File tree Expand file tree Collapse file tree 12 files changed +22
-22
lines changed
secure-cross-regional-bucket Expand file tree Collapse file tree 12 files changed +22
-22
lines changed Original file line number Diff line number Diff line change @@ -130,8 +130,8 @@ You need the following permissions to run this module.
130
130
131
131
| Name | Source | Version |
132
132
| ------| --------| ---------|
133
- | <a name =" module_bucket_cbr_rule " ></a > [ bucket\_ cbr\_ rule] ( #module\_ bucket\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
134
- | <a name =" module_instance_cbr_rule " ></a > [ instance\_ cbr\_ rule] ( #module\_ instance\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
133
+ | <a name =" module_bucket_cbr_rule " ></a > [ bucket\_ cbr\_ rule] ( #module\_ bucket\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.2 |
134
+ | <a name =" module_instance_cbr_rule " ></a > [ instance\_ cbr\_ rule] ( #module\_ instance\_ cbr\_ rule ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.2 |
135
135
136
136
### Resources
137
137
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
@@ -50,7 +50,7 @@ locals {
50
50
51
51
module "key_protect_all_inclusive" {
52
52
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
53
- version = " 5.1.7 "
53
+ version = " 5.1.8 "
54
54
key_protect_instance_name = " ${ var . prefix } -kp"
55
55
resource_group_id = module. resource_group . resource_group_id
56
56
enable_metrics = false
@@ -81,7 +81,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
81
81
82
82
module "cbr_zone" {
83
83
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
84
- version = " 1.31.0 "
84
+ version = " 1.31.2 "
85
85
name = " ${ var . prefix } -VPC-network-zone"
86
86
zone_description = " CBR Network zone containing VPC"
87
87
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
@@ -41,7 +41,7 @@ data "ibm_iam_account_settings" "iam_account_settings" {
41
41
42
42
module "cbr_zone" {
43
43
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
44
- version = " 1.31.0 "
44
+ version = " 1.31.2 "
45
45
name = " ${ var . prefix } -VPC-fscloud-nz"
46
46
zone_description = " CBR Network zone containing VPC"
47
47
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
@@ -54,7 +54,7 @@ module "cbr_zone" {
54
54
# Allow schematics, from outside VPC, to manage resources
55
55
module "cbr_zone_schematics" {
56
56
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
57
- version = " 1.31.0 "
57
+ version = " 1.31.2 "
58
58
name = " ${ var . prefix } -schematics-fscloud-nz"
59
59
zone_description = " CBR Network zone containing Schematics"
60
60
account_id = data. ibm_iam_account_settings . iam_account_settings . account_id
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
# if an existing resource group is not set (null) create a new one using prefix
9
9
resource_group_name = var. resource_group == null ? " ${ var . prefix } -resource-group" : null
10
10
existing_resource_group_name = var. resource_group
Original file line number Diff line number Diff line change @@ -358,7 +358,7 @@ locals {
358
358
module "bucket_cbr_rule" {
359
359
count = (length (var. bucket_cbr_rules ) > 0 && var. create_cos_bucket ) ? length (var. bucket_cbr_rules ) : 0
360
360
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
361
- version = " 1.31.0 "
361
+ version = " 1.31.2 "
362
362
rule_description = var. bucket_cbr_rules [count . index ]. description
363
363
enforcement_mode = var. bucket_cbr_rules [count . index ]. enforcement_mode
364
364
rule_contexts = var. bucket_cbr_rules [count . index ]. rule_contexts
@@ -393,7 +393,7 @@ module "bucket_cbr_rule" {
393
393
module "instance_cbr_rule" {
394
394
count = length (var. instance_cbr_rules )
395
395
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
396
- version = " 1.31.0 "
396
+ version = " 1.31.2 "
397
397
rule_description = var. instance_cbr_rules [count . index ]. description
398
398
enforcement_mode = var. instance_cbr_rules [count . index ]. enforcement_mode
399
399
