Skip to content

Commit 90b868b

Browse files
authored
fix(deps): update terraform-module (#115)
1 parent b0f657b commit 90b868b

File tree

7 files changed

+10
-10
lines changed

7 files changed

+10
-10
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ You need the following permissions to run this module.
7474

7575
| Name | Source | Version |
7676
|------|--------|---------|
77-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.19.1 |
77+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.22.0 |
7878

7979
### Resources
8080

examples/complete/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ This examples handles the provisioning of a new Secrets Manager instance.
1414

1515
| Name | Source | Version |
1616
|------|--------|---------|
17-
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.2.2 |
17+
| <a name="module_event_notification"></a> [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.3.2 |
1818
| <a name="module_key_protect"></a> [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.11.2 |
1919
| <a name="module_resource_group"></a> [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.5 |
2020
| <a name="module_secrets_manager"></a> [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a |

examples/complete/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ module "key_protect" {
2626

2727
module "event_notification" {
2828
source = "terraform-ibm-modules/event-notifications/ibm"
29-
version = "1.2.2"
29+
version = "1.3.2"
3030
resource_group_id = module.resource_group.resource_group_id
3131
name = "${var.prefix}-en"
3232
tags = var.resource_tags

examples/fscloud/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ resource "ibm_is_vpc" "vpc" {
3030
##############################################################################
3131
module "cbr_zone" {
3232
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
33-
version = "1.18.0"
33+
version = "1.22.0"
3434
name = "${var.prefix}-CBR-zone"
3535
zone_description = "CBR Network zone representing VPC"
3636
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -42,7 +42,7 @@ module "cbr_zone" {
4242

4343
module "event_notification" {
4444
source = "terraform-ibm-modules/event-notifications/ibm"
45-
version = "1.0.4"
45+
version = "1.3.2"
4646
resource_group_id = module.resource_group.resource_group_id
4747
name = "${var.prefix}-en"
4848
tags = var.resource_tags

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -74,7 +74,7 @@ locals {
7474
module "cbr_rule" {
7575
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
7676
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
77-
version = "1.19.1"
77+
version = "1.22.0"
7878
rule_description = var.cbr_rules[count.index].description
7979
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
8080
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/standard/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ locals {
99
module "resource_group" {
1010
count = var.existing_secrets_manager_crn == null ? 1 : 0
1111
source = "terraform-ibm-modules/resource-group/ibm"
12-
version = "1.1.4"
12+
version = "1.1.5"
1313
resource_group_name = var.use_existing_resource_group == false ? (var.prefix != null ? "${var.prefix}-${var.resource_group_name}" : var.resource_group_name) : null
1414
existing_resource_group_name = var.use_existing_resource_group == true ? var.resource_group_name : null
1515
}
@@ -95,7 +95,7 @@ module "secrets_manager" {
9595
module "iam_secrets_engine" {
9696
count = var.iam_engine_enabled ? 1 : 0
9797
source = "terraform-ibm-modules/secrets-manager-iam-engine/ibm"
98-
version = "1.1.0"
98+
version = "1.2.0"
9999
region = local.secrets_manager_region
100100
iam_engine_name = var.prefix != null ? "${var.prefix}-${var.iam_engine_name}" : var.iam_engine_name
101101
secrets_manager_guid = local.secrets_manager_guid
@@ -133,7 +133,7 @@ module "secrets_manager_public_cert_engine" {
133133
module "private_secret_engine" {
134134
count = var.private_engine_enabled ? 1 : 0
135135
source = "terraform-ibm-modules/secrets-manager-private-cert-engine/ibm"
136-
version = "1.3.0"
136+
version = "1.3.1"
137137
secrets_manager_guid = local.secrets_manager_guid
138138
region = var.region
139139
root_ca_name = var.root_ca_name

tests/existing-resources/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "event_notifications" {
1818
source = "terraform-ibm-modules/event-notifications/ibm"
19-
version = "1.3.1"
19+
version = "1.3.2"
2020
resource_group_id = module.resource_group.resource_group_id
2121
name = "${var.prefix}-en"
2222
tags = var.resource_tags

0 commit comments

Comments
 (0)