diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf
index bf5daae..4a56629 100644
--- a/examples/advanced/main.tf
+++ b/examples/advanced/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "cos" {
count = var.existing_scc_instance_crn == null ? 1 : 0
source = "terraform-ibm-modules/cos/ibm"
- version = "9.0.3"
+ version = "9.0.4"
cos_instance_name = "${var.prefix}-cos"
kms_encryption_enabled = false
retention_enabled = false
@@ -30,7 +30,7 @@ module "cos" {
module "event_notification" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "2.2.5"
+ version = "2.3.6"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags
@@ -45,7 +45,7 @@ module "event_notification" {
module "scc_wp" {
source = "terraform-ibm-modules/scc-workload-protection/ibm"
- version = "1.5.12"
+ version = "1.6.1"
name = "${var.prefix}-wp"
region = var.region
resource_group_id = module.resource_group.resource_group_id
diff --git a/examples/basic/main.tf b/examples/basic/main.tf
index ae3f3fa..4f9ad6b 100644
--- a/examples/basic/main.tf
+++ b/examples/basic/main.tf
@@ -7,7 +7,7 @@ module "resource_group" {
module "cos" {
source = "terraform-ibm-modules/cos/ibm"
- version = "9.0.3"
+ version = "9.0.4"
cos_instance_name = "${var.prefix}-cos"
kms_encryption_enabled = false
retention_enabled = false
diff --git a/solutions/fully-configurable/README.md b/solutions/fully-configurable/README.md
index f926715..3a2b368 100644
--- a/solutions/fully-configurable/README.md
+++ b/solutions/fully-configurable/README.md
@@ -22,20 +22,20 @@ This solution supports provisioning and configuring the following infrastructure
| Name | Version |
|------|---------|
| [terraform](#requirement\_terraform) | >= 1.9.0 |
-| [ibm](#requirement\_ibm) | 1.77.1 |
-| [time](#requirement\_time) | 0.13.0 |
+| [ibm](#requirement\_ibm) | 1.78.3 |
+| [time](#requirement\_time) | 0.13.1 |
### Modules
| Name | Source | Version |
|------|--------|---------|
-| [buckets](#module\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 9.0.3 |
+| [buckets](#module\_buckets) | terraform-ibm-modules/cos/ibm//modules/buckets | 9.0.4 |
| [existing\_cos\_crn\_parser](#module\_existing\_cos\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| [existing\_en\_crn\_parser](#module\_existing\_en\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| [existing\_kms\_crn\_parser](#module\_existing\_kms\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| [existing\_kms\_key\_crn\_parser](#module\_existing\_kms\_key\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
| [existing\_scc\_crn\_parser](#module\_existing\_scc\_crn\_parser) | terraform-ibm-modules/common-utilities/ibm//modules/crn-parser | 1.1.0 |
-| [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.5 |
+| [kms](#module\_kms) | terraform-ibm-modules/kms-all-inclusive/ibm | 5.1.7 |
| [resource\_group](#module\_resource\_group) | terraform-ibm-modules/resource-group/ibm | 1.2.0 |
| [scc](#module\_scc) | ../.. | n/a |
| [scc\_attachment](#module\_scc\_attachment) | ../../modules/attachment | n/a |
@@ -44,13 +44,13 @@ This solution supports provisioning and configuring the following infrastructure
| Name | Type |
|------|------|
-| [ibm_en_subscription_email.email_subscription](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.77.1/docs/resources/en_subscription_email) | resource |
-| [ibm_en_topic.en_topic](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.77.1/docs/resources/en_topic) | resource |
-| [ibm_iam_authorization_policy.cos_kms_policy](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.77.1/docs/resources/iam_authorization_policy) | resource |
-| [ibm_scc_scope.scc_scopes](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.77.1/docs/resources/scc_scope) | resource |
-| [time_sleep.wait_for_authorization_policy](https://registry.terraform.io/providers/hashicorp/time/0.13.0/docs/resources/sleep) | resource |
-| [time_sleep.wait_for_scc](https://registry.terraform.io/providers/hashicorp/time/0.13.0/docs/resources/sleep) | resource |
-| [ibm_en_destinations.en_destinations](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.77.1/docs/data-sources/en_destinations) | data source |
+| [ibm_en_subscription_email.email_subscription](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.78.3/docs/resources/en_subscription_email) | resource |
+| [ibm_en_topic.en_topic](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.78.3/docs/resources/en_topic) | resource |
