Skip to content

Commit 5555c40

Browse files
authored
fix(deps): update KMS module to 4.16.4 in the DA (#218)
1 parent 69b8bf9 commit 5555c40

File tree

4 files changed

+8
-11
lines changed

4 files changed

+8
-11
lines changed

examples/complete/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This examples handles the provisioning of a new Secrets Manager instance.
1515
| Name | Source | Version |
1616
|------|--------|---------|
1717
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.10.17 |
18-
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.15.13 |
18+
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.16.4 |
1919
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
2020
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
2121

examples/complete/main.tf

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,14 +8,13 @@ module "resource_group" {
88

99
module "key_protect" {
1010
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
11-
version = "4.15.13"
11+
version = "4.16.4"
1212
key_protect_instance_name = "${var.prefix}-key-protect"
1313
resource_group_id = module.resource_group.resource_group_id
1414
region = var.region
1515
keys = [
1616
{
17-
key_ring_name = "${var.prefix}-sm"
18-
force_delete_key_ring = true
17+
key_ring_name = "${var.prefix}-sm"
1918
keys = [
2019
{
2120
key_name = "${var.prefix}-sm-key"

solutions/standard/main.tf

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,17 +64,16 @@ module "kms" {
6464
}
6565
count = var.existing_secrets_manager_crn != null || var.existing_secrets_manager_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
6666
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
67-
version = "4.15.13"
67+
version = "4.16.4"
6868
create_key_protect_instance = false
6969
region = local.kms_region
7070
existing_kms_instance_crn = var.existing_kms_instance_crn
7171
key_ring_endpoint_type = var.kms_endpoint_type
7272
key_endpoint_type = var.kms_endpoint_type
7373
keys = [
7474
{
75-
key_ring_name = local.kms_key_ring_name
76-
existing_key_ring = false
77-
force_delete_key_ring = true
75+
key_ring_name = local.kms_key_ring_name
76+
existing_key_ring = false
7877
keys = [
7978
{
8079
key_name = local.kms_key_name

tests/existing-resources/main.tf

Lines changed: 2 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,14 +31,13 @@ module "event_notifications" {
3131

3232
module "key_protect" {
3333
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
34-
version = "4.15.13"
34+
version = "4.16.4"
3535
key_protect_instance_name = "${var.prefix}-key-protect"
3636
resource_group_id = module.resource_group.resource_group_id
3737
region = var.region
3838
keys = [
3939
{
40-
key_ring_name = "${var.prefix}-sm"
41-
force_delete_key_ring = true
40+
key_ring_name = "${var.prefix}-sm"
4241
keys = [
4342
{
4443
key_name = "${var.prefix}-sm-key"

0 commit comments

Comments
 (0)