Skip to content

Commit b5f5721

Browse files
fix(deps): update dependencies (#448)
1 parent 5145683 commit b5f5721

File tree

14 files changed

+51
-51
lines changed

14 files changed

+51
-51
lines changed

.github/workflows/ci.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-ci-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected].0
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected].1
1212
secrets: inherit

.github/workflows/release.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,5 +8,5 @@ on:
88

99
jobs:
1010
call-terraform-release-pipeline:
11-
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected].0
11+
uses: terraform-ibm-modules/common-pipeline-assets/.github/workflows/[email protected].1
1212
secrets: inherit

examples/advanced/main.tf

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.3"
7+
version = "1.4.4"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -16,7 +16,7 @@ module "resource_group" {
1616

1717
module "key_protect" {
1818
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
19-
version = "5.5.3"
19+
version = "5.5.4"
2020
key_protect_instance_name = "${var.prefix}-key-protect"
2121
resource_group_id = module.resource_group.resource_group_id
2222
region = var.region
@@ -39,7 +39,7 @@ module "key_protect" {
3939

4040
module "event_notifications" {
4141
source = "terraform-ibm-modules/event-notifications/ibm"
42-
version = "2.10.14"
42+
version = "2.10.16"
4343
resource_group_id = module.resource_group.resource_group_id
4444
name = "${var.prefix}-en"
4545
tags = var.resource_tags
@@ -130,7 +130,7 @@ module "secrets_manager" {
130130
# Create new code engine project
131131
module "code_engine_project" {
132132
source = "terraform-ibm-modules/code-engine/ibm//modules/project"
133-
version = "4.7.4"
133+
version = "4.7.6"
134134
name = "${var.prefix}-project"
135135
resource_group_id = module.resource_group.resource_group_id
136136
}
@@ -143,7 +143,7 @@ locals {
143143

144144
module "code_engine_secret" {
145145
source = "terraform-ibm-modules/code-engine/ibm//modules/secret"
146-
version = "4.7.4"
146+
version = "4.7.6"
147147
name = "${var.prefix}-rs"
148148
project_id = module.code_engine_project.id
149149
format = "registry"
@@ -163,7 +163,7 @@ resource "ibm_cr_namespace" "rg_namespace" {
163163
# Build example Go application in Code Engine project which dynamically generates User IBM Cloud IAM API Keys
164164
module "code_engine_build" {
165165
source = "terraform-ibm-modules/code-engine/ibm//modules/build"
166-
version = "4.7.4"
166+
version = "4.7.6"
167167
name = "${var.prefix}-build"
168168
region = var.region
169169
ibmcloud_api_key = var.ibmcloud_api_key
@@ -192,7 +192,7 @@ locals {
192192
module "code_engine_job" {
193193
depends_on = [module.code_engine_build]
194194
source = "terraform-ibm-modules/code-engine/ibm//modules/job"
195-
version = "4.7.4"
195+
version = "4.7.6"
196196
name = "${var.prefix}-job"
197197
image_reference = local.output_image
198198
image_secret = module.code_engine_secret.name

examples/basic/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
module "resource_group" {
22
source = "terraform-ibm-modules/resource-group/ibm"
3-
version = "1.4.3"
3+
version = "1.4.4"
44
# if an existing resource group is not set (null) create a new one using prefix
55
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
66
existing_resource_group_name = var.resource_group

examples/fscloud/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.4.3"
7+
version = "1.4.4"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -39,7 +39,7 @@ module "cbr_zone_schematics" {
3939

4040
module "event_notification" {
4141
source = "terraform-ibm-modules/event-notifications/ibm"
42-
version = "2.10.14"
42+
version = "2.10.16"
4343
resource_group_id = module.resource_group.resource_group_id
4444
name = "${var.prefix}-en"
4545
tags = var.resource_tags

modules/secrets/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ module "secrets_manager" {
5050

5151
| Name | Source | Version |
5252
|------|--------|---------|
53-
| <a name="module_secret_groups"></a> [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.24 |
53+
| <a name="module_secret_groups"></a> [secret\_groups](#module\_secret\_groups) | terraform-ibm-modules/secrets-manager-secret-group/ibm | 1.3.25 |
5454
| <a name="module_secrets"></a> [secrets](#module\_secrets) | terraform-ibm-modules/secrets-manager-secret/ibm | 1.9.1 |
5555

5656
### Resources

modules/secrets/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ data "ibm_sm_secret_groups" "existing_secret_groups" {
2525
module "secret_groups" {
2626
for_each = { for obj in local.secret_groups : obj.secret_group_name => obj }
2727
source = "terraform-ibm-modules/secrets-manager-secret-group/ibm"
28-
version = "1.3.24"
28+
version = "1.3.25"
2929
region = var.existing_sm_instance_region
3030
secrets_manager_guid = var.existing_sm_instance_guid
3131
secret_group_name = each.value.secret_group_name

solutions/fully-configurable/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ locals {
77

88
module "resource_group" {
99
source = "terraform-ibm-modules/resource-group/ibm"
10-
version = "1.4.3"
10+
version = "1.4.4"
1111
existing_resource_group_name = var.existing_resource_group_name
1212
}
1313

@@ -130,7 +130,7 @@ module "kms" {
130130
}
131131
count = var.existing_secrets_manager_crn == null && var.kms_encryption_enabled && var.existing_secrets_manager_kms_key_crn == null ? 1 : 0 # no need to create any KMS resources if passing an existing key
132132
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
133-
version = "5.5.3"
133+
version = "5.5.4"
134134
create_key_protect_instance = false
135135
region = local.kms_region
136136
existing_kms_instance_crn = var.existing_kms_instance_crn

solutions/fully-configurable/version.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ terraform {
44
required_providers {
55
ibm = {
66
source = "IBM-Cloud/ibm"
7-
version = "1.86.0"
7+
version = "1.86.1"
88
}
99
time = {
1010
source = "hashicorp/time"

0 commit comments

Comments
 (0)