Skip to content

Commit 4adb8fa

Browse files
fix(deps): update terraform-module (#162)
1 parent c136acd commit 4adb8fa

File tree

6 files changed

+12
-10
lines changed

6 files changed

+12
-10
lines changed

.secrets.baseline

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@
33
"files": "go.sum|^.secrets.baseline$",
44
"lines": null
55
},
6-
"generated_at": "2023-12-09T05:17:42Z",
6+
"generated_at": "2023-12-10T05:17:42Z",
77
"plugins_used": [
88
{
99
"name": "AWSKeyDetector"

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -76,7 +76,7 @@ To create service credentials, access the Event Notifications service, and acces
7676

7777
| Name | Source | Version |
7878
|------|--------|---------|
79-
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.19.1 |
79+
| <a name="module_cbr_rule"></a> [cbr\_rule](#module\_cbr\_rule) | terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module | 1.22.1 |
8080

8181
### Resources
8282

examples/complete/main.tf

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,15 +21,17 @@ locals {
2121

2222
module "key_protect_all_inclusive" {
2323
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
24-
version = "4.8.5"
24+
version = "4.13.1"
2525
resource_group_id = module.resource_group.resource_group_id
2626
region = var.region
2727
key_protect_instance_name = "${var.prefix}-kp"
2828
resource_tags = var.resource_tags
2929
keys = [{
30-
key_ring_name = "en-key-ring"
30+
key_ring_name = "en-key-ring"
31+
force_delete_key_ring = true
3132
keys = [{
32-
key_name = "${var.prefix}-en"
33+
key_name = "${var.prefix}-en"
34+
force_delete = true
3335
}]
3436
}]
3537
}
@@ -84,7 +86,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
8486

8587
module "cbr_zone" {
8688
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
87-
version = "1.19.1"
89+
version = "1.22.1"
8890
name = "${var.prefix}-VPC-network-zone"
8991
zone_description = "CBR Network zone representing VPC"
9092
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id

examples/fscloud/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ resource "ibm_is_subnet" "testacc_subnet" {
4040

4141
module "cbr_zone" {
4242
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-zone-module"
43-
version = "1.19.1"
43+
version = "1.22.1"
4444
name = "${var.prefix}-VPC-network-zone"
4545
zone_description = "CBR Network zone representing VPC"
4646
account_id = data.ibm_iam_account_settings.iam_account_settings.account_id

main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@ resource "time_sleep" "wait_for_kms_authorization_policy" {
161161
module "cbr_rule" {
162162
count = length(var.cbr_rules) > 0 ? length(var.cbr_rules) : 0
163163
source = "terraform-ibm-modules/cbr/ibm//modules/cbr-rule-module"
164-
version = "1.19.1"
164+
version = "1.22.1"
165165
rule_description = var.cbr_rules[count.index].description
166166
enforcement_mode = var.cbr_rules[count.index].enforcement_mode
167167
rule_contexts = var.cbr_rules[count.index].rule_contexts

solutions/standard/main.tf

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,7 +29,7 @@ module "kms" {
2929
}
3030
count = var.existing_kms_root_key_crn != null ? 0 : 1 # no need to create any KMS resources if passing an existing key
3131
source = "terraform-ibm-modules/kms-all-inclusive/ibm"
32-
version = "4.8.4"
32+
version = "4.13.1"
3333
create_key_protect_instance = false
3434
region = local.kms_region
3535
existing_kms_instance_guid = var.existing_kms_instance_crn
@@ -82,7 +82,7 @@ locals {
8282

8383
module "cos" {
8484
source = "terraform-ibm-modules/cos/ibm"
85-
version = "8.2.0"
85+
version = "8.2.13"
8686
create_cos_instance = var.existing_cos_instance_crn == null ? true : false
8787
create_cos_bucket = var.existing_cos_bucket_name == null ? true : false
8888
add_bucket_name_suffix = var.add_bucket_name_suffix

0 commit comments

Comments
 (0)