Skip to content

Commit 5c52795

Browse files
fix(deps): update terraform-module (#306)
Co-authored-by: shemau <[email protected]>
1 parent aabe63c commit 5c52795

File tree

7 files changed

+12
-12
lines changed

7 files changed

+12
-12
lines changed

examples/complete/README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,8 @@ This examples handles the provisioning of a new Secrets Manager instance.
1515

1616
| Name | Source | Version |
1717
|------|--------|---------|
18-
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.18.8 |
19-
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.20.0 |
18+
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.19.4 |
19+
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.21.3 |
2020
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.6 |
2121
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |
2222

examples/complete/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ module "resource_group" {
88

99
module "key_protect" {
1010
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
11-
version = "4.20.0"
11+
version = "4.21.3"
1212
key_protect_instance_name = "${var.prefix}-key-protect"
1313
resource_group_id = module.resource_group.resource_group_id
1414
region = var.region
@@ -27,7 +27,7 @@ module "key_protect" {
2727

2828
module "event_notification" {
2929
source = "terraform-ibm-modules/event-notifications/ibm"
30-
version = "1.18.8"
30+
version = "1.19.4"
3131
resource_group_id = module.resource_group.resource_group_id
3232
name = "${var.prefix}-en"
3333
tags = var.resource_tags

examples/fscloud/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ module "cbr_zone" {
4242

4343
module "event_notification" {
4444
source = "terraform-ibm-modules/event-notifications/ibm"
45-
version = "1.18.8"
45+
version = "1.19.4"
4646
resource_group_id = module.resource_group.resource_group_id
4747
name = "${var.prefix}-en"
4848
tags = var.resource_tags

modules/secrets/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ module "secrets_manager" {
5050

5151
| Name | Source | Version |
5252
|------|--------|---------|
53-
| <a name="module_secret_groups"></a> [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.2.2 |
53+
| <a name="module_secret_groups"></a> [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.2.3 |
5454
| <a name="module_secrets"></a> [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.7.0 |
5555

5656
### Resources

modules/secrets/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ data "ibm_sm_secret_groups" "existing_secret_groups" {
2121
module "secret_groups" {
2222
for_each = { for obj in local.secret_groups : obj.secret_group_name => obj }
2323
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
24-
version = "1.2.2"
24+
version = "1.2.3"
2525
region = var.existing_sm_instance_region
2626
secrets_manager_guid = var.existing_sm_instance_guid
2727
secret_group_name = each.value.secret_group_name

solutions/standard/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ module "kms" {
6565
}
6666
count = var.existing_secrets_manager_crn != null || var.existing_secrets_manager_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket
6767
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
68-
version = "4.20.0"
68+
version = "4.21.3"
6969
create_key_protect_instance = false
7070
region = local.kms_region
7171
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -123,7 +123,7 @@ module "secrets_manager" {
123123
module "iam_secrets_engine" {
124124
count = var.iam_engine_enabled ? 1 : 0
125125
source = "terraform-ibm-modules/secrets-manager-iam-engine/ibm"
126-
version = "1.2.8"
126+
version = "1.2.10"
127127
region = local.secrets_manager_region
128128
iam_engine_name = try("${local.prefix}-${var.iam_engine_name}", var.iam_engine_name)
129129
secrets_manager_guid = local.secrets_manager_guid
@@ -135,7 +135,7 @@ module "iam_secrets_engine" {
135135
module "secrets_manager_public_cert_engine" {
136136
count = var.public_cert_engine_enabled ? 1 : 0
137137
source = "terraform-ibm-modules/secrets-manager-public-cert-engine/ibm"
138-
version = "1.0.2"
138+
version = "1.0.3"
139139
providers = {
140140
ibm = ibm
141141
ibm.secret-store = ibm

tests/existing-resources/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "event_notifications" {
1818
source = "terraform-ibm-modules/event-notifications/ibm"
19-
version = "1.18.8"
19+
version = "1.19.4"
2020
resource_group_id = module.resource_group.resource_group_id
2121
name = "${var.prefix}-en"
2222
tags = var.resource_tags
@@ -31,7 +31,7 @@ module "event_notifications" {
3131

3232
module "key_protect" {
3333
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
34-
version = "4.20.0"
34+
version = "4.21.3"
3535
key_protect_instance_name = "${var.prefix}-key-protect"
3636
resource_group_id = module.resource_group.resource_group_id
3737
region = var.region

0 commit comments

Comments
 (0)