File tree Expand file tree Collapse file tree 5 files changed +9
-9
lines changed Expand file tree Collapse file tree 5 files changed +9
-9
lines changed Original file line number Diff line number Diff line change @@ -15,8 +15,8 @@ This examples handles the provisioning of a new Secrets Manager instance.
1515
1616|  Name |  Source |  Version | 
1717| ------| --------| ---------| 
18- |  <a  name =" module_event_notification " ></a > [ event\_ notification] ( #module\_ event\_ notification )  |  terraform-ibm-modules/event-notifications/ibm |  1.17.1  | 
19- |  <a  name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect )  |  terraform-ibm-modules/kms-all-inclusive/ibm |  4.19.4  | 
18+ |  <a  name =" module_event_notification " ></a > [ event\_ notification] ( #module\_ event\_ notification )  |  terraform-ibm-modules/event-notifications/ibm |  1.18.2  | 
19+ |  <a  name =" module_key_protect " ></a > [ key\_ protect] ( #module\_ key\_ protect )  |  terraform-ibm-modules/kms-all-inclusive/ibm |  4.19.6  | 
2020|  <a  name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group )  |  terraform-ibm-modules/resource-group/ibm |  1.1.6 | 
2121|  <a  name =" module_secrets_manager " ></a > [ secrets\_ manager] ( #module\_ secrets\_ manager )  |  ../.. |  n/a | 
2222
Original file line number Diff line number Diff line change @@ -8,7 +8,7 @@ module "resource_group" {
88
99module  "key_protect"  {
1010  source                     =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
11-   version                    =  " 4.19.4 " 
11+   version                    =  " 4.19.6 " 
1212  key_protect_instance_name  =  " ${ var . prefix } -key-protect" 
1313  resource_group_id          =   module. resource_group . resource_group_id 
1414  region                     =   var. region 
@@ -27,7 +27,7 @@ module "key_protect" {
2727
2828module  "event_notification"  {
2929  source             =  " terraform-ibm-modules/event-notifications/ibm" 
30-   version            =  " 1.17.1 " 
30+   version            =  " 1.18.2 " 
3131  resource_group_id  =   module. resource_group . resource_group_id 
3232  name               =  " ${ var . prefix } -en" 
3333  tags               =   var. resource_tags 
Original file line number Diff line number Diff line change @@ -42,7 +42,7 @@ module "cbr_zone" {
4242
4343module  "event_notification"  {
4444  source             =  " terraform-ibm-modules/event-notifications/ibm" 
45-   version            =  " 1.17.1 " 
45+   version            =  " 1.18.2 " 
4646  resource_group_id  =   module. resource_group . resource_group_id 
4747  name               =  " ${ var . prefix } -en" 
4848  tags               =   var. resource_tags 
Original file line number Diff line number Diff line change @@ -65,7 +65,7 @@ module "kms" {
6565  }
6666  count                        =   var. existing_secrets_manager_crn  !=  null  ||  var. existing_secrets_manager_kms_key_crn  !=  null  ?  0  :  1  #  no need to create any KMS resources if passing an existing key, or bucket
6767  source                       =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
68-   version                      =  " 4.19.4 " 
68+   version                      =  " 4.19.6 " 
6969  create_key_protect_instance  =  false 
7070  region                       =   local. kms_region 
7171  existing_kms_instance_crn    =   var. existing_kms_instance_crn 
@@ -123,7 +123,7 @@ module "secrets_manager" {
123123module  "iam_secrets_engine"  {
124124  count                 =   var. iam_engine_enabled  ?  1  :  0 
125125  source                =  " terraform-ibm-modules/secrets-manager-iam-engine/ibm" 
126-   version               =  " 1.2.6 " 
126+   version               =  " 1.2.7 " 
127127  region                =   local. secrets_manager_region 
128128  iam_engine_name       =  try (" ${ local . prefix } -${ var . iam_engine_name } "  , var. iam_engine_name )
129129  secrets_manager_guid  =   local. secrets_manager_guid 
Original file line number Diff line number Diff line change @@ -16,7 +16,7 @@ module "resource_group" {
1616
1717module  "event_notifications"  {
1818  source             =  " terraform-ibm-modules/event-notifications/ibm" 
19-   version            =  " 1.17.1 " 
19+   version            =  " 1.18.2 " 
2020  resource_group_id  =   module. resource_group . resource_group_id 
2121  name               =  " ${ var . prefix } -en" 
2222  tags               =   var. resource_tags 
@@ -31,7 +31,7 @@ module "event_notifications" {
3131
3232module  "key_protect"  {
3333  source                     =  " terraform-ibm-modules/kms-all-inclusive/ibm" 
34-   version                    =  " 4.19.4 " 
34+   version                    =  " 4.19.6 " 
3535  key_protect_instance_name  =  " ${ var . prefix } -key-protect" 
3636  resource_group_id          =   module. resource_group . resource_group_id 
3737  region                     =   var. region 
    
 
   
 
     
   
   
          
     
  
    
     
 
    
      
     
 
     
    You can’t perform that action at this time.
  
 
    
  
     
    
      
        
     
 
       
      
     
   
 
    
    
  
 
  
 
     
    
0 commit comments