diff --git a/examples/complete/README.md b/examples/complete/README.md index 46b90f6a..bf92f0bf 100644 --- a/examples/complete/README.md +++ b/examples/complete/README.md @@ -15,7 +15,7 @@ This examples handles the provisioning of a new Secrets Manager instance. | Name | Source | Version | |------|--------|---------| | [event\_notification](#module\_event\_notification) | terraform-ibm-modules/event-notifications/ibm | 1.10.17 | -| [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.15.13 | +| [key\_protect](#module\_key\_protect) | terraform-ibm-modules/kms-all-inclusive/ibm | 4.16.4 | | [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.1.6 | | [secrets\_manager](#module\_secrets\_manager) | ../.. | n/a | diff --git a/examples/complete/main.tf b/examples/complete/main.tf index bc6c2994..260706f9 100644 --- a/examples/complete/main.tf +++ b/examples/complete/main.tf @@ -8,14 +8,13 @@ module "resource_group" { module "key_protect" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "4.15.13" + version = "4.16.4" key_protect_instance_name = "${var.prefix}-key-protect" resource_group_id = module.resource_group.resource_group_id region = var.region keys = [ { - key_ring_name = "${var.prefix}-sm" - force_delete_key_ring = true + key_ring_name = "${var.prefix}-sm" keys = [ { key_name = "${var.prefix}-sm-key" diff --git a/solutions/standard/main.tf b/solutions/standard/main.tf index 45b0c148..a273b2ab 100644 --- a/solutions/standard/main.tf +++ b/solutions/standard/main.tf @@ -64,7 +64,7 @@ module "kms" { } count = var.existing_secrets_manager_crn != null || var.existing_secrets_manager_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key, or bucket source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "4.15.13" + version = "4.16.4" create_key_protect_instance = false region = local.kms_region existing_kms_instance_crn = var.existing_kms_instance_crn @@ -72,9 +72,8 @@ module "kms" { key_endpoint_type = var.kms_endpoint_type keys = [ { - key_ring_name = local.kms_key_ring_name - existing_key_ring = false - force_delete_key_ring = true + key_ring_name = local.kms_key_ring_name + existing_key_ring = false keys = [ { key_name = local.kms_key_name diff --git a/tests/existing-resources/main.tf b/tests/existing-resources/main.tf index 1f237fea..045e0a84 100644 --- a/tests/existing-resources/main.tf +++ b/tests/existing-resources/main.tf @@ -31,14 +31,13 @@ module "event_notifications" { module "key_protect" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "4.15.13" + version = "4.16.4" key_protect_instance_name = "${var.prefix}-key-protect" resource_group_id = module.resource_group.resource_group_id region = var.region keys = [ { - key_ring_name = "${var.prefix}-sm" - force_delete_key_ring = true + key_ring_name = "${var.prefix}-sm" keys = [ { key_name = "${var.prefix}-sm-key"