From 8bdaadb2a44a36bce744d973f6eeb805b7bf0c18 Mon Sep 17 00:00:00 2001 From: Terraform IBM Modules Operations Date: Sun, 6 Jul 2025 06:12:00 +0000 Subject: [PATCH] fix(deps): update terraform dependencies --- README.md | 4 ++-- examples/advanced/main.tf | 6 +++--- examples/basic/main.tf | 2 +- examples/fscloud/main.tf | 6 +++--- examples/one-rate-plan/main.tf | 2 +- examples/replication/main.tf | 2 +- main.tf | 4 ++-- modules/fscloud/README.md | 2 +- modules/fscloud/main.tf | 2 +- .../cross-regional-bucket/fully-configurable/main.tf | 8 ++++---- solutions/instance/main.tf | 6 +++--- solutions/regional-bucket/fully-configurable/main.tf | 8 ++++---- 12 files changed, 26 insertions(+), 26 deletions(-) diff --git a/README.md b/README.md index 748cf3a4..c49efe4d 100644 --- a/README.md +++ b/README.md @@ -130,8 +130,8 @@ You need the following permissions to run this module. | Name | Source | Version | |------|--------|---------| -| [bucket\_cbr\_rule](#module\_bucket\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 | -| [instance\_cbr\_rule](#module\_instance\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 | +| [bucket\_cbr\_rule](#module\_bucket\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.2 | +| [instance\_cbr\_rule](#module\_instance\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.2 | ### Resources diff --git a/examples/advanced/main.tf b/examples/advanced/main.tf index 39936786..aa9e1073 100644 --- a/examples/advanced/main.tf +++ b/examples/advanced/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.2.0" + version = "1.2.1" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -50,7 +50,7 @@ locals { module "key_protect_all_inclusive" { source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.1.7" + version = "5.1.9" key_protect_instance_name = "${var.prefix}-kp" resource_group_id = module.resource_group.resource_group_id enable_metrics = false @@ -81,7 +81,7 @@ data "ibm_iam_account_settings" "iam_account_settings" { module "cbr_zone" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.31.0" + version = "1.32.2" name = "${var.prefix}-VPC-network-zone" zone_description = "CBR Network zone containing VPC" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id diff --git a/examples/basic/main.tf b/examples/basic/main.tf index e2a70865..f8ace79c 100644 --- a/examples/basic/main.tf +++ b/examples/basic/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.2.0" + version = "1.2.1" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group diff --git a/examples/fscloud/main.tf b/examples/fscloud/main.tf index 4729c0cb..9b80840c 100644 --- a/examples/fscloud/main.tf +++ b/examples/fscloud/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.2.0" + version = "1.2.1" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group @@ -41,7 +41,7 @@ data "ibm_iam_account_settings" "iam_account_settings" { module "cbr_zone" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.31.0" + version = "1.32.2" name = "${var.prefix}-VPC-fscloud-nz" zone_description = "CBR Network zone containing VPC" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id @@ -54,7 +54,7 @@ module "cbr_zone" { # Allow schematics, from outside VPC, to manage resources module "cbr_zone_schematics" { source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module" - version = "1.31.0" + version = "1.32.2" name = "${var.prefix}-schematics-fscloud-nz" zone_description = "CBR Network zone containing Schematics" account_id = data.ibm_iam_account_settings.iam_account_settings.account_id diff --git a/examples/one-rate-plan/main.tf b/examples/one-rate-plan/main.tf index 842a8317..3540d70a 100644 --- a/examples/one-rate-plan/main.tf +++ b/examples/one-rate-plan/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.2.0" + version = "1.2.1" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group diff --git a/examples/replication/main.tf b/examples/replication/main.tf index 3342058b..0d851851 100644 --- a/examples/replication/main.tf +++ b/examples/replication/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.2.0" + version = "1.2.1" # if an existing resource group is not set (null) create a new one using prefix resource_group_name = var.resource_group == null ? "${var.prefix}-resource-group" : null existing_resource_group_name = var.resource_group diff --git a/main.tf b/main.tf index 5745d425..38fc33d5 100644 --- a/main.tf +++ b/main.tf @@ -358,7 +358,7 @@ locals { module "bucket_cbr_rule" { count = (length(var.bucket_cbr_rules) > 0 && var.create_cos_bucket) ? length(var.bucket_cbr_rules) : 0 source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.31.0" + version = "1.32.2" rule_description = var.bucket_cbr_rules[count.index].description enforcement_mode = var.bucket_cbr_rules[count.index].enforcement_mode rule_contexts = var.bucket_cbr_rules[count.index].rule_contexts @@ -393,7 +393,7 @@ module "bucket_cbr_rule" { module "instance_cbr_rule" { count = length(var.instance_cbr_rules) source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.31.0" + version = "1.32.2" rule_description = var.instance_cbr_rules[count.index].description enforcement_mode = var.instance_cbr_rules[count.index].enforcement_mode rule_contexts = var.instance_cbr_rules[count.index].rule_contexts diff --git a/modules/fscloud/README.md b/modules/fscloud/README.md index 322b52fb..e512b3c6 100644 --- a/modules/fscloud/README.md +++ b/modules/fscloud/README.md @@ -94,7 +94,7 @@ module "cos_fscloud" { |------|--------|---------| | [buckets](#module\_buckets) | ../../modules/buckets | n/a | | [cos\_instance](#module\_cos\_instance) | ../../ | n/a | -| [instance\_cbr\_rules](#module\_instance\_cbr\_rules) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.31.0 | +| [instance\_cbr\_rules](#module\_instance\_cbr\_rules) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.32.2 | ### Resources diff --git a/modules/fscloud/main.tf b/modules/fscloud/main.tf index 39a8b174..f0d9b500 100644 --- a/modules/fscloud/main.tf +++ b/modules/fscloud/main.tf @@ -89,7 +89,7 @@ module "instance_cbr_rules" { depends_on = [module.buckets] count = length(var.instance_cbr_rules) source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module" - version = "1.31.0" + version = "1.32.2" rule_description = var.instance_cbr_rules[count.index].description enforcement_mode = var.instance_cbr_rules[count.index].enforcement_mode rule_contexts = var.instance_cbr_rules[count.index].rule_contexts diff --git a/solutions/cross-regional-bucket/fully-configurable/main.tf b/solutions/cross-regional-bucket/fully-configurable/main.tf index fa70758d..568ab847 100644 --- a/solutions/cross-regional-bucket/fully-configurable/main.tf +++ b/solutions/cross-regional-bucket/fully-configurable/main.tf @@ -62,7 +62,7 @@ locals { module "cos_instance_crn_parser" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.1.0" + version = "1.2.0" crn = var.existing_cos_instance_crn } @@ -94,14 +94,14 @@ locals { module "kms_instance_crn_parser" { count = var.existing_kms_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.1.0" + version = "1.2.0" crn = var.existing_kms_instance_crn } module "kms_key_crn_parser" { count = var.existing_kms_key_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.1.0" + version = "1.2.0" crn = var.existing_kms_key_crn } @@ -158,7 +158,7 @@ module "kms" { } count = var.kms_encryption_enabled && var.existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key. source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.1.7" + version = "5.1.9" create_key_protect_instance = false region = local.kms_region existing_kms_instance_crn = var.existing_kms_instance_crn diff --git a/solutions/instance/main.tf b/solutions/instance/main.tf index 542c803c..eb0f83b0 100644 --- a/solutions/instance/main.tf +++ b/solutions/instance/main.tf @@ -4,7 +4,7 @@ module "resource_group" { source = "terraform-ibm-modules/resource-group/ibm" - version = "1.2.0" + version = "1.2.1" existing_resource_group_name = var.existing_resource_group_name } @@ -32,7 +32,7 @@ module "cos" { module "crn_parser" { count = var.existing_secrets_manager_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.1.0" + version = "1.2.0" crn = var.existing_secrets_manager_instance_crn } locals { @@ -86,7 +86,7 @@ module "secrets_manager_service_credentials" { count = length(local.service_credential_secrets) > 0 ? 1 : 0 depends_on = [time_sleep.wait_for_cos_authorization_policy] source = "terraform-ibm-modules/secrets-manager/ibm//modules/secrets" - version = "2.5.0" + version = "2.6.5" existing_sm_instance_guid = local.existing_secrets_manager_instance_guid existing_sm_instance_region = local.existing_secrets_manager_instance_region endpoint_type = var.existing_secrets_manager_endpoint_type diff --git a/solutions/regional-bucket/fully-configurable/main.tf b/solutions/regional-bucket/fully-configurable/main.tf index 75171b94..9aa8d8e4 100644 --- a/solutions/regional-bucket/fully-configurable/main.tf +++ b/solutions/regional-bucket/fully-configurable/main.tf @@ -64,7 +64,7 @@ locals { module "cos_instance_crn_parser" { source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.1.0" + version = "1.2.0" crn = var.existing_cos_instance_crn } @@ -91,14 +91,14 @@ locals { module "kms_instance_crn_parser" { count = var.existing_kms_instance_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.1.0" + version = "1.2.0" crn = var.existing_kms_instance_crn } module "kms_key_crn_parser" { count = var.existing_kms_key_crn != null ? 1 : 0 source = "terraform-ibm-modules/common-utilities/ibm//modules/crn-parser" - version = "1.1.0" + version = "1.2.0" crn = var.existing_kms_key_crn } @@ -155,7 +155,7 @@ module "kms" { } count = var.kms_encryption_enabled && var.existing_kms_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key. source = "terraform-ibm-modules/kms-all-inclusive/ibm" - version = "5.1.7" + version = "5.1.9" create_key_protect_instance = false region = local.kms_region existing_kms_instance_crn = var.existing_kms_instance_crn