File tree Expand file tree Collapse file tree 4 files changed +7
-7
lines changed Expand file tree Collapse file tree 4 files changed +7
-7
lines changed Original file line number Diff line number Diff line change @@ -21,7 +21,7 @@ locals {
21
21
22
22
module "key_protect_all_inclusive" {
23
23
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
24
- version = " 4.18 .1"
24
+ version = " 4.19 .1"
25
25
resource_group_id = module. resource_group . resource_group_id
26
26
region = var. region
27
27
key_protect_instance_name = " ${ var . prefix } -kp"
@@ -45,7 +45,7 @@ locals {
45
45
46
46
module "cos" {
47
47
source = " terraform-ibm-modules/cos/ibm"
48
- version = " 8.15.10 "
48
+ version = " 8.15.15 "
49
49
resource_group_id = module. resource_group . resource_group_id
50
50
region = var. region
51
51
cos_instance_name = " ${ var . prefix } -cos"
Original file line number Diff line number Diff line change @@ -77,7 +77,7 @@ locals {
77
77
78
78
module "cos" {
79
79
source = " terraform-ibm-modules/cos/ibm//modules/fscloud"
80
- version = " 8.15.10 "
80
+ version = " 8.15.15 "
81
81
resource_group_id = module. resource_group . resource_group_id
82
82
create_cos_instance = true
83
83
cos_instance_name = " ${ var . prefix } -cos"
Original file line number Diff line number Diff line change @@ -199,7 +199,7 @@ module "kms" {
199
199
}
200
200
count = local. create_kms_keys ? 1 : 0
201
201
source = " terraform-ibm-modules/kms-all-inclusive/ibm"
202
- version = " 4.18 .1"
202
+ version = " 4.19 .1"
203
203
create_key_protect_instance = false
204
204
region = local. kms_region
205
205
existing_kms_instance_crn = var. existing_kms_instance_crn
@@ -247,7 +247,7 @@ locals {
247
247
module "cos" {
248
248
count = local. create_cos_bucket ? 1 : 0
249
249
source = " terraform-ibm-modules/cos/ibm"
250
- version = " 8.15.10 "
250
+ version = " 8.15.15 "
251
251
create_cos_instance = var. existing_cos_instance_crn == null ? true : false
252
252
create_cos_bucket = local. create_cos_bucket
253
253
existing_cos_instance_id = var. existing_cos_instance_crn
@@ -388,7 +388,7 @@ module "secrets_manager_service_credentials" {
388
388
count = length (local. service_credential_secrets ) > 0 ? 1 : 0
389
389
depends_on = [time_sleep . wait_for_en_authorization_policy ]
390
390
source = " terraform-ibm-modules/secrets-manager/ibm//modules/secrets"
391
- version = " 1.19.4 "
391
+ version = " 1.19.7 "
392
392
existing_sm_instance_guid = local. existing_secrets_manager_instance_guid
393
393
existing_sm_instance_region = local. existing_secrets_manager_instance_region
394
394
endpoint_type = var. existing_secrets_manager_endpoint_type
Original file line number Diff line number Diff line change @@ -18,7 +18,7 @@ module "event_notification" {
18
18
19
19
module "cos" {
20
20
source = " terraform-ibm-modules/cos/ibm"
21
- version = " 8.15.10 "
21
+ version = " 8.15.15 "
22
22
resource_group_id = module. resource_group . resource_group_id
23
23
region = var. region
24
24
cos_instance_name = " ${ var . prefix } -cos"
You can’t perform that action at this time.
0 commit comments