+| [ibm_iam_authorization_policy.cos_kms_policy](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.78.3/docs/resources/iam_authorization_policy) | resource |
+| [ibm_scc_scope.scc_scopes](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.78.3/docs/resources/scc_scope) | resource |
+| [time_sleep.wait_for_authorization_policy](https://registry.terraform.io/providers/hashicorp/time/0.13.1/docs/resources/sleep) | resource |
+| [time_sleep.wait_for_scc](https://registry.terraform.io/providers/hashicorp/time/0.13.1/docs/resources/sleep) | resource |
+| [ibm_en_destinations.en_destinations](https://registry.terraform.io/providers/IBM-Cloud/ibm/1.78.3/docs/data-sources/en_destinations) | data source |
### Inputs
diff --git a/solutions/fully-configurable/main.tf b/solutions/fully-configurable/main.tf
index cfb1f0b..ef976d9 100644
--- a/solutions/fully-configurable/main.tf
+++ b/solutions/fully-configurable/main.tf
@@ -100,7 +100,7 @@ module "kms" {
}
count = var.existing_scc_instance_crn == null && var.kms_encryption_enabled_bucket && var.existing_kms_key_crn == null ? 1 : 0
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "5.1.5"
+ version = "5.1.7"
create_key_protect_instance = false
region = local.kms_region
existing_kms_instance_crn = var.existing_kms_instance_crn
@@ -171,7 +171,7 @@ module "buckets" {
count = var.existing_scc_instance_crn == null ? 1 : 0
depends_on = [time_sleep.wait_for_authorization_policy[0]]
source = "terraform-ibm-modules/cos/ibm//modules/buckets"
- version = "9.0.3"
+ version = "9.0.4"
bucket_configs = local.bucket_config
}
diff --git a/solutions/fully-configurable/version.tf b/solutions/fully-configurable/version.tf
index 8151a00..f127b83 100644
--- a/solutions/fully-configurable/version.tf
+++ b/solutions/fully-configurable/version.tf
@@ -4,11 +4,11 @@ terraform {
required_providers {
ibm = {
source = "IBM-Cloud/ibm"
- version = "1.77.1"
+ version = "1.78.3"
}
time = {
source = "hashicorp/time"
- version = "0.13.0"
+ version = "0.13.1"
}
}
}
diff --git a/tests/resources/existing-resources-test/main.tf b/tests/resources/existing-resources-test/main.tf
index 0a6408b..3d60d93 100644
--- a/tests/resources/existing-resources-test/main.tf
+++ b/tests/resources/existing-resources-test/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "cos" {
source = "terraform-ibm-modules/cos/ibm"
- version = "9.0.3"
+ version = "9.0.4"
cos_instance_name = "${var.prefix}-cos"
kms_encryption_enabled = false
retention_enabled = false
@@ -30,7 +30,7 @@ module "cos" {
module "scc" {
source = "terraform-ibm-modules/scc/ibm"
- version = "2.1.19"
+ version = "2.1.21"
instance_name = var.prefix
region = var.region
resource_group_id = module.resource_group.resource_group_id
@@ -45,7 +45,7 @@ module "scc" {
module "scc_wp" {
source = "terraform-ibm-modules/scc-workload-protection/ibm"
- version = "1.5.12"
+ version = "1.6.1"
name = var.prefix
region = var.region
resource_group_id = module.resource_group.resource_group_id
diff --git a/tests/resources/kms-key/main.tf b/tests/resources/kms-key/main.tf
index b930dd6..5c5c4c6 100644
--- a/tests/resources/kms-key/main.tf
+++ b/tests/resources/kms-key/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "key_protect" {
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
- version = "5.1.5"
+ version = "5.1.7"
key_protect_instance_name = "${var.prefix}-key-protect"
resource_group_id = module.resource_group.resource_group_id
region = var.region
diff --git a/tests/resources/prereq-resources/main.tf b/tests/resources/prereq-resources/main.tf
index 3287aaf..61cba5c 100644
--- a/tests/resources/prereq-resources/main.tf
+++ b/tests/resources/prereq-resources/main.tf
@@ -16,7 +16,7 @@ module "resource_group" {
module "cos" {
source = "terraform-ibm-modules/cos/ibm"
- version = "9.0.3"
+ version = "9.0.4"
resource_group_id = module.resource_group.resource_group_id
cos_instance_name = "${var.prefix}-cos"
cos_tags = var.resource_tags
@@ -29,7 +29,7 @@ module "cos" {
module "scc_wp" {
source = "terraform-ibm-modules/scc-workload-protection/ibm"
- version = "1.5.12"
+ version = "1.6.1"
name = var.prefix
region = var.region
resource_group_id = module.resource_group.resource_group_id
@@ -56,7 +56,7 @@ module "cloud_monitoring" {
module "event_notifications" {
source = "terraform-ibm-modules/event-notifications/ibm"
- version = "2.2.5"
+ version = "2.3.6"
resource_group_id = module.resource_group.resource_group_id
name = "${var.prefix}-en"
tags = var.resource_tags