File tree Expand file tree Collapse file tree 4 files changed +8
-11
lines changed
Expand file tree Collapse file tree 4 files changed +8
-11
lines changed Original file line number Diff line number Diff line change @@ -15,7 +15,7 @@ This examples handles the provisioning of a new Secrets Manager instance.
1515| Name | Source | Version |
1616| ------| --------| ---------|
1717| <a name =" module_event_notification " ></a > [ event\_ notification] ( #module\_ event\_ notification ) | terraform-ibm-modules/event-notifications/ibm | 1.10.17 |
18- | <a name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.15.13 |
18+ | <a name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect ) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.16.4 |
1919| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
2020| <a name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager ) | ../.. | n/a |
2121
Original file line number Diff line number Diff line change @@ -8,14 +8,13 @@ module "resource_group" {
88
99module "key_protect" {
1010 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
11- version = " 4.15.13 "
11+ version = " 4.16.4 "
1212 key_protect_instance_name = " ${ var . prefix } -key-protect"
1313 resource_group_id = module. resource_group . resource_group_id
1414 region = var. region
1515 keys = [
1616 {
17- key_ring_name = " ${ var . prefix } -sm"
18- force_delete_key_ring = true
17+ key_ring_name = " ${ var . prefix } -sm"
1918 keys = [
2019 {
2120 key_name = " ${ var . prefix } -sm-key"
Original file line number Diff line number Diff line change @@ -64,17 +64,16 @@ module "kms" {
6464 }
6565 count = var. existing_secrets_manager_crn != null || var. existing_secrets_manager_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
6666 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
67- version = " 4.15.13 "
67+ version = " 4.16.4 "
6868 create_key_protect_instance = false
6969 region = local. kms_region
7070 existing_kms_instance_crn = var. existing_kms_instance_crn
7171 key_ring_endpoint_type = var. kms_endpoint_type
7272 key_endpoint_type = var. kms_endpoint_type
7373 keys = [
7474 {
75- key_ring_name = local.kms_key_ring_name
76- existing_key_ring = false
77- force_delete_key_ring = true
75+ key_ring_name = local.kms_key_ring_name
76+ existing_key_ring = false
7877 keys = [
7978 {
8079 key_name = local.kms_key_name
Original file line number Diff line number Diff line change @@ -31,14 +31,13 @@ module "event_notifications" {
3131
3232module "key_protect" {
3333 source = " terraform-ibm-modules/kms-all-inclusive/ibm"
34- version = " 4.15.13 "
34+ version = " 4.16.4 "
3535 key_protect_instance_name = " ${ var . prefix } -key-protect"
3636 resource_group_id = module. resource_group . resource_group_id
3737 region = var. region
3838 keys = [
3939 {
40- key_ring_name = " ${ var . prefix } -sm"
41- force_delete_key_ring = true
40+ key_ring_name = " ${ var . prefix } -sm"
4241 keys = [
4342 {
4443 key_name = " ${ var . prefix } -sm-key"
You can’t perform that action at this time.
0 commit comments