rule_contexts = var. instance_cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change @@ -94,7 +94,7 @@ module "cos_fscloud" {
94
94
| ------| --------| ---------|
95
95
| <a name =" module_buckets " ></a > [ buckets] ( #module\_ buckets ) | ../../modules/buckets | n/a |
96
96
| <a name =" module_cos_instance " ></a > [ cos\_ instance] ( #module\_ cos\_ instance ) | ../../ | n/a |
97
- | <a name =" module_instance_cbr_rules " ></a > [ instance\_ cbr\_ rules] ( #module\_ instance\_ cbr\_ rules ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 |
97
+ | <a name =" module_instance_cbr_rules " ></a > [ instance\_ cbr\_ rules] ( #module\_ instance\_ cbr\_ rules ) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.2 |
98
98
99
99
### Resources
100
100
Original file line number Diff line number Diff line change @@ -89,7 +89,7 @@ module "instance_cbr_rules" {
89
89
depends_on = [module . buckets ]
90
90
count = length (var. instance_cbr_rules )
91
91
source = " terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
92
- version = " 1.31.0 "
92
+ version = " 1.31.2 "
93
93
rule_description = var. instance_cbr_rules [count . index ]. description
94
94
enforcement_mode = var. instance_cbr_rules [count . index ]. enforcement_mode
95
95
rule_contexts = var. instance_cbr_rules [count . index ]. rule_contexts
Original file line number Diff line number Diff line change 4
4
5
5
module "resource_group" {
6
6
source = " terraform-ibm-modules/resource-group/ibm"
7
- version = " 1.2.0 "
7
+ version = " 1.2.1 "
8
8
existing_resource_group_name = var. existing_resource_group_name
9
9
}
10
10
@@ -32,7 +32,7 @@ module "cos" {
32
32
module "crn_parser" {
33
33
count = var. existing_secrets_manager_instance_crn != null ? 1 : 0
34
34
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
35
- version = " 1.1 .0"
35
+ version = " 1.2 .0"
36
36
crn = var. existing_secrets_manager_instance_crn
37
37
}
38
38
locals {
@@ -86,7 +86,7 @@ module "secrets_manager_service_credentials" {
86
86
count = length (local. service_credential_secrets ) > 0 ? 1 : 0
87
87
depends_on = [time_sleep . wait_for_cos_authorization_policy ]
88
88
source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
89
- version = " 2.5.0 "
89
+ version = " 2.6.3 "
90
90
existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
91
91
existing_sm_instance_region = local. existing_secrets_manager_instance_region
92
92
endpoint_type = var. existing_secrets_manager_endpoint_type
Original file line number Diff line number Diff line change @@ -70,7 +70,7 @@ locals {
70
70
71
71
module "cos_crn_parser" {
72
72
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
73
- version = " 1.1 .0"
73
+ version = " 1.2 .0"
74
74
crn = var. existing_cos_instance_crn
75
75
}
76
76
@@ -127,7 +127,7 @@ module "kms" {
127
127
}
128
128
count = var. existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key.
129
129
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
130
- version = " 5.1.7 "
130
+ version = " 5.1.8 "
131
131
create_key_protect_instance = false
132
132
region = local. existing_kms_instance_region
133
133
existing_kms_instance_crn = var. existing_kms_instance_crn
Original file line number Diff line number Diff line change @@ -72,7 +72,7 @@ locals {
72
72
# ######################################################################################################################
73
73
module "cos_crn_parser" {
74
74
source = " terraform-ibm-modules/common-utilities/ibm//modules/crn-parser"
75
- version = " 1.1 .0"
75
+ version = " 1.2 .0"
76
76
crn = var. existing_cos_instance_crn
77
77
}
78
78
@@ -129,7 +129,7 @@ module "kms" {
129
129
}
130
130
count = var. existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key
131
131
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
132
- version = " 5.1.7 "
132
+ version = " 5.1.8 "
133
133
create_key_protect_instance = false
134
134
region = local. existing_kms_instance_region
135
135
existing_kms_instance_crn = var. existing_kms_instance_crn
You can’t perform that action at this time.
0 commit comments