Skip to content

Commit b59cccd

Browse files
fix(deps): update terraform dependencies
1 parent 8d930c7 commit b59cccd

File tree

12 files changed

+22
-22
lines changed

12 files changed

+22
-22
lines changed

README.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -130,8 +130,8 @@ You need the following permissions to run this module.
130130

131131
| Name | Source | Version |
132132
|------|--------|---------|
133-
| <a name="module_bucket_cbr_rule"></a> [bucket\_cbr\_rule](#module\_bucket\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
134-
| <a name="module_instance_cbr_rule"></a> [instance\_cbr\_rule](#module\_instance\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
133+
| <a name="module_bucket_cbr_rule"></a> [bucket\_cbr\_rule](#module\_bucket\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.2 |
134+
| <a name="module_instance_cbr_rule"></a> [instance\_cbr\_rule](#module\_instance\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.2 |
135135

136136
### Resources
137137

examples/advanced/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.2.0"
7+
version = "1.2.1"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -50,7 +50,7 @@ locals {
5050

5151
module "key_protect_all_inclusive" {
5252
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
53-
version = "5.1.7"
53+
version = "5.1.8"
5454
key_protect_instance_name = "${var.prefix}-kp"
5555
resource_group_id = module.resource_group.resource_group_id
5656
enable_metrics = false
@@ -81,7 +81,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
8181

8282
module "cbr_zone" {
8383
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
84-
version = "1.31.0"
84+
version = "1.31.2"
8585
name = "${var.prefix}-VPC-network-zone"
8686
zone_description = "CBR Network zone containing VPC"
8787
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id

examples/basic/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.2.0"
7+
version = "1.2.1"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group

examples/fscloud/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.2.0"
7+
version = "1.2.1"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group
@@ -41,7 +41,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
4141

4242
module "cbr_zone" {
4343
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
44-
version = "1.31.0"
44+
version = "1.31.2"
4545
name = "${var.prefix}-VPC-fscloud-nz"
4646
zone_description = "CBR Network zone containing VPC"
4747
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id
@@ -54,7 +54,7 @@ module "cbr_zone" {
5454
# Allow schematics, from outside VPC, to manage resources
5555
module "cbr_zone_schematics" {
5656
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
57-
version = "1.31.0"
57+
version = "1.31.2"
5858
name = "${var.prefix}-schematics-fscloud-nz"
5959
zone_description = "CBR Network zone containing Schematics"
6060
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id

examples/one-rate-plan/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.2.0"
7+
version = "1.2.1"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group

examples/replication/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.2.0"
7+
version = "1.2.1"
88
# if an existing resource group is not set (null) create a new one using prefix
99
resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null
1010
existing_resource_group_name = var.resource_group

main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -358,7 +358,7 @@ locals {
358358
module "bucket_cbr_rule" {
359359
count = (length(var.bucket_cbr_rules) > 0 && var.create_cos_bucket) ? length(var.bucket_cbr_rules) : 0
360360
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
361-
version = "1.31.0"
361+
version = "1.31.2"
362362
rule_description = var.bucket_cbr_rules[count.index].description
363363
enforcement_mode = var.bucket_cbr_rules[count.index].enforcement_mode
364364
rule_contexts = var.bucket_cbr_rules[count.index].rule_contexts
@@ -393,7 +393,7 @@ module "bucket_cbr_rule" {
393393
module "instance_cbr_rule" {
394394
count = length(var.instance_cbr_rules)
395395
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
396-
version = "1.31.0"
396+
version = "1.31.2"
397397
rule_description = var.instance_cbr_rules[count.index].description
398398
enforcement_mode = var.instance_cbr_rules[count.index].enforcement_mode
399399
rule_contexts = var.instance_cbr_rules[count.index].rule_contexts

modules/fscloud/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -94,7 +94,7 @@ module "cos_fscloud" {
9494
|------|--------|---------|
9595
| <a name="module_buckets"></a> [buckets](#module\_buckets) | ../../modules/buckets | n/a |
9696
| <a name="module_cos_instance"></a> [cos\_instance](#module\_cos\_instance) | ../../ | n/a |
97-
| <a name="module_instance_cbr_rules"></a> [instance\_cbr\_rules](#module\_instance\_cbr\_rules) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
97+
| <a name="module_instance_cbr_rules"></a> [instance\_cbr\_rules](#module\_instance\_cbr\_rules) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.2 |
9898

9999
### Resources
100100

modules/fscloud/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -89,7 +89,7 @@ module "instance_cbr_rules" {
8989
depends_on = [module.buckets]
9090
count = length(var.instance_cbr_rules)
9191
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
92-
version = "1.31.0"
92+
version = "1.31.2"
9393
rule_description = var.instance_cbr_rules[count.index].description
9494
enforcement_mode = var.instance_cbr_rules[count.index].enforcement_mode
9595
rule_contexts = var.instance_cbr_rules[count.index].rule_contexts

solutions/instance/main.tf

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44

55
module "resource_group" {
66
source = "terraform-ibm-modules/resource-group/ibm"
7-
version = "1.2.0"
7+
version = "1.2.1"
88
existing_resource_group_name = var.existing_resource_group_name
99
}
1010

@@ -32,7 +32,7 @@ module "cos" {
3232
module "crn_parser" {
3333
count = var.existing_secrets_manager_instance_crn != null ? 1 : 0
3434
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
35-
version = "1.1.0"
35+
version = "1.2.0"
3636
crn = var.existing_secrets_manager_instance_crn
3737
}
3838
locals {
@@ -86,7 +86,7 @@ module "secrets_manager_service_credentials" {
8686
count = length(local.service_credential_secrets) > 0 ? 1 : 0
8787
depends_on = [time_sleep.wait_for_cos_authorization_policy]
8888
source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
89-
version = "2.5.0"
89+
version = "2.6.3"
9090
existing_sm_instance_guid = local.existing_secrets_manager_instance_guid
9191
existing_sm_instance_region = local.existing_secrets_manager_instance_region
9292
endpoint_type = var.existing_secrets_manager_endpoint_type

solutions/secure-cross-regional-bucket/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ locals {
7070

7171
module "cos_crn_parser" {
7272
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
73-
version = "1.1.0"
73+
version = "1.2.0"
7474
crn = var.existing_cos_instance_crn
7575
}
7676

@@ -127,7 +127,7 @@ module "kms" {
127127
}
128128
count = var.existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key.
129129
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
130-
version = "5.1.7"
130+
version = "5.1.8"
131131
create_key_protect_instance = false
132132
region = local.existing_kms_instance_region
133133
existing_kms_instance_crn = var.existing_kms_instance_crn

solutions/secure-regional-bucket/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,7 @@ locals {
7272
#######################################################################################################################
7373
module "cos_crn_parser" {
7474
source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
75-
version = "1.1.0"
75+
version = "1.2.0"
7676
crn = var.existing_cos_instance_crn
7777
}
7878

@@ -129,7 +129,7 @@ module "kms" {
129129
}
130130
count = var.existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key
131131
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
132-
version = "5.1.7"
132+
version = "5.1.8"
133133
create_key_protect_instance = false
134134
region = local.existing_kms_instance_region
135135
existing_kms_instance_crn = var.existing_kms_instance_crn

0 commit comments

Comments
 (0)