File tree Expand file tree Collapse file tree 5 files changed +11
-11
lines changed
solutions/fully-configurable Expand file tree Collapse file tree 5 files changed +11
-11
lines changed Original file line number Diff line number Diff line change @@ -21,7 +21,7 @@ locals {
21
21
22
22
module "key_protect_all_inclusive" {
23
23
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
24
- version = " 5.1.2 "
24
+ version = " 5.1.4 "
25
25
resource_group_id = module. resource_group . resource_group_id
26
26
region = var. region
27
27
key_protect_instance_name = " ${ var . prefix } -kp"
@@ -45,7 +45,7 @@ locals {
45
45
46
46
module "cos" {
47
47
source = " terraform-ibm-modules/cos/ibm"
48
- version = " 8.21.21 "
48
+ version = " 8.21.24 "
49
49
resource_group_id = module. resource_group . resource_group_id
50
50
region = var. region
51
51
cos_instance_name = " ${ var . prefix } -cos"
Original file line number Diff line number Diff line change @@ -77,7 +77,7 @@ locals {
77
77
78
78
module "cos" {
79
79
source = " terraform-ibm-modules/cos/ibm//modules/fscloud"
80
- version = " 8.21.21 "
80
+ version = " 8.21.24 "
81
81
resource_group_id = module. resource_group . resource_group_id
82
82
create_cos_instance = true
83
83
cos_instance_name = " ${ var . prefix } -cos"
Original file line number Diff line number Diff line change @@ -32,17 +32,17 @@ When `existing_en_instance_crn` is passed, this solution ignores ALL other input
32
32
33
33
| Name | Source | Version |
34
34
| ------| --------| ---------|
35
- | <a name =" module_cos_buckets " ></a > [ cos\_ buckets] ( #module\_ cos\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.21 |
35
+ | <a name =" module_cos_buckets " ></a > [ cos\_ buckets] ( #module\_ cos\_ buckets ) | terraform-ibm-modules/cos/ibm//modules/buckets | 8.21.24 |
36
36
| <a name =" module_cos_kms_key_crn_parser " ></a > [ cos\_ kms\_ key\_ crn\_ parser] ( #module\_ cos\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
37
37
| <a name =" module_event_notifications " ></a > [ event\_ notifications] ( #module\_ event\_ notifications ) | ../.. | n/a |
38
38
| <a name =" module_existing_cos_crn_parser " ></a > [ existing\_ cos\_ crn\_ parser] ( #module\_ existing\_ cos\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
39
39
| <a name =" module_existing_en_crn_parser " ></a > [ existing\_ en\_ crn\_ parser] ( #module\_ existing\_ en\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
40
40
| <a name =" module_existing_kms_crn_parser " ></a > [ existing\_ kms\_ crn\_ parser] ( #module\_ existing\_ kms\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
41
41
| <a name =" module_existing_kms_key_crn_parser " ></a > [ existing\_ kms\_ key\_ crn\_ parser] ( #module\_ existing\_ kms\_ key\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
42
42
| <a name =" module_existing_sm_crn_parser " ></a > [ existing\_ sm\_ crn\_ parser] ( #module\_ existing\_ sm\_ crn\_ parser ) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
43
- | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.2 |
43
+ | <a name =" module_kms " ></a > [ kms] ( #module\_ kms ) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.4 |
44
44
| <a name =" module_resource_group " ></a > [ resource\_ group] ( #module\_ resource\_ group ) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
45
- | <a name =" module_secrets_manager_service_credentials " ></a > [ secrets\_ manager\_ service\_ credentials] ( #module\_ secrets\_ manager\_ service\_ credentials ) | terraform-ibm-modules/secrets-manager/ibm//modules/secrets | 2.2.6 |
45
+ | <a name =" module_secrets_manager_service_credentials " ></a > [ secrets\_ manager\_ service\_ credentials] ( #module\_ secrets\_ manager\_ service\_ credentials ) | terraform-ibm-modules/secrets-manager/ibm//modules/secrets | 2.2.7 |
46
46
47
47
### Resources
48
48
Original file line number Diff line number Diff line change @@ -63,7 +63,7 @@ module "kms" {
63
63
}
64
64
count = local. create_kms_keys ? 1 : 0
65
65
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
66
- version = " 5.1.2 "
66
+ version = " 5.1.4 "
67
67
create_key_protect_instance = false
68
68
region = local. kms_region
69
69
existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -236,7 +236,7 @@ locals {
236
236
module "cos_buckets" {
237
237
count = var. enable_collecting_failed_events && var. existing_event_notifications_instance_crn == null ? 1 : 0
238
238
source = " terraform-ibm-modules/cos/ibm//modules/buckets"
239
- version = " 8.21.21 "
239
+ version = " 8.21.24 "
240
240
bucket_configs = local. bucket_config
241
241
}
242
242
@@ -357,7 +357,7 @@ module "secrets_manager_service_credentials" {
357
357
count = length (local. service_credential_secrets ) > 0 ? 1 : 0
358
358
depends_on = [time_sleep . wait_for_en_authorization_policy ]
359
359
source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
360
- version = " 2.2.6 "
360
+ version = " 2.2.7 "
361
361
existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
362
362
existing_sm_instance_region = local. existing_secrets_manager_instance_region
363
363
endpoint_type = var. existing_secrets_manager_endpoint_type
Original file line number Diff line number Diff line change @@ -18,7 +18,7 @@ module "event_notification" {
18
18
19
19
module "cos" {
20
20
source = " terraform-ibm-modules/cos/ibm"
21
- version = " 8.21.21 "
21
+ version = " 8.21.24 "
22
22
resource_group_id = module. resource_group . resource_group_id
23
23
region = var. region
24
24
cos_instance_name = " ${ var . prefix } -cos"
@@ -30,7 +30,7 @@ module "cos" {
30
30
31
31
module "cloud_monitoring" {
32
32
source = " terraform-ibm-modules/cloud-monitoring/ibm"
33
- version = " 1.2.2 "
33
+ version = " 1.2.4 "
34
34
resource_group_id = module. resource_group . resource_group_id
35
35
region = var. region
36
36
resource_tags = var. resource_tags
You can’t perform that action at this time.
0 commit comments