4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
existing_resource_group_name = var. existing_resource_group_name
9
9
}
10
10
@@ -16,15 +16,15 @@ module "resource_group" {
16
16
module "existing_kms_crn_parser" {
17
17
count = var. existing_kms_instance_crn != null ? 1 : 0
18
18
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
19
- version = " 1.1 .0"
19
+ version = " 1.2 .0"
20
20
crn = var. existing_kms_instance_crn
21
21
}
22
22
23
23
# If existing KMS root key CRN passed, parse details from it
24
24
module "existing_kms_key_crn_parser" {
25
25
count = var. existing_kms_root_key_crn != null ? 1 : 0
26
26
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
27
- version = " 1.1 .0"
27
+ version = " 1.2 .0"
28
28
crn = var. existing_kms_root_key_crn
29
29
}
30
30
@@ -63,7 +63,7 @@ module "kms" {
63
63
}
64
64
count = local. create_kms_keys ? 1 : 0
65
65
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
66
- version = " 5.1.7 "
66
+ version = " 5.1.8 "
67
67
create_key_protect_instance = false
68
68
region = local. kms_region
69
69
existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -96,7 +96,7 @@ module "kms" {
96
96
module "cos_kms_key_crn_parser" {
97
97
count = (local. create_kms_keys || var. existing_kms_root_key_crn != null ) ? 1 : 0
98
98
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
99
- version = " 1.1 .0"
99
+ version = " 1.2 .0"
100
100
crn = local. cos_kms_key_crn
101
101
}
102
102
@@ -190,7 +190,7 @@ resource "ibm_iam_authorization_policy" "en_kms_policy" {
190
190
module "existing_cos_crn_parser" {
191
191
count = var. existing_cos_instance_crn != null ? 1 : 0
192
192
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
193
- version = " 1.1 .0"
193
+ version = " 1.2 .0"
194
194
crn = var. existing_cos_instance_crn
195
195
}
196
196
@@ -236,7 +236,7 @@ locals {
236
236
module "cos_buckets" {
237
237
count = var. enable_collecting_failed_events && var. existing_event_notifications_instance_crn == null ? 1 : 0
238
238
source = " terraform-ibm-modules/cos/ibm//modules/buckets"
239
- version = " 9.0.5 "
239
+ version = " 9.0.6 "
240
240
bucket_configs = local. bucket_config
241
241
}
242
242
@@ -248,7 +248,7 @@ module "cos_buckets" {
248
248
module "existing_en_crn_parser" {
249
249
count = var. existing_event_notifications_instance_crn != null ? 1 : 0
250
250
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
251
- version = " 1.1 .0"
251
+ version = " 1.2 .0"
252
252
crn = var. existing_event_notifications_instance_crn
253
253
}
254
254
@@ -303,7 +303,7 @@ module "event_notifications" {
303
303
module "existing_sm_crn_parser" {
304
304
count = var. existing_secrets_manager_instance_crn != null ? 1 : 0
305
305
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
306
- version = " 1.1 .0"
306
+ version = " 1.2 .0"
307
307
crn = var. existing_secrets_manager_instance_crn
308
308
}
309
309
@@ -357,7 +357,7 @@ module "secrets_manager_service_credentials" {
357
357
count = length (local. service_credential_secrets ) > 0 ? 1 : 0
358
358
depends_on = [time_sleep . wait_for_en_authorization_policy ]
359
359
source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
360
- version = " 2.5 .1"
360
+ version = " 2.6 .1"
361
361
existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
362
362
existing_sm_instance_region = local. existing_secrets_manager_instance_region
363
363
endpoint_type = var. existing_secrets_manager_endpoint_type
0 commit comments