module.resource_group.resource_group_id name = "${var.prefix}-en" tags = var.resource_tags